- A Presentation Generation Method Combining Topic Segmentation and Text Summarization
Xin Wang (Beijing Information Science and Technology University); Ning Li (Beijing Information Science and Technology University, China)
- Measuring Encrypted DNS Service with TLS1.3 Support over IPv6
Liang Jiao (Chinese Academy of Sciences, China); Li Jianqiang (Beijing University of Posts and Telecommunications, China); Wenxiu Zhang (University of Jinan, China); Tianyu Cui (Zhongguancun Laboratory, China); Yi Zhou (CNCERT/CC, China); Yujia Zhu (Chinese Academy of Sciences, China); Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences, China)
- Enhancing Coverage in Stateful Protocol Fuzzing via Value-Based Selection
Laile Xi (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China); Heng Zhang (CAS, China); Shenghao Lin (CAS, Korea (South)); Weidong Zhang and Yuyan Sun (Chinese Academy of Sciences, China); Hongsong Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China); Limin Sun (Institute of Information Engineering, China Academy of Science, Beijing, China)
- NuanceTracker: A Website Fingerprinting Attack Against Tor Hidden Services Through Burst Patterns
Yuwei Xu, Jianfeng Li, Yujie Hou and Lei Wang (Southeast University, China); Kehui Song (Tiangong University, China); Guang Cheng (Southeast University, China)
- Trade-Off Performance Analysis of Radcom Using the Relative Entropy
Yousef Kloob and Mohammad Ahmad Al-Jarrah, Sr. (University of Manchester, United Kingdom (Great Britain)); Emad Alsusa (Manchester University, United Kingdom (Great Britain)); Christos Masouros (University College London, United Kingdom (Great Britain))