Session |
Article Id |
Date |
Title/authors/Institution |
PDF |
1A-1 |
1 |
Dec. 19, 2023 09:00 ~ 10:15 |
Optimal Implementation of Quantum Circuits of Core Operations in BIKE Yu-Jin Yang, Kyungbae Jang, Yujin Oh, Se Jin Lim, and Hwajeong Seo Hansung University, South Korea | |
1A-2 |
2 |
Dec. 19, 2023 09:00 ~ 10:15 |
Lattice-based Multi-Entity Identification Protocols Yohei Watanabe1,2, Toi Tomita3, and Junji Shikata3,2 1The University of Electro-Communications, Japan,
2Japan Datacom Co., Ltd., Japan,
3Yokohama National University, Yokohama, Japan | |
1A-3 |
3 |
Dec. 19, 2023 09:00 ~ 10:15 |
Revisiting the algorithms for the quaternion l-isogeny path problems Hyungrok Jo and Junji Shikata Yokohama National University, Japan | |
1A-4 |
4 |
Dec. 19, 2023 09:00 ~ 10:15 |
Privacy-Preserving Encryption of Surveillance Videos supporting Selective Decryption Chan Hyeong Cho, Hyun Min Song, and Taek-Young Youn Dankook University, Yongin, South Korea | |
1B-1 |
5 |
Dec. 19, 2023 09:00 ~ 10:15 |
Lightweight Federated Learning-based Intrusion Detection for the Industrial Internet of Things Sunjin Lee, Chaerim Han, Haeun Lee, Doeun Kim, and Il-Gu Lee Sungshin Women’s University, Seoul, South Korea | |
1B-2 |
6 |
Dec. 19, 2023 09:00 ~ 10:15 |
Memory Efficient Malware Detection Technique Using Binary Classifiers and Optimal Feature Selection Ye-Seul Kil, Yu-Ran Jeon, Sun-Jin Lee, Eui-Jin Kim, and Il-Gu Lee Sungshin Women’s University, Seoul, South Korea | |
1B-3 |
7 |
Dec. 19, 2023 09:00 ~ 10:15 |
One-Class Anomaly Detection Based on Auto-Encoder for Encrypted Network Attack Analysis Min-Gyu Kim and Hwankuk Kim Sangmyung University, South Korea | |
1B-4 |
8 |
Dec. 19, 2023 09:00 ~ 10:15 |
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-based Network Intrusion Detection Systems for DoS Detection in IoT Networks Marek Pawlicki, Rafal Kozik, and Michal Chora´ Bydgoszcz University of Science and Technology, Poland | |
2A-1 |
9 |
Dec. 19, 2023 10:30 ~ 11:40 |
Vectorized Implementation of Crystals-Kyber on NEON extension YoungBeom Kim and Seog Chung Seo Kookmin University, South Korea | |
2A-2 |
10 |
Dec. 19, 2023 10:30 ~ 11:40 |
Optimized Kyber implementation on 16-bit MSP430 Microcontroller Donghyun Shin, YoungBeom Kim, and Seog Chung Seo Kookmin University, South Korea | |
2A-3 |
11 |
Dec. 19, 2023 10:30 ~ 11:40 |
Simulation-based Evaluation of Post-Quantum Algorithm in TLS 1.3 Hyunjun Kim, Siwoo Eum, Song Minho, and Hwajeong Seo Hansung University, South Korea | |
2A-4 |
12 |
Dec. 19, 2023 10:30 ~ 11:40 |
A Novel Framework to Construct Quantum Circuits of S-Boxes : Application to 4-bit S-Boxes Yongjin Jeon, Seungjun Baek, and Jongsung Kim Kookmin University, South Korea | |
2B-1 |
13 |
Dec. 19, 2023 10:30 ~ 11:40 |
Machine learning-based NOMA for Physical Layer Security in Cell-Free Communication Systems Min Jeong Kang1, Jung Hoon Lee1, and Il-Gu Lee2 11Hankuk University of Foreign Studies, South Korea,
2Sungshin Women’s University, South Korea | |
2B-2 |
14 |
Dec. 19, 2023 10:30 ~ 11:40 |
An Approach to Detect Illegal Online Gambling Using Generative AI Sooyon Seo, Jaeho Hwang, and Moohong Min Sungkyunkwan University, South Korea | |
2B-3 |
15 |
Dec. 19, 2023 10:30 ~ 11:40 |
Integrating Machine Learning models into the Linux Kernel: Opportunities and Challenges Jorge Gallego-Madrid, Irene Bru-Santa, Ramon Sanchez-Iborra, and Antonio Skarmeta Gomez Murcia University, Spain | |
2B-4 |
16 |
Dec. 19, 2023 10:30 ~ 11:40 |
Proposal of Dynamic Critical Line Algorithm by Real-time Monitoring with IoT sensors for Early Weather Warning System Noriki Uchida1, Tomoyuki Ishida1, Hiroaki Yuze2, and Yoshitaka Shibata3 1Fukuoka Institute of Technology, Japan.
2Shizuoka Prefectural University, Japan.
3Iwate Prefectural University, Japan. | |
3A-1 |
17 |
Dec. 20, 2023 09:00 ~ 10:15 |
GDN-based Time Series Anomaly Detection using Time Series Clustering Mingyu Lee , Seungho Jeon, and Jungtaek Seo Gachon University, South Korea | |
3A-2 |
18 |
Dec. 20, 2023 09:00 ~ 10:15 |
Adversarial Patch Attack on Person Detection and Countermeasure Using Input Channel Diversification Seongyeol Lee, Seongwoo Hong, and Jaecheol Ha Hoseo University, South Korea | |
3A-3 |
19 |
Dec. 20, 2023 09:00 ~ 10:15 |
Enhancing Privacy through Federated Learning of NWDAF using SGX: Anomaly Detection in 5G MEC Jiwon Ock and Seongmin Kim Sungshin Women’s University, South Korea | |
3A-4 |
20 |
Dec. 20, 2023 09:00 ~ 10:15 |
A Study on IIoT Datasets and Machine Learning Classifiers for Malicious Traffic Classification in IIoT Environments GyuHyun Jeon, Ilhwan Ji, Seungho Jeon, and Jungtaek Seo Gachon University, South Korea | |
3B-1 |
21 |
Dec. 20, 2023 09:00 ~ 10:15 |
Hybrid Interaction Aware Model for Surrounding Vehicle Behaviour Prediction using Bi-LSTM for Autonomous Driving Syama R and Mala C National Institute of Technology, India | |
3B-2 |
22 |
Dec. 20, 2023 09:00 ~ 10:15 |
Smart Cooperative Routing for Computing Power Service in Financial Computing Network Guoqing Dong, Tianhao Peng, Qixuan Zhang, and Huizhi Wang Beijing Jiao Tong University, Beijing, China | |
3B-3 |
23 |
Dec. 20, 2023 09:00 ~ 10:15 |
A Semantic-rich Identifier Mapping Management Mechanism for Personalized Application Jiapeng Jiang, Jianfeng Guan, Jianbang Chen, and Kexian Liu Beijing University of Posts and Telecommunications, China | |
3B-4 |
24 |
Dec. 20, 2023 09:00 ~ 10:15 |
A Multi-level Wavelet-based Time Series Approach for Network Traffic Prediction Liu Si-yuan, He Qian, Liu Peng, and Zhang Fan Guilin University of Electronic Technology, China | |
4A-1 |
25 |
Dec. 20, 2023 10:30 ~ 11:40 |
Generating Anomaly Data for ICS Environments: Comparative Study JuHyeon Lee, Ilhwan JI, Seungho Jeon, and Jungtaek Seo Gachon University, South Korea | |
4A-2 |
26 |
Dec. 20, 2023 10:30 ~ 11:40 |
Fault Injection Attacks Using Clock Glitch Against Deep Neural Networks and Their Countermeasures Seongwoo Hong, Hyojoo Kang, Youngjoo Lee, and Jaecheol Ha Hoseo University, South Korea | |
4A-3 |
27 |
Dec. 20, 2023 10:30 ~ 11:40 |
Identifying Internet of Things Devices Using Machine Learning Based on Encrypted Traffic Data Seung-Ju Han, Dong-Hyuk Shin, Yu-Bin Kim, Jong-Bum Lee, and Ieck-Chae Euom Chonnam National University, South Korea | |
4A-4 |
28 |
Dec. 20, 2023 10:30 ~ 11:40 |
Cyber Attack and Defense Strategies using Reinforcement Learning via Simulated Network Environment Bum-Sok Kim, Hye-Won Suk, Jung-Hyun Kim, Jae-Hyeok Jeong, and Min-Suk Kim Sangmyung University, South Korea | |
4B-1 |
29 |
Dec. 20, 2023 10:30 ~ 11:40 |
Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing Yinjie Song, Hongge Li, and Yuhao Chen Beihang University, China | |
4B-2 |
30 |
Dec. 20, 2023 10:30 ~ 11:40 |
An Overview on Open-RAN Security: Issues, Requirements, Discussions Heejae Park1, Seonghyeon So1, Woongsoo Na2, Wonseok Choi3, and Laihyuk Park1 1Seoul National University of Science and Technology, South Korea
2Kongju National University, South Korea
3Telecommunications Technology Association, South Korea | |
4B-3 |
31 |
Dec. 20, 2023 10:30 ~ 11:40 |
Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR Ying Wang1, Qiang Wang1, Zhifan Huang1, Fucai Zhou1, Changsheng Zhang1, and Che Bian2 1Software College, Northeastern University, China
2The Fourth Affiliated Hospital, China Medical University, China | |
4B-4 |
32 |
Dec. 20, 2023 10:30 ~ 11:40 |
Universal receptor for chaotic cryptosystems based on Chua’s circuit in embedded mobile devices Borja Bordel and Ram´on Alcarria Universidad Polit´ecnica de Madrid, Spain | |
5A-1 |
33 |
Dec. 20, 2023 13:15 ~ 14:30 |
Symmetric Encryption Key Generation Method with Approximate Computation Kun-Lin Tsai1, Feng-Yi Leu2, Chi-Hung Lo1, Li-Woei Chen2, and Jin-Wei Ye1 1Tunghai University, Taiwan
2Chinese Military Academy, Taiwan | |
5A-2 |
34 |
Dec. 20, 2023 13:15 ~ 14:30 |
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE Hongxiao Wang1, Zoe L. Jiang2,3, Yanmin Zhao1, Siu-Ming Yiu1, Peng Yang2, Man Chen4, Zejiu Tan2, and Bohan Jin2 1University of Hong Kong, Hong Kong, China
2Harbin Institute of Technology, China
3Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China
4Shandong University, China | |
5A-3 |
35 |
Dec. 20, 2023 13:15 ~ 14:30 |
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping Itsuki Maebayashi1, Yuki Takeuchi1, Md. Arshad Ali2, Yasuyuki Nogami1, and Yuta Kodera1 1Okayama University, Japan
2Hajee Mohammad Danesh Science and Technology University, Bangladesh | |
5A-4 |
36 |
Dec. 20, 2023 13:15 ~ 14:30 |
Deep Learning-Based Neural Distinguisher for Format-Preserving Encryption Scheme FF3 Dukyoung Kim, Hyunji Kim, Kyungbae Jang, and Hwajeong Seo Hansung University, South Korea | |
5B-1 |
37 |
Dec. 20, 2023 13:15 ~ 14:30 |
A Study on 5GNR Based False Base Station Detection Technology Kisoon Sung, Hyungdeug Bae, Yousun Hwang, Jisoo Shin, Sungmin Oh, and Jong-Geun Park Electronics and Telecommunications Research Institute(ETRI), South Korea | |
5B-2 |
38 |
Dec. 20, 2023 13:15 ~ 14:30 |
A Novel Tracked Threat to 5G and Beyond AKA Protocol Zhiwei Cui, Baojiang Cui, Jie Xu, and Junsong Fu Beijing University of Posts and Telecommunications, China | |
5B-3 |
39 |
Dec. 20, 2023 13:15 ~ 14:30 |
Fake Base Detection and Localization in 5G Network: A Proof of Concept Danmarl Butad1, Steven Matthew Tao1, Harlee Tudtud1, Alvin Joseph
Macapagal1, Philip Virgil Astillo1, Gaurav Choudhary2, and Nicola Dragoni2 1San Carlos University, Philippines
2Denmark Technical University(DTU), Denmark | |
5B-4 |
40 |
Dec. 20, 2023 13:15 ~ 14:30 |
Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing Yaozhang Zhong, Yingkui Du, Jing Zhao, Qinghang Gao, Yujuan
Zou, Yong Luo, Kailin Chao and Ziyu Yin Jiangxi Normal University, China. | |
6A-1 |
41 |
Dec. 20, 2023 14:45 ~ 16:15 |
A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption Cheng-Jhih Shih1, Shih-Hao Hung1,2,3,, Ching-Wen Chen1, Chiy-Ferng Perng4, Meng-Chao Kao4, Chi-Sheng Shih1,3, and Tei-Wei Kuo1,2,3 1National Taiwan University, Taipei, Taiwan.
2Mohamed bin Zayed University of Artificial Intelligence, UAE.
3Nanyang Technological University(NTU), Singapore
4Wistron Corporation, Taiwan | |
6A-2 |
42 |
Dec. 20, 2023 14:45 ~ 16:15 |
Power consumption analysis of cryptographic algorithms Wonseok Choi1, Laihyuk Park2, Youngjin Kim1, and Junsi Jeong1 1Telecommunications Technology Association(TTA), South Korea
2Seoul National University of Science and Technology, South Korea | |
6A-3 |
43 |
Dec. 20, 2023 14:45 ~ 16:15 |
Generic Construction of Forward-Secure Chameleon Hash Function Pengxuan Wei1, Koki Matsubara1, Atsuko Miyaji1, and Yangguang Tian2 1Osaka University, Osaka, Japan
2Surrey University, U.K. | |
6A-4 |
44 |
Dec. 20, 2023 14:45 ~ 16:15 |
Privacy Preserving Decentralized Swap Derivative Leveraging Blockchain Technology and Cryptographic Primitives Gayathri V, Kunwar Singh, and Karthik Narayan V V National Institute of Technology, India | |
6A-5 |
45 |
Dec. 20, 2023 14:45 ~ 16:15 |
Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li The University of Electro-Communications, Japan | |
6B-1 |
46 |
Dec. 20, 2023 14:45 ~ 16:15 |
Your App's Account is not Secure: Identifying Implementation Flaws of SMS OTP Authentication Jiayu Zhao1, Yiyu Yang1, Fannv He1, and Yuqing Zhang1,2,3 1University of Chinese Academy of Sciences, China
2Hainan University, China
3Xidian University, China | |
6B-2 |
47 |
Dec. 20, 2023 14:45 ~ 16:15 |
Measuring the leakage of sensitive data in Wechat mini-programs communication traffic Yuhang Huang1, Xiaoqi Zhang 1,2, and Yuqing Zhang1,2,3 1University of Chinese Academy of Sciences, China
2Hangzhou Institute of Technology of Xidian University, China
3Hainan University, China | |
6B-3 |
48 |
Dec. 20, 2023 14:45 ~ 16:15 |
A Programmable Switch Based Detection of DDoS Attacks Intelligent Network Element Realization Jingfu Yan, Weilin Wang, and Huachun Zhou Beijing Jiaotong University, China | |
6B-4 |
49 |
Dec. 20, 2023 14:45 ~ 16:15 |
An intelligent next-generation traffic filter for large containerized distributed applications Borja Bordel , Ram´on Alcarria , and Calimanut-Ionut Cira adrid Universidad Polit´ecnica de Madrid, Spain | |
7-1 |
50 |
Dec. 20, 2023 16:30 ~ 18:00 |
Secure deployment of third-party applications over 5G-NFV ML-empowered infrastructures Ana Hermosilla1, Jose Manuel Manj´on-C´aliz2, Pedro Martinez-Julia3, Antonio Pastor2, Jordi Ortiz4, Diego R. Lopez2, and Antonio Skarmeta1 1University of Murcia, Spain
2Telef´onica I+D, Spain
3National Institute of Information and Communications Technology, Japan
4University Center of Defense at the Spanish Air Force Academy, Spain | |
7-2 |
51 |
Dec. 20, 2023 16:30 ~ 18:00 |
Analysis of Cloud Migration Trends and Security Threats in the South Korean Financial Sector Daemin Shin1, Jiyoon Kim2, and Ilsun You3 1Financial Security Institute, South Korea
2Gyeongsang National Univeristy, South Korea
3Kookmin University, South Korea | |
7-3 |
52 |
Dec. 20, 2023 16:30 ~ 18:00 |
Formal Verification of 5GAKA-LCCO protocol supporting Forward Secrecy: Based on enhanced BAN Logic Gunwoo Kim, Yongho Ko, and Ilsun You Kookmin University, South Korea | |
7-4 |
53 |
Dec. 20, 2023 16:30 ~ 18:00 |
A ML based downlink scheduling for multiple traffics in 5G NR systems Fang-Yie Leu1, Kun-Lin Tsai1, Heru Susanto2,3, and Jung-Chun Liu1 1Thunghai University, Taiwan
2University Technology of Brunei, Brunei
3Research Center for Informatics, The Indonesia Institute of Sciences, Indonesia | |
7-5 |
54 |
Dec. 20, 2023 16:30 ~ 18:00 |
Network Slicing Handover Authentication: A Hyperledger Fabric-Driven Privacy and Security Solution Etienne Igugu Tshisekedi, Cho Nwe Zin Latt, Muhammad Firdaus, and Kyung-Hyune Rhee Pukyong National University, South Korea | |
8A-1 |
55 |
Dec. 21, 2023 09:00 ~ 10:15 |
Verification of Learning Effects in Online Classes Using Real-Time Video Avatar Conferencing System Momoka Hagihara and Tomoyuki Ishida Fukuoka Institute of Technology, Japan | |
8A-2 |
56 |
Dec. 21, 2023 09:00 ~ 10:15 |
The Car is safe: A Fast and Accurate Experimental Pressure-based Authentication System for Identifying Car Drivers Mohsen Ali Alawami, Dahyun Jung, Yewon Park, Yoonseo Ku, Gyeonghwan Choi, and Ki-Woong Park Sejong University, South Korea | |
8A-3 |
57 |
Dec. 21, 2023 09:00 ~ 10:15 |
Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities Osama Ahmed and Hiroshi Kamabe Gifu University, Japan | |
8A-4 |
58 |
Dec. 21, 2023 09:00 ~ 10:15 |
Dark web author group identification using Authorship Attribution and LDA Gun-Yoon Shin1, Dong Wook Kim1, Younghoan Jang1, SungJin Park2, A-
ran Park2, younghwan Kim2, and Myung-Mook Han1 1Gachon University, South Korea.
2LIG Nex1, South Korea. | |
8B-1 |
59 |
Dec. 21, 2023 09:00 ~ 10:15 |
A Biometric-based Data Protection Scheme for Removable Storage Devices Rui Wu1, Yubing Jiang2, and Peisong Shen2 1Beijing University of Civil Engineering and Architecture, China
2Institute of Information Engineering, Chinese Academy of Sciences, China | |
8B-2 |
60 |
Dec. 21, 2023 09:00 ~ 10:15 |
Few-shot and Multi-biometrics for Management Identification in Energy Industry JunHo Yoon, Sokjoon Lee, and Chang Choi Gachon University, South Korea | |
8B-3 |
61 |
Dec. 21, 2023 09:00 ~ 10:15 |
A Hybrid Residual Neural Network with Attention Mechanism for Activity-based User Identification Using Smartwatch Sensors Sakorn Mekruksavanich1 and Anuchit Jitpattanakul2 1University of Phayao, Thailand
2King Mongkut’s University of Technology North Bangkok, Thailand | |
8B-4 |
62 |
Dec. 21, 2023 09:00 ~ 10:15 |
Anonymous drone swarm identification considering dynamic flight plan Soojin Lee1 and Seunghyun Seo2 1Hanyang University, South Korea
2Hanyang University ERICA, South Korea | |
9A-1 |
63 |
Dec. 21, 2023 10:30 ~ 11:45 |
Improving Host-based Intrusion Detection by Enhanced Contextual Information in Containers Linh Nguyen-Thuy, Long Nguyen-Vu, and Souhwan Jung Soongsil University, South Korea | |
9A-2 |
64 |
Dec. 21, 2023 10:30 ~ 11:45 |
Research Directions in Formal Verification of Network Configurations toward Verification of Mobile Networks Hideki Sakurada1,2 and Kouichi Sakurai2,3 1Nippon Telegraph and Telephone Corporation, Japan
2Kyushu University, Japan
3Advanced Telecommunications Research Institute International, Japan | |
9A-3 |
65 |
Dec. 21, 2023 10:30 ~ 11:45 |
Research on a Generative Adversarial Network Based Framework for Cyber Training Network Generation Dong-Wook KiM1, Gun-Yoon-Shin1, Younghoan Jang1, Seungjae Cho2, Kwangsoo Kim2, Jaesik Kang2, and Myung-Mook Han1 1Gachon University, South Korea.
2LIG Nex1, South Korea. | |
9A-4 |
66 |
Dec. 21, 2023 10:30 ~ 11:45 |
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare : A Brief Survey and Analysis Seongmin Park1, Myeongsu Lee2, Sarang Na1 , and Joonhyung Lim1 1Korea Internet & Security Agency, South Korea
2AhnLab, South Korea | |
9B-1 |
67 |
Dec. 21, 2023 10:30 ~ 11:45 |
Revisiting an Extension of Kannan’s Embedding for Ring-LWE Satoshi Uesugi, Shinya Okumura, and Atsuko Miyaji Osaka University, Japan | |
9B-2 |
68 |
Dec. 21, 2023 10:30 ~ 11:45 |
Memory and Performance Analysis of YOLOv7 with Post Training Quantization for Security Edge Devices Yun-Wei Lin and Jhih-Hong Shen National Yang Ming Chiao Tung University, Taiwan | |
9B-3 |
69 |
Dec. 21, 2023 10:30 ~ 11:45 |
VirtualHideDroid: User data anonymization through virtualization techniques Francesco Pagano1, Antonio Ruggia1, Luca Verderame1, and Alessio Merlo2 1Università degli Studi di Genova, Italy
2Centre for Advanced Defense Studies, Italy | |
9B-4 |
70 |
Dec. 21, 2023 10:30 ~ 11:45 |
A Cross-Domain Secure Data Trading Framework Based on Blockchain-Cloud Fusion Youngho Park, Sang Ukshin, Sujin Shin, and Yehyeon Park Pukyong National University, South Korea | |