Skip to main content
  • Conference proceedings
  • © 2021

Information and Communications Security

23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12918)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2021.

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages i-xxv
  2. Blockchain and Federated Learning

    1. Front Matter

      Pages 1-1
    2. The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity

      • Huimei Liao, Haixia Xu, Peili Li
      Pages 3-21
    3. Rectifying Administrated ERC20 Tokens

      • Nikolay Ivanov, Hanqing Guo, Qiben Yan
      Pages 22-37
    4. Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning

      • Arpan Manna, Harsh Kasyap, Somanath Tripathy
      Pages 38-55
  3. Malware Analysis and Detection

    1. Front Matter

      Pages 57-57
    2. GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector

      • Junnan Wang, Qixu Liu, Chaoge Liu, Jie Yin
      Pages 78-96
    3. Analyzing the Security of OTP 2FA in the Face of Malicious Terminals

      • Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena
      Pages 97-115
  4. IoT Security

    1. Front Matter

      Pages 117-117
    2. Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models

      • Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, Duohe Ma
      Pages 119-135
    3. HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors

      • Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, Ruiying Du
      Pages 136-152
    4. Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution

      • Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu
      Pages 153-168
    5. CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search

      • Shaojiang Deng, Jiaxing Luo, Yantao Li
      Pages 169-186
    6. Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model

      • Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng
      Pages 187-203
    7. EmuIoTNet: An Emulated IoT Network for Dynamic Analysis

      • Qin Si, Lei Cui, Lun Li, Zhenquan Ding, Yongji Liu, Zhiyu Hao
      Pages 224-240
  5. Software Security

    1. Front Matter

      Pages 241-241
    2. ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention

      • Min Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang, Yu Wen
      Pages 243-259
    3. TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing

      • Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen
      Pages 260-275

Other Volumes

  1. Information and Communications Security

About this book

This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part I are organized in the following thematic blocks:​ blockchain and federated learning; malware analysis and detection; IoT security; software security; Internet security; data-driven cybersecurity.

Editors and Affiliations

  • Singapore Management University, Singapore, Singapore

    Debin Gao

  • Tsinghua University, Beijing, China

    Qi Li

  • Xi'an Jiaotong University, Xi'an, China

    Xiaohong Guan

  • Chongqing University, Chongqing, China

    Xiaofeng Liao

Bibliographic Information

  • Book Title: Information and Communications Security

  • Book Subtitle: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I

  • Editors: Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-030-86890-1

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2021

  • Softcover ISBN: 978-3-030-86889-5Published: 17 September 2021

  • eBook ISBN: 978-3-030-86890-1Published: 17 September 2021

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XXV, 483

  • Number of Illustrations: 33 b/w illustrations, 126 illustrations in colour

  • Topics: Data Structures and Information Theory

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access