FCS2021 The 4th International Conference on Frontiers in Cyber Security Haikou,P.R.China December 17-19,2021

FCS Home       Call for Papers       Important Dates       Organization       Registration       Program       Keynote       Accommodation       Location and Venue       Special Issues       Accepted Papers' List



Welcome to FCS 2021 - Accepted Papers' List

Paper ID
Authors, title
3
Binghui Zou, Chunjie Cao, Longjuan Wang and Fangjian Tao. DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks
4
Hongwen Wu, Xiaoming Wang, Ke Zhou, Jianming Zou, Congyun Wu, Wenjian Wen, Zhicheng Huang, Jiezhen Deng and Tingyu Qiu. Research on Automatic Analysis and Exploitation Technology of Remote Code Execution Vulnerability for Grid System
7
Xi Luo, Chunjie Cao and Longjuan Wang. Muti-modal Universal Embedding Representations for Language Understanding
11
Lawrence Tandoh, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh and Christopher Tandoh. Requirements for Total Resistance to Pollution Attacks in HMAC-based Authentication Schemes for Network Coding
14
Xiang Shu, Chunjie Cao, Longjuan Wang and Fangjian Tao. GWDGA: An Effective Adversarial DGA
15
Xin Ji, Haifeng Zhang, Juan Chu, Linxiao Dong and Chengyue Yang. New Federation Algorithm Based on End-edge-cloud Architecture for Smart Grid
16
Egide Nkurunziza, Gervais Mwitende, Lawrence Tandoh and Fagen Li. Certificateless authentication and consensus for the blockchain-based smart grid
17
Jiawei Zhang, Jinwei Wang, Xiangyang Luo and Bin Ma. Imperceptible and Reliable Adversarial Attack
22
Kejun Zhang, Xinrui Jiang and Xinying Yu. Network Security Situation Assessment Method based on MHSA-FL Model
26
Xinjian Lv, Min Yu, Jing Wei, Yuan Tian, Jie Li and Jian Li. Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network
27
Bin Ma, Yongkang Fu, Jian Li, Chunpeng Wang and Yuli Wang. A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images
40
Jieru Mu, Hua He, Lin Li, Shanchen Pang and Cong Liu. A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism
41
Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia. Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices
42
Xianglin Wei, Chao Wang, Xiang Jiao, Qiang Duan and Yongyang Hu. Architecture and Security Analysis of Federated Learning-based Automatic Modulation Classification
43
Terui Mao, Diqun Yan, Yongkang Gong and Rangding Wang. Identification of Synthetic Spoofed Speech with Deep Capsule Network
44
Na Wang, Gaofei Wu, Qiuling Yue and Yuqing Zhang. Research on Security Assessment of Cross Border Data Flow
47
Ming Cheng, Yang Yang, Yingqiu Ding and Weiming Zhang. A privacy-preserving medical image scheme based on secret sharing and reversible data hiding
50
Jiayuan Zhang, Mengyue Feng, Yuhang Huang, Wenjie Wang, Tao Feng and Han Zhang. Survey of 3D Printer Security Offensive and Defensive
53
TZhixuan Gao, Shuang Wang, Yaoling Ding, An Wang and Qingjun Yuan. Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop
54
Hao Peng, Zhen Qian, Ming Zhong, Songyang Wu, Dandan Zhao and Jianming Han. System Security Analysis of Different Link Proportions Between Nodes in The Cyber-Physical System Against Target Attack
60
Ying Li, Mianxue Gu, Hongyu Sun, Yuhao Lin, Qiuling Yue, Zhen Guo and Yuqing Zhang. A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning
62
Hansong Ren, Li Xuejun, Lei Liao, Ou Guoliang, Sun Hongyu and Wu Gaofei. Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports