Title | Authors |
Child Sexual Abuse and Sexually Explicit Material Online During COVID-19: Trends and Prevention Methods | Anillo, Isabelle (Nova Southeastern University); Feldman, David (nova southeastern university); Kennedy, Tom (Nova Southeastern University); Caggiano, Claire (Nova Southeastern University) |
Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social | Brown, Joseph (Louisiana State University); Baggili, Ibrahim (Louisiana State University) |
Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semantics | Nassif, Lilian Noronha (Public Ministry of Minas Gerais), Jonny Silva de Oliveira (Public Ministry of Minas Gerais) |
IoT Malicious Traffic Detection based on Federated Learning | Shen, Yi (National University of Defense Technology); Zhang, Yuhan (School of Cyber Science and Engineering, Sichuan University); Ding, Wanmeng (National University of Defense Technology); Hu, Miao (National University of Defense Technology); Li, Yang (National University of Defense Technology); Huang, Cheng (School of Cyber Science and Engineering Sichuan University,); Li, Yuwei (National University of Defense Technology |
Power Analysis Attack Based on GA-based Ensemble Learning | Duan, Xiaoyi (Beijing Electronic Science and Technology Institute); Huang, Ye (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Hu, Ronglei (Beijing Electronic Science and Technology Institute) |
A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis | Ren, Shuai (Chang’anUniversity); Ma, Liming (Chang’an University); Feng, Qiuyu (Chang’an University) |
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IR | Yan, Yintong (College of Electronic Engineering, National University of Defense Technology); Yu, Lu (College of Electronic Engineering, National University of Defense Technology); Wang, Taiyan (College of Electronic Engineering, National University of Defense Technology); Li, Yuwei (College of Electronic Engineering, National University of Defense Technology); Pan, Zulie (College of Electronic Engineering, National University of Defense Technology) |
Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial Vehicle | Jamil, Abdul Majid (Wuhan University); Cao, Yue (Wuhan University); Hadi, Hassan Jalil (Wuhan University) |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy | Nash, Aleck (University of Texas at San Antonio); Studiawan, Hudan (Institut Teknologi Sepuluh Nopember); Grispos, George (University of Nebraska-Omaha); Choo, Kim-Kwang Raymond (University of Texas at San Antonio) |
Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem) | Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yang, Yang (Beijing University of Technology) |
Improvement of An Identity-Based Aggregate Signature Protocol From Lattice | Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yuguang, Yang (Beijing University of Technology) |
A lightweight and high-precision approach for bulky JavaScript engines fuzzing | lianpei, Zhou (Tsinghua universities) |
Identify Users on Dating Applications: A Forensic Perspective | Le Khac, Nhien An (University College Dublin); Stenzel, Paul (University College Dublin) |
Multi-task Learning Based Physical Backdoor Attack on Siamese Networks | Pang, Zeshan (National University of Defense Technology); Sun, Yuyuan (National University of Defense Technology); Guo, Shasha (National University of Defense Technology); Lu, Yuliang (National University of Defense Technology) |
Catch Me if You Can: Analysis of Digital Devices & Artifacts Used in Murder Cases | Jankura, John (University of New Haven); Catallo-Stooks, Hannah (University of New Haven); Baggili, Ibrahim (Louisiana State University); Richard III, Golden G (Louisiana State University) |
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery | Feng, Weimiao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Hu, Rui (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhou, Cong (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yu, Lei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China) |
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network | 志强 王, (北京电子科技学院) Ying Zhang (北京电子科技学院) 卓越 王 (北京电子科技学院) |
SdShield: Effectively Ensuring Heap Security via Shadow Page Table | shi, linong (zhengzhou university); hu, chuanping (zhengzhou university); zhuang, yan (zhengzhou university); lu, yan (zhengzhou university) |
Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection | Yang, Xiao (Shanghai Jiao Tong University); Li, Gaolei (Shanghai Jiao Tong university); Han, Meng (Kennesaw State University) |
Power Analysis Attack Based on BS-XGboost Scheme | Li, Yiran (Inner Mongolia University) |
DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection | Hu, Jia (University of Electronic Science and Technology of China); Niu, Weina (University of Electronic Science and Technology of China); Yuan, Qingjun (PLA Strategic Support Force Information Engineering University); Yao, Lingfeng (University of Electronic Science and Technology of China); He, Junpeng (University of Electronic Science and Technology of China); Zhang, Yanfeng (Sichuan Police College); Zhang, Xiaosong (University of Electronic Science and Technology of China) |
APTBert: Abstract Generation and Event Extraction from APT Reports | Zhou, Chenxin (Sichuan University); Huang, Cheng (Sichuan University) |
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities | Nash, Aleck (University of Texas at San Antonio); Choo, Kim-Kwang Raymond (University of Texas at San Antonio) |
CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs | Yang, Xubo (Shanghai Jiao Tong University); Li, Linsen (Shanghai Jiao Tong University); Hua, Cunqing (Shanghai Jiao Tong University); Yao, Changhao (Shanghai Jiao Tong University) |
SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World Leaders | Lin, Qingran (Beijing University of Posts and Telecommunications); Li, Xiang (Beijing University of Posts and Telecommunications); Chu, Beilin (Beijing University of Posts and Telecommunications); Wang, Renying (Beijing University of Posts and Telecommunications); Chen, Xianhao (Beijing University of Posts and Telecommunications); Mao, Yuzhe (Beijing University of Posts and Telecommunications); Yang, Zhen (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications) |
A PUF based Audio Fingerprint Based for Device Authentication and Tamper Location | Lu, Zhi (Huazhong University Of Science And Technology); Dou, Haochen (Huazhong University of Science and Technology); Lu, Songfeng (Huazhong University of Science and Technology); Tang, Xueming (Huazhong University of Science and Technology); Wu, JunJun (Huazhong University of Science and Technology); Umran, Samir Mohammed (Huazhong University of Science and Technology) |
Research on Feature Selection Algorithm of Energy Curve | fan, xiaohong (Beijing Electronic Science and Technology Institute); huang, ye (Beijing Electronic Science and Technology Institute); yu, zhenyang (Beijing Electronic Science and Technology Institute); Cheng, Xuhui (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute) |
Deep CNN and Character Level Embedding for DGA Detection | GregĂłrio, JoĂŁo Rafael (Department of Computing and Statistics, SĂŁo Paulo State University – SĂŁo JosĂ© do Rio Preto – SP – Brazil); Salvadeo, Denis Henrique Pinheiro (Department of Statistics, Applied Mathematics and Computing, SĂŁo Paulo State University – Rio Claro – SP – Brazil); Cansian, Adriano Mauro (Department of Computing and Statistics, SĂŁo Paulo State University, SĂŁo JosĂ© do Rio Preto – SP, Brazil) |
Deep Autoencoder Model for Detecting Malicious URLs in Cybersecurity | Figueiredo, InaĂŞ Soares de (Department of Computing, SĂŁo Paulo State University, Bauru – SP, Brazil); GregĂłrio, JoĂŁo Rafael (Department of Computing and Statistics, SĂŁo Paulo State University, SĂŁo JosĂ© do Rio Preto – SP, Brazil); Souza, Henrique Cesar Marinho de (Department of Computing, SĂŁo Paulo State University, Bauru – SP, Brazil); Costa, Kelton Augusto Pontara da (Department of Computing, SĂŁo Paulo State University, Bauru – SP, Brazil); Cansian, Adriano Mauro (Department of Computing and Statistics, SĂŁo Paulo State University, SĂŁo JosĂ© do Rio Preto – SP, Brazil) |