Accepted papers

TitleAuthors
Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT ModelIP, Cheuk Yu (University of Hong Kong); Li, Frankie (University of Hong Kong); Lam, Yi Anson (University of Hong Kong); Yiu, Siu Ming (University of Hong Kong)
A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud ModelRen, Shuai (Chang’an University); li, yuxiao (Chang’an University); li, bo (Chang’an University); gong, hao (Chang’an University); feng, qiuyu (Chang’an University)
Point cloud model information hiding algorithm based on multi-scale transformation and composite operatorRen, Shuai (Chang’anUniversity); Gong, Hao (Chang’an university); Cheng, Huirong (Chang’an University); Cheng, Zejing (Chang’an University)
Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine LearningSomers, Bart (University College Dublin); Sayakkara, Asanka (University of Colombo); Hayes, Darren (University College Dublin); Le Khac, Nhien An (University College Dublin)
Unraveling Network-based Pivoting Maneuvers: Empirical Insights and ChallengesHusak, Martin (Masaryk University); Yang, Shanchieh Jay (Rochester Institute of Technology); Khoury, Joseph (Louisiana State University); Klisura, Đorđe (The University of Texas at San Antonio); Bou-Harb, Elias (Louisiana State University)
A Canary in the Voting Booth: Attacks on a Virtual Voting MachineMadden, Michael (Rochester Institute of Technology); Szafran, Daniel (Rochester Institute of Technology); Gray, Philomena (Rochester Institute of Technology); Pelletier, Justin (Rochester Institute of Technology); Selker, Ted (Rochester Institute of Technology)
Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT ModelIP, Cheuk Yu (University of Hong Kong); Li, Frankie (University of Hong Kong); Lam, Yi Anson (University of Hong Kong); Yiu, Siu Ming (University of Hong Kong)
ForensiQ: A Knowledge Graph Question Answering System for IoT ForensicsZhang, Ruipeng (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)
A Measurement Study on Interprocess Code Propagation of Malicious SoftwareJenke, Thorsten (Fraunhofer FKIE); Liessem, Simon (Fraunhofer FKIE); Padilla, Elmar (Fraunhofer FKIE); Bruckschen, Lilli (Fraunhofer FKIE)
A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud ModelRen, Shuai (Chang’an University); li, yuxiao (Chang’an University); li, bo (Chang’an University); gong, hao (Chang’an University); feng, qiuyu (Chang’an University)
Point cloud model information hiding algorithm based on multi-scale transformation and composite operatorRen, Shuai (Chang’anUniversity); Gong, Hao (Chang’an university); Cheng, Huirong (Chang’an University); Cheng, Zejing (Chang’an University)
AN INFORMATION HIDING ALGORITHM BASED ON MULTI-CARRIER FUSION STATE PARTITIONING OF 3D MODELSRen, Shuai (Chang’an University); Li, Bo (Chang’an University); Liu, Shengxia (Chang’an University)
I’ve Got You, Under My Skin: Biohacking Augmentation Implant ForensicsSeiden, Steven (Louisiana State University); Baggili, Ibrahim (Louisiana State University); Ali-Gombe, Aisha (Louisiana State University)
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSimHong, Quan (Institute of Information Engineering, Chinese Academy of Sciences); Li, Jiaqi (Institute of Information Engineering, Chinese Academy of Sciences); Guo, Xizhong (Henan University of Science and Technology); Xie, Pan (China United Network Communications Group Co., Ltd); Zhai, Lidong (Institute of Information Engineering, Chinese Academy of Sciences)
Decoding HDF5: Machine Learning File Forensics and Data InjectionWalker, Clinton (Louisiana State University); Baggili, Ibrahim (Louisiana State University); Wang, Hao (Louisiana State University)
XSS vulnerability test enhancement for Progressive Web ApplicationsPEGUEROLES, JOSEP (UNIVERSITAT POLITÈCNICA DE CATALUNYA)
Quantum Computing Challenges and Impact on Cyber SecurityHadi, Hassan Jalil (wuhan university)  Yue Cao (wuhan university) , Mohammed Ali Alshara (Prince Sultan University) , Naveed Ahmed (Prince Sultan University) ,  Muhammad Saqib Riaz (Prince Sultan University) and Jun Li (Datang Internet Technology (Wuhan) Co., Ltd and Hubei Engineering Research Center of Industrial Internet Integration Technology)
DynVMDroid: Android App Protection via Code Disorder and Dynamic RecoveryFeng, Weimiao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Hu, Rui (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhou, Cong (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yu, Lei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Backdoor Learning on Siamese Networks using
Physical Triggers: FaceNet as a Case Study
Pang, Zeshan (National University of Defense Technology); Sun, Yuyuan (National University of Defense Technology); Guo, Shasha (National University of Defense Technology); Lu, Yuliang (National University of Defense Technology)
SdShield: Effectively Ensuring Heap Security via Shadow Page TableShi, Linong (Zhengzhou University); Hu, Chuanping (Zhengzhou University); Zhuang, Yan (Zhengzhou University); Lu, Yan (Zhengzhou University)
Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime DetectionYang, Xiao (Shanghai Jiao Tong University); Li, Gaolei (Shanghai Jiao Tong university); Han, Meng (Zhejiang University)
Identify Users on Dating Applications: A Forensic PerspectiveLe Khac, Nhien An (University College Dublin); Stenzel, Paul (University College Dublin)
Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, ReviewMundt, Michael (Esri Deutschland GmbH); Baier, Harald (University of the Bundeswehr Munich, RI CODE)
APTBert: Abstract Generation and Event Extraction from APT ReportsZhou, Chenxin (Sichuan University); Huang, Cheng (Sichuan University); Wang, Yanghao (Sichuan University); Zuo, Zheng (Chengdu University of Information Technology)
Catch Me if You Can: Analysis of Digital Devices & Artifacts Used in Murder CasesJankura, John (University of New Haven); Catallo-Stooks, Hannah (University of New Haven); Baggili, Ibrahim (Louisiana State University); Richard III, Golden G (Louisiana State University)
Power Analysis Attack Based on BS-XGboost SchemeLi, Yiran (Inner Mongolia University)
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network王, 志强 (北京电子科技学院); 王, 卓越 (北京电子科技学院); ĺĽ , 颖 (北京电子科技学院)
CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNsYang, Xubo (Shanghai Jiao Tong University); Li, Linsen (Shanghai Jiao Tong University); Hua, Cunqing (Shanghai Jiao Tong University); Yao, Changhao (Shanghai Jiao Tong University)
Research on Feature Selection Algorithm of Energy Curvefan, xiaohong (Beijing Electronic Science and Technology Institute); huang, ye (Beijing Electronic Science and Technology Institute); Wang, Xue (Beijing Electromechanical Engineering Research Institute); nie, ziran (Beijing Electronic Science and Technology Institute); yu, zhenyang (Beijing Electronic Science and Technology Institute); Cheng, Xuhui (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)
SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World LeadersLin, Qingran (Beijing University of Posts and Telecommunications); Li, Xiang (Beijing University of Posts and Telecommunications); Chu, Beilin (Beijing University of Posts and Telecommunications); Wang, Renying (Beijing University of Posts and Telecommunications); Chen, Xianhao (Beijing University of Posts and Telecommunications); Mao, Yuzhe (Beijing University of Posts and Telecommunications); Yang, Zhen (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications)
A PUF based Audio Fingerprint Based for Device Authentication and Tamper LocationLu, Zhi (Huazhong University Of Science And Technology); Dou, Haochen (Huazhong University of Science and Technology); Lu, Songfeng (Huazhong University of Science and Technology); Tang, Xueming (Huazhong University of Science and Technology); Wu, JunJun (Huazhong University of Science and Technology); Umran, Samir Mohammed (Huazhong University of Science and Technology)
DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic DetectionHu, Jia (University of Electronic Science and Technology of China); Niu, Weina (University of Electronic Science and Technology of China); Yuan, Qingjun (PLA Strategic Support Force Information Engineering University); Yao, Lingfeng (University of Electronic Science and Technology of China); He, Junpeng (University of Electronic Science and Technology of China); Zhang, Yanfeng (Sichuan Police College); Zhang, Xiaosong (University of Electronic Science and Technology of China)
Password Managers and Vault Application Security and Forensics: Research Challenges and Future OpportunitiesNash, Aleck (University of Texas at San Antonio); Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
A lightweight and high-precision approach for bulky JavaScript engines fuzzinglianpei, Zhou (Tsinghua universities)
Identify Users on Dating Applications: A Forensic PerspectiveLe Khac, Nhien An (University College Dublin); Stenzel, Paul (University College Dublin)
Backdoor Learning on Siamese Networks using
Physical Triggers: FaceNet as a Case Study
Pang, Zeshan (National University of Defense Technology); Sun, Yuyuan (National University of Defense Technology); Guo, Shasha (National University of Defense Technology); Lu, Yuliang (National University of Defense Technology)
Catch Me if You Can: Analysis of Digital Devices & Artifacts Used in Murder CasesJankura, John (University of New Haven); Catallo-Stooks, Hannah (University of New Haven); Baggili, Ibrahim (Louisiana State University); Richard III, Golden G (Louisiana State University)
DynVMDroid: Android App Protection via Code Disorder and Dynamic RecoveryFeng, Weimiao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Hu, Rui (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhou, Cong (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yu, Lei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network王, 志强 (北京电子科技学院); Zhang, Ying (北京电子科技学院); 王, 卓越 (北京电子科技学院)
SdShield: Effectively Ensuring Heap Security via Shadow Page Tableshi, linong (zhengzhou university); hu, chuanping (zhengzhou university); zhuang, yan (zhengzhou university); lu, yan (zhengzhou university)
Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime DetectionYang, Xiao (Shanghai Jiao Tong University); Li, Gaolei (Shanghai Jiao Tong university); Han, Meng (Kennesaw State University)
Power Analysis Attack Based on BS-XGboost SchemeLi, Yiran (Inner Mongolia University)
DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic DetectionHu, Jia (University of Electronic Science and Technology of China); Niu, Weina (University of Electronic Science and Technology of China); Yuan, Qingjun (PLA Strategic Support Force Information Engineering University); Yao, Lingfeng (University of Electronic Science and Technology of China); He, Junpeng (University of Electronic Science and Technology of China); Zhang, Yanfeng (Sichuan Police College); Zhang, Xiaosong (University of Electronic Science and Technology of China)
APTBert: Abstract Generation and Event Extraction from APT ReportsZhou, Chenxin (Sichuan University); Huang, Cheng (Sichuan University)
Password Managers and Vault Application Security and Forensics: Research Challenges and Future OpportunitiesNash, Aleck (University of Texas at San Antonio); Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNsYang, Xubo (Shanghai Jiao Tong University); Li, Linsen (Shanghai Jiao Tong University); Hua, Cunqing (Shanghai Jiao Tong University); Yao, Changhao (Shanghai Jiao Tong University)
SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World LeadersLin, Qingran (Beijing University of Posts and Telecommunications); Li, Xiang (Beijing University of Posts and Telecommunications); Chu, Beilin (Beijing University of Posts and Telecommunications); Wang, Renying (Beijing University of Posts and Telecommunications); Chen, Xianhao (Beijing University of Posts and Telecommunications); Mao, Yuzhe (Beijing University of Posts and Telecommunications); Yang, Zhen (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications)
A PUF based Audio Fingerprint Based for Device Authentication and Tamper LocationLu, Zhi (Huazhong University Of Science And Technology); Dou, Haochen (Huazhong University of Science and Technology); Lu, Songfeng (Huazhong University of Science and Technology); Tang, Xueming (Huazhong University of Science and Technology); Wu, JunJun (Huazhong University of Science and Technology); Umran, Samir Mohammed (Huazhong University of Science and Technology)
Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, ReviewMundt, Michael (Esri Deutschland GmbH); Baier, Prof. Harald (UniBW)
Research on Feature Selection Algorithm of Energy Curvefan, xiaohong (Beijing Electronic Science and Technology Institute); huang, ye (Beijing Electronic Science and Technology Institute); yu, zhenyang (Beijing Electronic Science and Technology Institute); Cheng, Xuhui (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)
Retruth Reconnaissance: A Digital Forensic Analysis of Truth SocialBrown, Joseph (Louisiana State University); Baggili, Ibrahim (Louisiana State University)
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IRYan, Yintong (College of Electronic Engineering, National University of Defense Technology); Yu, Lu (College of Electronic Engineering, National University of Defense Technology); Wang, Taiyan (College of Electronic Engineering, National University of Defense Technology); Li, Yuwei (College of Electronic Engineering, National University of Defense Technology); Pan, Zulie (College of Electronic Engineering, National University of Defense Technology)
IoT Malicious Traffic Detection based on Federated LearningShen, Yi (National University of Defense Technology); Zhang, Yuhan (School of Cyber Science and Engineering, Sichuan University); Li, Yuwei (National University of Defense Technology); Ding, Wanmeng (National University of Defense Technology); Hu, Miao (National University of Defense Technology); Li, Yang (National University of Defense Technology); Huang, Cheng (School of Cyber Science and Engineering Sichuan University,); Wang, Jie (National University of Defense Technology)
Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial VehicleJamil, Abdul Majid (Wuhan University); Hadi, Hassan Jalil (Wuhan University); Li, Sifan (Wuhan University); Cao, Yue (Wuhan University); Ahmed, Naveed (Prince Sultan University); Hussain, Faisal Bashir (Bahria University); suthaputchakun, chakkaphong (Bangkok University); Wang, Xinyuan (Zhejiang Scientific Research Institute of Transport)
Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semanticsNassif, Lilian Noronha (Public Ministry of Minas Gerais); Silva Oliveira, Jonny (Public Ministry of Minas Gerais)
A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum AnalysisRen, Shuai (Chang’anUniversity); Ma, Liming (Chang’an University); Feng, Qiuyu (Chang’an University)
Power Analysis Attack Based on GA-based Ensemble LearningDuan, Xiaoyi (Beijing Electronic Science and Technology Institute); Huang, Ye (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); gu, yu (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Wang, Zunyang (Beijing Electronic Science and Technology Institute); Hu, Ronglei (Beijing Electronic Science and Technology Institute)
Improvement of An Identity-Based Aggregate Signature Protocol From LatticeSongshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yuguang, Yang (Beijing University of Technology)
Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem)Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yang, Yang (Beijing University of Technology)
Security Analysis of Google Authenticator, Microsoft Authenticator, and AuthyNash, Aleck (University of Texas at San Antonio); Studiawan, Hudan (Institut Teknologi Sepuluh Nopember); Grispos, George (University of Nebraska-Omaha); Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
Child Sexual Abuse and Sexually Explicit Material Online During COVID-19: Trends and Prevention MethodsAnillo, Isabelle (Nova Southeastern University); Feldman, David (nova southeastern university); Kennedy, Tom (Nova Southeastern University); Caggiano, Claire (Nova Southeastern University)
Retruth Reconnaissance: A Digital Forensic Analysis of Truth SocialBrown, Joseph (Louisiana State University); Baggili, Ibrahim (Louisiana State University)
Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semanticsNassif, Lilian Noronha (Public Ministry of Minas Gerais)
IoT Malicious Traffic Detection based on Federated LearningShen, Yi (National University of Defense Technology); Zhang, Yuhan (School of Cyber Science and Engineering, Sichuan University); Ding, Wanmeng (National University of Defense Technology); Hu, Miao (National University of Defense Technology); Li, Yang (National University of Defense Technology); Huang, Cheng (School of Cyber Science and Engineering Sichuan University,); Li, Yuwei (National University of Defense Technology)
Power Analysis Attack Based on GA-based Ensemble LearningDuan, Xiaoyi (Beijing Electronic Science and Technology Institute); Huang, Ye (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Hu, Ronglei (Beijing Electronic Science and Technology Institute)
A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum AnalysisRen, Shuai (Chang’anUniversity); Ma, Liming (Chang’an University); Feng, Qiuyu (Chang’an University)
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IRYan, Yintong (College of Electronic Engineering, National University of Defense Technology); Yu, Lu (College of Electronic Engineering, National University of Defense Technology); Wang, Taiyan (College of Electronic Engineering, National University of Defense Technology); Li, Yuwei (College of Electronic Engineering, National University of Defense Technology); Pan, Zulie (College of Electronic Engineering, National University of Defense Technology)
Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial VehicleJamil, Abdul Majid (Wuhan University); Cao, Yue (Wuhan University); Hadi, Hassan Jalil (Wuhan University)
Security Analysis of Google Authenticator, Microsoft Authenticator, and AuthyNash, Aleck (University of Texas at San Antonio); Studiawan, Hudan (Institut Teknologi Sepuluh Nopember); Grispos, George (University of Nebraska-Omaha); Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem)Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yang, Yang (Beijing University of Technology)
Improvement of An Identity-Based Aggregate Signature Protocol From LatticeSongshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yuguang, Yang (Beijing University of Technology)