Jump to the main content block

AsiaJCIS2024

:::

Accepted Papers

Regular papers(page limit 8 pages): 14 papers

  • An Identity Management System using Group Signatures with Message-Dependent Opening
    Yuto Imura and Keita Emura

  • Bit-Based MILP Modelling of Non-Bit-Permutation Linear Layers for Linear Cryptanalysis
    Abhilash Das

  • Linear Retention Convolutional Network for Few-shot Network Threat Detection
    Yong Ding, Zhi Li, Changsong Yang, Hai Liang, Siyuan Jia and Zhenyu Li

  • ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications
    Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi Yuan Liu and You-Qian Chen

  • Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authentication Key Exchange Protocol Using Bi-ISIS
    Hao-Yi Hsu, Hsin-Yi Lin, Rayling Tso, Tao-Hsiang Chang and Jen-Chieh Hsu

  • A Study of Fully Homomorphic Encryption with Evaluation Control
    Kenneth-Kuan-Phing Ong, Bo-Yu Chen, Po-Wen Chi and Chao Wang

  • Evading IoT Intrusion Detection Systems with GAN
    Mariama Mbow, Rodrigo Román, Takeshi Takahashi and Kouichi Sakurai

  • An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
    Chao Fei, Nian Xia, Pang-Wei Tsai, Yang Lu, Xiaonan Pan and Junli Gong

  • Pairing based Multisignature with Message Flexibility
    Kodai Hayashida and Atsuko Miyaji

  • Secure and Portable Anonymous Credentials without Tamper-Resistant Hardware
    Tianshu Yu and Kunpeng Bai

  • Proposal for Key-Value Commitments with offline batch update
    Toshiyuki Mineta, Atsuko Miyaji and Hideaki Miyaji

  • Consideration on Defining Field for Efficient Ring-LWE
    Rintaro Yamada, Shinya Okumura and Atsuko Miyaji

  • Backdoored-input Detection by Trigger Embedding
    Akira Fujimoto, Shintaro Yamashita, Yuntao Wang and Atsuko Miyaji

  • Color Image Steganography with Authentication via Scalable Index Encoding
    Min-Yu Liang, Yun-Chieh Chang and Jason Lin

 

Short papers(page limit 6 pages): 7 papers

  • A Pull Firmware Update Mechanism for Industrial Control Based on IOTA Stream
    Iuon-Chang Lin and Ling Bo

  • Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data
    Chia-Mei Chen, Chi-Hsuen Hsu, Zheng-Xun Cai, Gu-Hsin Lai and Ya-Hui Ou

  • The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples
    Shuhei Ippa, Takao Okubo and Masaki Hashimoto

  • Pairing-Free Identity-Based Encryption with Security Against the KGC
    Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang and Yu-Hsuan Chang

  • Security requirements for fully automated AI systems to exercise and ensure the rights of data subjects
    Junhyung Park, Gunsang You, Yeontae Ji and Heung Youl Youm

  • CCADM: a Continuous Collection scheme for Anonymous Data Management
    Yun-Hsin Chuang, Po-Wen Chi and Ming-Hung Wang

  • Adaptive Machine Learning Model For Dynamic Field Selection
    Yu Chi Lin and Po-Wen Chi