Title | Authors |
Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model | IP, Cheuk Yu (University of Hong Kong); Li, Frankie (University of Hong Kong); Lam, Yi Anson (University of Hong Kong); Yiu, Siu Ming (University of Hong Kong) |
A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model | Ren, Shuai (Chang’an University); li, yuxiao (Chang’an University); li, bo (Chang’an University); gong, hao (Chang’an University); feng, qiuyu (Chang’an University) |
Point cloud model information hiding algorithm based on multi-scale transformation and composite operator | Ren, Shuai (Chang’anUniversity); Gong, Hao (Chang’an university); Cheng, Huirong (Chang’an University); Cheng, Zejing (Chang’an University) |
Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine Learning | Somers, Bart (University College Dublin); Sayakkara, Asanka (University of Colombo); Hayes, Darren (University College Dublin); Le Khac, Nhien An (University College Dublin) |
Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges | Husak, Martin (Masaryk University); Yang, Shanchieh Jay (Rochester Institute of Technology); Khoury, Joseph (Louisiana State University); Klisura, ÄorÄ‘e (The University of Texas at San Antonio); Bou-Harb, Elias (Louisiana State University) |
A Canary in the Voting Booth: Attacks on a Virtual Voting Machine | Madden, Michael (Rochester Institute of Technology); Szafran, Daniel (Rochester Institute of Technology); Gray, Philomena (Rochester Institute of Technology); Pelletier, Justin (Rochester Institute of Technology); Selker, Ted (Rochester Institute of Technology) |
Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model | IP, Cheuk Yu (University of Hong Kong); Li, Frankie (University of Hong Kong); Lam, Yi Anson (University of Hong Kong); Yiu, Siu Ming (University of Hong Kong) |
ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics | Zhang, Ruipeng (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga) |
A Measurement Study on Interprocess Code Propagation of Malicious Software | Jenke, Thorsten (Fraunhofer FKIE); Liessem, Simon (Fraunhofer FKIE); Padilla, Elmar (Fraunhofer FKIE); Bruckschen, Lilli (Fraunhofer FKIE) |
A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model | Ren, Shuai (Chang’an University); li, yuxiao (Chang’an University); li, bo (Chang’an University); gong, hao (Chang’an University); feng, qiuyu (Chang’an University) |
Point cloud model information hiding algorithm based on multi-scale transformation and composite operator | Ren, Shuai (Chang’anUniversity); Gong, Hao (Chang’an university); Cheng, Huirong (Chang’an University); Cheng, Zejing (Chang’an University) |
AN INFORMATION HIDING ALGORITHM BASED ON MULTI-CARRIER FUSION STATE PARTITIONING OF 3D MODELS | Ren, Shuai (Chang’an University); Li, Bo (Chang’an University); Liu, Shengxia (Chang’an University) |
I’ve Got You, Under My Skin: Biohacking Augmentation Implant Forensics | Seiden, Steven (Louisiana State University); Baggili, Ibrahim (Louisiana State University); Ali-Gombe, Aisha (Louisiana State University) |
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim | Hong, Quan (Institute of Information Engineering, Chinese Academy of Sciences); Li, Jiaqi (Institute of Information Engineering, Chinese Academy of Sciences); Guo, Xizhong (Henan University of Science and Technology); Xie, Pan (China United Network Communications Group Co., Ltd); Zhai, Lidong (Institute of Information Engineering, Chinese Academy of Sciences) |
Decoding HDF5: Machine Learning File Forensics and Data Injection | Walker, Clinton (Louisiana State University); Baggili, Ibrahim (Louisiana State University); Wang, Hao (Louisiana State University) |
XSS vulnerability test enhancement for Progressive Web Applications | PEGUEROLES, JOSEP (UNIVERSITAT POLITĂCNICA DE CATALUNYA) |
Quantum Computing Challenges and Impact on Cyber Security | Hadi, Hassan Jalil (wuhan university) Yue Cao (wuhan university) , Mohammed Ali Alshara (Prince Sultan University) , Naveed Ahmed (Prince Sultan University) , Muhammad Saqib Riaz (Prince Sultan University) and Jun Li (Datang Internet Technology (Wuhan) Co., Ltd and Hubei Engineering Research Center of Industrial Internet Integration Technology) |
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery | Feng, Weimiao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Hu, Rui (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhou, Cong (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yu, Lei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China) |
Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study | Pang, Zeshan (National University of Defense Technology); Sun, Yuyuan (National University of Defense Technology); Guo, Shasha (National University of Defense Technology); Lu, Yuliang (National University of Defense Technology) |
SdShield: Effectively Ensuring Heap Security via Shadow Page Table | Shi, Linong (Zhengzhou University); Hu, Chuanping (Zhengzhou University); Zhuang, Yan (Zhengzhou University); Lu, Yan (Zhengzhou University) |
Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection | Yang, Xiao (Shanghai Jiao Tong University); Li, Gaolei (Shanghai Jiao Tong university); Han, Meng (Zhejiang University) |
Identify Users on Dating Applications: A Forensic Perspective | Le Khac, Nhien An (University College Dublin); Stenzel, Paul (University College Dublin) |
Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review | Mundt, Michael (Esri Deutschland GmbH); Baier, Harald (University of the Bundeswehr Munich, RI CODE) |
APTBert: Abstract Generation and Event Extraction from APT Reports | Zhou, Chenxin (Sichuan University); Huang, Cheng (Sichuan University); Wang, Yanghao (Sichuan University); Zuo, Zheng (Chengdu University of Information Technology) |
Catch Me if You Can: Analysis of Digital Devices & Artifacts Used in Murder Cases | Jankura, John (University of New Haven); Catallo-Stooks, Hannah (University of New Haven); Baggili, Ibrahim (Louisiana State University); Richard III, Golden G (Louisiana State University) |
Power Analysis Attack Based on BS-XGboost Scheme | Li, Yiran (Inner Mongolia University) |
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network | 王, 志强 (北京电ĺ科技ĺ¦é™˘); 王, 卓越 (北京电ĺ科技ĺ¦é™˘); ĺĽ , 颖 (北京电ĺ科技ĺ¦é™˘) |
CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs | Yang, Xubo (Shanghai Jiao Tong University); Li, Linsen (Shanghai Jiao Tong University); Hua, Cunqing (Shanghai Jiao Tong University); Yao, Changhao (Shanghai Jiao Tong University) |
Research on Feature Selection Algorithm of Energy Curve | fan, xiaohong (Beijing Electronic Science and Technology Institute); huang, ye (Beijing Electronic Science and Technology Institute); Wang, Xue (Beijing Electromechanical Engineering Research Institute); nie, ziran (Beijing Electronic Science and Technology Institute); yu, zhenyang (Beijing Electronic Science and Technology Institute); Cheng, Xuhui (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute) |
SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World Leaders | Lin, Qingran (Beijing University of Posts and Telecommunications); Li, Xiang (Beijing University of Posts and Telecommunications); Chu, Beilin (Beijing University of Posts and Telecommunications); Wang, Renying (Beijing University of Posts and Telecommunications); Chen, Xianhao (Beijing University of Posts and Telecommunications); Mao, Yuzhe (Beijing University of Posts and Telecommunications); Yang, Zhen (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications) |
A PUF based Audio Fingerprint Based for Device Authentication and Tamper Location | Lu, Zhi (Huazhong University Of Science And Technology); Dou, Haochen (Huazhong University of Science and Technology); Lu, Songfeng (Huazhong University of Science and Technology); Tang, Xueming (Huazhong University of Science and Technology); Wu, JunJun (Huazhong University of Science and Technology); Umran, Samir Mohammed (Huazhong University of Science and Technology) |
DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection | Hu, Jia (University of Electronic Science and Technology of China); Niu, Weina (University of Electronic Science and Technology of China); Yuan, Qingjun (PLA Strategic Support Force Information Engineering University); Yao, Lingfeng (University of Electronic Science and Technology of China); He, Junpeng (University of Electronic Science and Technology of China); Zhang, Yanfeng (Sichuan Police College); Zhang, Xiaosong (University of Electronic Science and Technology of China) |
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities | Nash, Aleck (University of Texas at San Antonio); Choo, Kim-Kwang Raymond (University of Texas at San Antonio) |
A lightweight and high-precision approach for bulky JavaScript engines fuzzing | lianpei, Zhou (Tsinghua universities) |
Identify Users on Dating Applications: A Forensic Perspective | Le Khac, Nhien An (University College Dublin); Stenzel, Paul (University College Dublin) |
Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study | Pang, Zeshan (National University of Defense Technology); Sun, Yuyuan (National University of Defense Technology); Guo, Shasha (National University of Defense Technology); Lu, Yuliang (National University of Defense Technology) |
Catch Me if You Can: Analysis of Digital Devices & Artifacts Used in Murder Cases | Jankura, John (University of New Haven); Catallo-Stooks, Hannah (University of New Haven); Baggili, Ibrahim (Louisiana State University); Richard III, Golden G (Louisiana State University) |
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery | Feng, Weimiao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Hu, Rui (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhou, Cong (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yu, Lei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China) |
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network | 王, 志强 (北京电ĺ科技ĺ¦é™˘); Zhang, Ying (北京电ĺ科技ĺ¦é™˘); 王, 卓越 (北京电ĺ科技ĺ¦é™˘) |
SdShield: Effectively Ensuring Heap Security via Shadow Page Table | shi, linong (zhengzhou university); hu, chuanping (zhengzhou university); zhuang, yan (zhengzhou university); lu, yan (zhengzhou university) |
Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection | Yang, Xiao (Shanghai Jiao Tong University); Li, Gaolei (Shanghai Jiao Tong university); Han, Meng (Kennesaw State University) |
Power Analysis Attack Based on BS-XGboost Scheme | Li, Yiran (Inner Mongolia University) |
DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection | Hu, Jia (University of Electronic Science and Technology of China); Niu, Weina (University of Electronic Science and Technology of China); Yuan, Qingjun (PLA Strategic Support Force Information Engineering University); Yao, Lingfeng (University of Electronic Science and Technology of China); He, Junpeng (University of Electronic Science and Technology of China); Zhang, Yanfeng (Sichuan Police College); Zhang, Xiaosong (University of Electronic Science and Technology of China) |
APTBert: Abstract Generation and Event Extraction from APT Reports | Zhou, Chenxin (Sichuan University); Huang, Cheng (Sichuan University) |
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities | Nash, Aleck (University of Texas at San Antonio); Choo, Kim-Kwang Raymond (University of Texas at San Antonio) |
CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs | Yang, Xubo (Shanghai Jiao Tong University); Li, Linsen (Shanghai Jiao Tong University); Hua, Cunqing (Shanghai Jiao Tong University); Yao, Changhao (Shanghai Jiao Tong University) |
SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World Leaders | Lin, Qingran (Beijing University of Posts and Telecommunications); Li, Xiang (Beijing University of Posts and Telecommunications); Chu, Beilin (Beijing University of Posts and Telecommunications); Wang, Renying (Beijing University of Posts and Telecommunications); Chen, Xianhao (Beijing University of Posts and Telecommunications); Mao, Yuzhe (Beijing University of Posts and Telecommunications); Yang, Zhen (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications) |
A PUF based Audio Fingerprint Based for Device Authentication and Tamper Location | Lu, Zhi (Huazhong University Of Science And Technology); Dou, Haochen (Huazhong University of Science and Technology); Lu, Songfeng (Huazhong University of Science and Technology); Tang, Xueming (Huazhong University of Science and Technology); Wu, JunJun (Huazhong University of Science and Technology); Umran, Samir Mohammed (Huazhong University of Science and Technology) |
Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review | Mundt, Michael (Esri Deutschland GmbH); Baier, Prof. Harald (UniBW) |
Research on Feature Selection Algorithm of Energy Curve | fan, xiaohong (Beijing Electronic Science and Technology Institute); huang, ye (Beijing Electronic Science and Technology Institute); yu, zhenyang (Beijing Electronic Science and Technology Institute); Cheng, Xuhui (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute) |
Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social | Brown, Joseph (Louisiana State University); Baggili, Ibrahim (Louisiana State University) |
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IR | Yan, Yintong (College of Electronic Engineering, National University of Defense Technology); Yu, Lu (College of Electronic Engineering, National University of Defense Technology); Wang, Taiyan (College of Electronic Engineering, National University of Defense Technology); Li, Yuwei (College of Electronic Engineering, National University of Defense Technology); Pan, Zulie (College of Electronic Engineering, National University of Defense Technology) |
IoT Malicious Traffic Detection based on Federated Learning | Shen, Yi (National University of Defense Technology); Zhang, Yuhan (School of Cyber Science and Engineering, Sichuan University); Li, Yuwei (National University of Defense Technology); Ding, Wanmeng (National University of Defense Technology); Hu, Miao (National University of Defense Technology); Li, Yang (National University of Defense Technology); Huang, Cheng (School of Cyber Science and Engineering Sichuan University,); Wang, Jie (National University of Defense Technology) |
Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial Vehicle | Jamil, Abdul Majid (Wuhan University); Hadi, Hassan Jalil (Wuhan University); Li, Sifan (Wuhan University); Cao, Yue (Wuhan University); Ahmed, Naveed (Prince Sultan University); Hussain, Faisal Bashir (Bahria University); suthaputchakun, chakkaphong (Bangkok University); Wang, Xinyuan (Zhejiang Scientific Research Institute of Transport) |
Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semantics | Nassif, Lilian Noronha (Public Ministry of Minas Gerais); Silva Oliveira, Jonny (Public Ministry of Minas Gerais) |
A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis | Ren, Shuai (Chang’anUniversity); Ma, Liming (Chang’an University); Feng, Qiuyu (Chang’an University) |
Power Analysis Attack Based on GA-based Ensemble Learning | Duan, Xiaoyi (Beijing Electronic Science and Technology Institute); Huang, Ye (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); gu, yu (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Wang, Zunyang (Beijing Electronic Science and Technology Institute); Hu, Ronglei (Beijing Electronic Science and Technology Institute) |
Improvement of An Identity-Based Aggregate Signature Protocol From Lattice | Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yuguang, Yang (Beijing University of Technology) |
Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem) | Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yang, Yang (Beijing University of Technology) |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy | Nash, Aleck (University of Texas at San Antonio); Studiawan, Hudan (Institut Teknologi Sepuluh Nopember); Grispos, George (University of Nebraska-Omaha); Choo, Kim-Kwang Raymond (University of Texas at San Antonio) |
Child Sexual Abuse and Sexually Explicit Material Online During COVID-19: Trends and Prevention Methods | Anillo, Isabelle (Nova Southeastern University); Feldman, David (nova southeastern university); Kennedy, Tom (Nova Southeastern University); Caggiano, Claire (Nova Southeastern University) |
Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social | Brown, Joseph (Louisiana State University); Baggili, Ibrahim (Louisiana State University) |
Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semantics | Nassif, Lilian Noronha (Public Ministry of Minas Gerais) |
IoT Malicious Traffic Detection based on Federated Learning | Shen, Yi (National University of Defense Technology); Zhang, Yuhan (School of Cyber Science and Engineering, Sichuan University); Ding, Wanmeng (National University of Defense Technology); Hu, Miao (National University of Defense Technology); Li, Yang (National University of Defense Technology); Huang, Cheng (School of Cyber Science and Engineering Sichuan University,); Li, Yuwei (National University of Defense Technology) |
Power Analysis Attack Based on GA-based Ensemble Learning | Duan, Xiaoyi (Beijing Electronic Science and Technology Institute); Huang, Ye (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Hu, Ronglei (Beijing Electronic Science and Technology Institute) |
A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis | Ren, Shuai (Chang’anUniversity); Ma, Liming (Chang’an University); Feng, Qiuyu (Chang’an University) |
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IR | Yan, Yintong (College of Electronic Engineering, National University of Defense Technology); Yu, Lu (College of Electronic Engineering, National University of Defense Technology); Wang, Taiyan (College of Electronic Engineering, National University of Defense Technology); Li, Yuwei (College of Electronic Engineering, National University of Defense Technology); Pan, Zulie (College of Electronic Engineering, National University of Defense Technology) |
Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial Vehicle | Jamil, Abdul Majid (Wuhan University); Cao, Yue (Wuhan University); Hadi, Hassan Jalil (Wuhan University) |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy | Nash, Aleck (University of Texas at San Antonio); Studiawan, Hudan (Institut Teknologi Sepuluh Nopember); Grispos, George (University of Nebraska-Omaha); Choo, Kim-Kwang Raymond (University of Texas at San Antonio) |
Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem) | Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yang, Yang (Beijing University of Technology) |
Improvement of An Identity-Based Aggregate Signature Protocol From Lattice | Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yuguang, Yang (Beijing University of Technology) |