What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wenyuan Xu
Google Scholar
80
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Imprints: Mitigating Watermark Removal Attacks With Defensive Watermarks.
Xiaofu Chen
Jiangyi Deng
Yanjiao Chen
Chaohao Li
Xin Fang
Cong Liu
Wenyuan Xu
2025
conf/ndss
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
Jiangyi Deng
Xinfeng Li
Yanjiao Chen
Yijie Bai
Haiqin Weng
Yan Liu
Tao Wei
Wenyuan Xu
2025
conf/ndss
BARBIE: Robust Backdoor Detection Based on Latent Separability.
Hanlei Zhang
Yijie Bai
Yanjiao Chen
Zhongming Ma
Wenyuan Xu
2025
conf/ndss
PowerRadio: Manipulate Sensor Measurement via Power GND Radiation.
Yan Jiang
Xiaoyu Ji
Yancheng Jiang
Kai Wang
Chenren Xu
Wenyuan Xu
2025
conf/ndss
GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference.
Yanze Ren
Qinhong Jiang
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/ndss
ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters.
Fengchen Yang
Zihao Dan
Kaikai Pan
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/ndss
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
Zizhi Jin
Qinhong Jiang
Xuancun Lu
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/ndss
LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference.
Fengchen Yang
Wenze Cui
Xinfeng Li
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/uss
Neural Invisibility Cloak: Concealing Adversary in Images via Compromised AI-driven Image Signal Processing.
Wenjun Zhu
Xiaoyu Ji
Xinfeng Li
Qihang Chen
Kun Wang
Xinyu Li
Ruoyan Xu
Wenyuan Xu
2024
journals/tifs
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
Jiangyi Deng
Xiaoyu Ji
Beibei Wang
Bin Wang
Wenyuan Xu
2024
journals/tifs
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification.
Xiaoyu Ji
Qinhong Jiang
Chaohao Li
Zhuoyang Shi
Wenyuan Xu
2024
conf/ccs
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Bo Li
Wenyuan Xu
Jieshan Chen
Yang Zhang
Minhui Xue
Shuo Wang
Guangdong Bai
Xingliang Yuan
2024
conf/ccs
SafeEar: Content Privacy-Preserving Audio Deepfake Detection.
Xinfeng Li
Kai Li
Yifan Zheng
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2024
conf/ccs
Alchemy: Data-Free Adversarial Training.
Yijie Bai
Zhongming Ma
Yanjiao Chen
Jiangyi Deng
Shengyuan Pang
Yan Liu
Wenyuan Xu
2024
conf/ccs
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models.
Xinfeng Li
Yuchen Yang
Jiangyi Deng
Chen Yan
Yanjiao Chen
Xiaoyu Ji
Wenyuan Xu
2024
conf/ccs
Legilimens: Practical and Unified Content Moderation for Large Language Model Services.
Jialin Wu
Jiangyi Deng
Shengyuan Pang
Yanjiao Chen
Jiayang Xu
Xinfeng Li
Wenyuan Xu
2024
conf/sp
Understanding and Benchmarking the Commonality of Adversarial Examples.
Ruiwen He
Yushi Cheng
Junning Ze
Xiaoyu Ji
Wenyuan Xu
2024
conf/sp
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Jiangyi Deng
Shengyuan Pang
Yanjiao Chen
Liangming Xia
Yijie Bai
Haiqin Weng
Wenyuan Xu
2024
conf/ndss
UniID: Spoofing Face Authentication System by Universal Identity.
Zhihao Wu
Yushi Cheng
Shibo Zhang
Xiaoyu Ji
Wenyuan Xu
2024
conf/ndss
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Yan Long
Qinhong Jiang
Chen Yan
Tobias Alam
Xiaoyu Ji
Wenyuan Xu
Kevin Fu
2024
conf/ndss
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Qinhong Jiang
Yanze Ren
Yan Long
Chen Yan
Yumai Sun
Xiaoyu Ji
Kevin Fu
Wenyuan Xu
2024
conf/ndss
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
2024
conf/ndss
CamPro: Camera-based Anti-Facial Recognition.
Wenjun Zhu
Yuan Sun
Jiani Liu
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
2023
conf/ccs
MicPro: Microphone-based Voice Privacy Protection.
Shilin Xiao
Xiaoyu Ji
Chen Yan
Zhicong Zheng
Wenyuan Xu
2023
conf/ccs
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Lingshuo Meng
Yijie Bai
Yanjiao Chen
Yutong Hu
Wenyuan Xu
Haiqin Weng
2023
conf/uss
TPatch: A Triggered Physical Adversarial Patch.
Wenjun Zhu
Xiaoyu Ji
Yushi Cheng
Shibo Zhang
Wenyuan Xu
2023
conf/uss
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Qinhong Jiang
Xiaoyu Ji
Chen Yan
Zhixin Xie
Haina Lou
Wenyuan Xu
2023
conf/uss
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Xinfeng Li
Xiaoyu Ji
Chen Yan
Chaohao Li
Yichen Li
Zhenning Zhang
Wenyuan Xu
2023
conf/uss
CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Shibo Zhang
Yushi Cheng
Wenjun Zhu
Xiaoyu Ji
Wenyuan Xu
2023
conf/uss
VILLAIN: Backdoor Attacks Against Vertical Split Learning.
Yijie Bai
Yanjiao Chen
Hanlei Zhang
Wenyuan Xu
Haiqin Weng
Dou Goodman
2023
conf/uss
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Jiangyi Deng
Yanjiao Chen
Yinan Zhong
Qianhao Miao
Xueluan Gong
Wenyuan Xu
2023
conf/uss
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
Jiangyi Deng
Fei Teng
Yanjiao Chen
Xiaofu Chen
Zhaohui Wang
Wenyuan Xu
2023
conf/sp
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Ruochen Zhou
Xiaoyu Ji
Chen Yan
Yi-Chao Chen
Wenyuan Xu
Chaohao Li
2023
conf/sp
DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Zhihao Wu
Yushi Cheng
Jiahui Yang
Xiaoyu Ji
Wenyuan Xu
2023
conf/sp
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Zizhi Jin
Xiaoyu Ji
Yushi Cheng
Bo Yang
Chen Yan
Wenyuan Xu
2023
conf/sp
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Yan Long
Chen Yan
Shilin Xiao
Shivan Prasad
Wenyuan Xu
Kevin Fu
2023
conf/sp
Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Kai Wang
Shilin Xiao
Xiaoyu Ji
Chen Yan
Chaohao Li
Wenyuan Xu
2023
conf/asiaccs
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities.
Wenyuan Xu
2022
journals/tifs
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
Jiayu Zhang
Min Li
Min-Jian Zhao
Xiaoyu Ji
Wenyuan Xu
2022
conf/ccs
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
Jiangyi Deng
Yanjiao Chen
Wenyuan Xu
2022
conf/uss
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Kai Wang
Richard Mitev
Chen Yan
Xiaoyu Ji
Ahmad-Reza Sadeghi
Wenyuan Xu
2022
conf/uss
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Ruiwen He
Xiaoyu Ji
Xinfeng Li
Yushi Cheng
Wenyuan Xu
2022
conf/uss
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Chen Yan
Zhijian Xu
Zhanyuan Yin
Xiaoyu Ji
Wenyuan Xu
2022
conf/sp
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Yan Jiang
Xiaoyu Ji
Kai Wang
Chen Yan
Richard Mitev
Ahmad-Reza Sadeghi
Wenyuan Xu
2021
conf/ccs
CapSpeaker: Injecting Voices to Microphones via Capacitors.
Xiaoyu Ji
Juchuan Zhang
Shui Jiang
Jishen Li
Wenyuan Xu
2021
conf/ccs
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Yanjiao Chen
Yijie Bai
Richard Mitev
Kaibo Wang
Ahmad-Reza Sadeghi
Wenyuan Xu
2021
conf/uss
mID: Tracing Screen Photos via Moiré Patterns.
Yushi Cheng
Xiaoyu Ji
Lixu Wang
Qi Pang
Yi-Chao Chen
Wenyuan Xu
2021
conf/sp
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Xiaoyu Ji
Yushi Cheng
Yuepeng Zhang
Kai Wang
Chen Yan
Wenyuan Xu
Kevin Fu
2021
conf/ndss
EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Guoming Zhang
Xiaoyu Ji
Xinfeng Li
Gang Qu
Wenyuan Xu
2021
conf/dsn
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Weizhao Jin
Xiaoyu Ji
Ruiwen He
Zhou Zhuang
Wenyuan Xu
Yuan Tian
2021
conf/wisec
OutletSpy: cross-outlet application inference via power factor correction signal.
Juchuan Zhang
Xiaoyu Ji
Yuehan Chi
Yi-Chao Chen
Bin Wang
Wenyuan Xu
2020
conf/sp
SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Chen Yan
Hocheol Shin
Connor Bolton
Wenyuan Xu
Yongdae Kim
Kevin Fu
2020
conf/eurosp
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Karoline Busse
Mohammad Tahaei
Katharina Krombholz
Emanuel von Zezschwitz
Matthew Smith
Jing Tian
Wenyuan Xu
2019
conf/ccs
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Yushi Cheng
Xiaoyu Ji
Juchuan Zhang
Wenyuan Xu
Yi-Chao Chen
2019
conf/ccs
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Chen Yan
Yan Long
Xiaoyu Ji
Wenyuan Xu
2019
conf/ccs
MagAttack: Guessing Application Launching and Operation via Smartphone.
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
Hao Pan
Zhuangdi Zhu
Chuang-Wen You
Yi-Chao Chen
Lili Qiu
2019
conf/sp
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone.
Andrew Kwong
Wenyuan Xu
Kevin Fu
2018
conf/ccs
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Yushi Cheng
Xiaoyu Ji
Tianyang Lu
Wenyuan Xu
2018
conf/ccs
HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Chaohao Li
Xiaoyu Ji
Xinyan Zhou
Juchuan Zhang
Jing Tian
Yanmiao Zhang
Wenyuan Xu
2018
conf/ccs
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Zhou Zhuang
Xiaoyu Ji
Taimin Zhang
Juchuan Zhang
Wenyuan Xu
Zhenhua Li
Yunhao Liu
2018
conf/sp
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Connor Bolton
Sara Rampazzi
Chaohao Li
Andrew Kwong
Wenyuan Xu
Kevin Fu
2017
journals/compsec
Socialized policy administration.
Zeqing Guo
Weili Han
Liangxing Liu
Wenyuan Xu
Minyue Ni
Yunlei Zhao
Xiaoyang Sean Wang
2017
conf/ccs
DolphinAttack: Inaudible Voice Commands.
Guoming Zhang
Chen Yan
Xiaoyu Ji
Tianchen Zhang
Taimin Zhang
Wenyuan Xu
2017
conf/acns
Are You Lying: Validating the Time-Location of Outdoor Images.
Xiaopeng Li
Wenyuan Xu
Song Wang
Xianshan Qu
2017
conf/eurosp
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Timothy Trippel
Ofir Weisse
Wenyuan Xu
Peter Honeyman
Kevin Fu
2017
conf/cns
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.
Yuwei Zheng
Lin Huang
Haoqi Shan
Jun Li
Qing Yang
Wenyuan Xu
2016
journals/tifs
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
Weili Han
Zhigong Li
Lang Yuan
Wenyuan Xu
2016
conf/ccs
On Code Execution Tracking via Power Side-Channel.
Yannan Liu
Lingxiao Wei
Zhe Zhou
Kehuan Zhang
Wenyuan Xu
Qiang Xu
2014
conf/ccs
Detection of On-Road Vehicles Emanating GPS Interference.
Gorkem Kar
Hossen Asiful Mustafa
Yan Wang
Yingying Chen
Wenyuan Xu
Marco Gruteser
Tam Vu
2014
conf/cns
CETAD: Detecting evil twin access point attacks in wireless hotspots.
Hossen Asiful Mustafa
Wenyuan Xu
2014
conf/ndss
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
Sanorita Dey
Nirupam Roy
Wenyuan Xu
Romit Roy Choudhury
Srihari Nelakuditi
2014
conf/dsn
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Hossen Asiful Mustafa
Wenyuan Xu
Ahmad-Reza Sadeghi
Steffen Schulz
2013
conf/uss
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Shane S. Clark
Benjamin Ransford
Amir Rahmati
Shane Guineau
Jacob Sorber
Wenyuan Xu
Kevin Fu
2013
conf/sp
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Denis Foo Kune
John D. Backes
Shane S. Clark
Daniel B. Kramer
Matthew R. Reynolds
Kevin Fu
Yongdae Kim
Wenyuan Xu
2013
conf/esorics
Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Shane S. Clark
Hossen Asiful Mustafa
Benjamin Ransford
Jacob Sorber
Kevin Fu
Wenyuan Xu
2013
conf/ndss
KinWrite: Handwriting-Based Authentication Using Kinect.
Jing Tian
Chengzhang Qu
Wenyuan Xu
Song Wang
2012
conf/ccs
Neighborhood watch: security and privacy analysis of automatic meter reading systems.
Ishtiaq Rouf
Hossen Asiful Mustafa
Miao Xu
Wenyuan Xu
Robert D. Miller
Marco Gruteser
2012
conf/wisec
Tetherway: a framework for tethering camouflage.
Steffen Schulz
Ahmad-Reza Sadeghi
Maria Zhdanova
Hossen Asiful Mustafa
Wenyuan Xu
Vijay Varadharajan
2010
conf/uss
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Ishtiaq Rouf
Robert D. Miller
Hossen Asiful Mustafa
Travis Taylor
Sangho Oh
Wenyuan Xu
Marco Gruteser
Wade Trappe
Ivan Seskar
2008
conf/wisec
Anti-jamming timing channels for wireless networks.
Wenyuan Xu
Wade Trappe
Yanyong Zhang
Coauthors
Ahmad-Reza Sadeghi
(5)
Amir Rahmati
(1)
Andrew Kwong
(2)
Beibei Wang
(1)
Benjamin Ransford
(2)
Bin Wang
(2)
Bo Li
(1)
Bo Yang
(1)
Chaohao Li
(7)
Chen Yan
(23)
Chengzhang Qu
(1)
Chenren Xu
(1)
Chuang-Wen You
(1)
Cong Liu
(1)
Connor Bolton
(2)
Daniel B. Kramer
(1)
Denis Foo Kune
(1)
Dou Goodman
(1)
Emanuel von Zezschwitz
(1)
Fei Teng
(1)
Fengchen Yang
(2)
Gang Qu
(1)
Gorkem Kar
(1)
Guangdong Bai
(1)
Guoming Zhang
(2)
Haina Lou
(1)
Haiqin Weng
(4)
Hanlei Zhang
(2)
Hao Pan
(1)
Haoqi Shan
(1)
Hocheol Shin
(1)
Hossen Asiful Mustafa
(7)
Ishtiaq Rouf
(2)
Ivan Seskar
(1)
Jacob Sorber
(2)
Jiahui Yang
(1)
Jialin Wu
(1)
Jiangyi Deng
(10)
Jiani Liu
(1)
Jiayang Xu
(1)
Jiayu Zhang
(1)
Jieshan Chen
(1)
Jing Tian
(3)
Jishen Li
(1)
John D. Backes
(1)
Juchuan Zhang
(5)
Jun Li
(1)
Junning Ze
(1)
Kai Li
(1)
Kai Wang
(5)
Kaibo Wang
(1)
Kaikai Pan
(1)
Karoline Busse
(1)
Katharina Krombholz
(1)
Kehuan Zhang
(1)
Kevin Fu
(11)
Kun Wang
(1)
Lang Yuan
(1)
Liangming Xia
(1)
Liangxing Liu
(1)
Lili Qiu
(1)
Lin Huang
(1)
Lingshuo Meng
(1)
Lingxiao Wei
(1)
Lixu Wang
(1)
Marco Gruteser
(3)
Maria Zhdanova
(1)
Matthew R. Reynolds
(1)
Matthew Smith
(1)
Miao Xu
(1)
Min Li
(1)
Min-Jian Zhao
(1)
Minhui Xue
(1)
Minyue Ni
(1)
Mohammad Tahaei
(1)
Nirupam Roy
(1)
Ofir Weisse
(1)
Peter Honeyman
(1)
Qi Pang
(1)
Qiang Xu
(1)
Qianhao Miao
(1)
Qihang Chen
(1)
Qing Yang
(1)
Qinhong Jiang
(6)
Richard Mitev
(3)
Robert D. Miller
(2)
Romit Roy Choudhury
(1)
Ruiwen He
(3)
Ruochen Zhou
(1)
Ruoyan Xu
(1)
Sangho Oh
(1)
Sanorita Dey
(1)
Sara Rampazzi
(1)
Shane Guineau
(1)
Shane S. Clark
(3)
Shengyuan Pang
(3)
Shibo Zhang
(3)
Shilin Xiao
(3)
Shivan Prasad
(1)
Shui Jiang
(1)
Shuo Wang
(1)
Song Wang
(2)
Srihari Nelakuditi
(1)
Steffen Schulz
(2)
Taimin Zhang
(2)
Tam Vu
(1)
Tao Wei
(1)
Tianchen Zhang
(1)
Tianyang Lu
(1)
Timothy Trippel
(1)
Tobias Alam
(1)
Travis Taylor
(1)
Vijay Varadharajan
(1)
Wade Trappe
(2)
Weili Han
(2)
Weizhao Jin
(1)
Wenjun Zhu
(4)
Wenyuan Xu
(80)
Wenze Cui
(1)
Xianshan Qu
(1)
Xiaofu Chen
(2)
Xiaopeng Li
(1)
Xiaoyang Sean Wang
(1)
Xiaoyu Ji
(43)
Xin Fang
(1)
Xinfeng Li
(10)
Xingliang Yuan
(1)
Xinyan Zhou
(1)
Xinyu Li
(1)
Xuancun Lu
(2)
Xueluan Gong
(1)
Yan Jiang
(2)
Yan Liu
(2)
Yan Long
(4)
Yan Wang
(1)
Yancheng Jiang
(1)
Yang Zhang
(1)
Yanjiao Chen
(13)
Yanmiao Zhang
(1)
Yannan Liu
(1)
Yanyong Zhang
(1)
Yanze Ren
(2)
Yi-Chao Chen
(5)
Yichen Li
(1)
Yifan Zheng
(1)
Yijie Bai
(7)
Yinan Zhong
(1)
Yingying Chen
(1)
Yongdae Kim
(2)
Yuan Sun
(1)
Yuan Tian
(1)
Yuchen Yang
(1)
Yuehan Chi
(1)
Yuepeng Zhang
(1)
Yumai Sun
(1)
Yunhao Liu
(1)
Yunlei Zhao
(1)
Yushi Cheng
(13)
Yutong Hu
(1)
Yuwei Zheng
(1)
Zeqing Guo
(1)
Zhanyuan Yin
(1)
Zhaohui Wang
(1)
Zhe Zhou
(1)
Zhenhua Li
(1)
Zhenning Zhang
(1)
Zhicong Zheng
(1)
Zhigong Li
(1)
Zhihao Wu
(2)
Zhijian Xu
(1)
Zhixin Xie
(1)
Zhongming Ma
(2)
Zhou Zhuang
(2)
Zhuangdi Zhu
(1)
Zhuoyang Shi
(1)
Zihan Zeng
(1)
Zihao Dan
(1)
Zizhi Jin
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to