Accepted Papers (Main Track)

A Comprehensive Survey on Basic Safety Message Attacks and Their Detection

Author:

Mohamed, Ahmed (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)

A Digital Profiling Triage Model for Industrial Espionage

Author: Dokko, Jieun (Texas Tech University); Shin, Michael (Texas Tech University)

An IP Anti-Geolocation Method Based on Fake Landmarks

Author:

Lu, Enshang (Information Engineering University); Ding, Shichang (Henan Key Laboratory of Cyberspace Situation Awareness); Yang, Chunfang (Information Engineering University); Gong, Daofu (Information Engineering University); Li, Ruixiang (Henan Key Laboratory of Cyberspace Situation Awareness); Zhu, Kaijie (Zhongguancun Laboratory); Luo, Xiangyang (Information Engineering University)

 

AnGSL: Graph-Based Android Malware Detection Method

Author: Zhao, Guodong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Mei, Yihe (Xinjiang University); Meng, Yi (Xinjiang University); Yang, Xiaotong (Xinjiang University)

APTChaser: Cyber Threat Attribution via Attack Technique Modeling

Author: Yiming, Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Peian, Yang (Institute of Information Engineering Chinese Academy of Sciences); Zhengwei, Jiang (Institute of Information Engineering Chinese Academy of Sciences); Chunyan, Ma (Institute of Information Engineering Chinese Academy of Sciences); Mengjiao, Cui (Institute of Information Engineering Chinese Academy of Sciences); Yizhe, You (Institute of Information Engineering Chinese Academy of Sciences)

Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse

Author: Yang, Ruiyuan (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Zhang, Hao (Xidian University); Wang, Jiangyu (Xidian University); Sang, Anyuan (Xidian University)

ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning

Author: Pan, Yuedong (Institute of Information Engineering, Chinese Academy of Sciences); Zhao, Lixin (Institute of Information Engineering, Chinese Academy of Sciences); Li, Chaofei (Institute of Information Engineering, Chinese Academy of Sciences); Leng, Tao (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences); Cai, Lijun (Institute of Information Engineering, Chinese Academy of Sciences); Meng, Dan (Institute of Information Engineering, Chinese Academy of Sciences)

Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching

Author: Zhang, Haichuan (Anhui University); Wang, Jiaxiang (Anhui University); Shi, Hanqin (Xuzhou Institute of Technology); Yu, Zhengda (Anhui University)

Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing

Author: Liu, Jinzhao (Shandong University of Technology); Yu, Xiao (Shandong University of Technology); Zhang, Li (Communication University of Zhejiang); Zhang, Yanqiu (Shandong University of Technology); Li, YuanZhang (Beijing Institute of Technology); Tan, Kun (Shandong Institute of Information Technology Industry Development); Tan, Yuan (Beijing Institute of Technology)

Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security

Author: He, Junjiang (Sichuan University); Wang, Jiayan (Sichuan University); Chen, Jiangchuan (Sichuan University); Fang, Wenbo (Sichuan University); Zhang, Lei (Sichuan University); Li, Tao (Sichuan University)

BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU

Author: Yang, Xiaotong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Meng, Yi (Xinjiang University); Mei, Yihe (Xinjiang University); Zhao, Guodong (xinjiang university)

Burst Sequence Based Graph Neural Network for Video Traffic Identification

Author: xiong, jian (university of jinan/Shandong Provincial Key Laboratory of Network Based Intelligent Computing); bao, yingshuo (University of Jinan/ Shandong Provincial Key Laboratory of Network Based Intelligent Computing); peng, lizhi (Quancheng Laboratory/University of Jinan)

CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning

Author: Ma, Chunyan (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yang, Peian (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Xu, Bo (People’s Public Security University of China, Beijing, China); Feng, Huamin (Beijing Electronic Science and Technology Institute, Beijing, China)

Driven to Evidence: The Digital Forensic Trail of Vehicles

Author: McKay, Catherine (University College Dublin)

EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency

Author: Cui, bo (Inner Mongolia University); Zhang, Jia (Inner Mongolia University)

Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals

Author: Jin, Jifang (Beijing Electronic Science and Technology Institute); su, yonghua (beijing electronic science and technology institute); Wang, Zunyang (Beijing Electronic Science and Technology Institude); li, Pengyu (Beijing Electronic Science and Technology Institute); Huang, Zhan (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)

Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators

Author: Ding, Song (Nanjing University of Information Science and Technology); Xu, Fuya (Nanjing University of Information Science and Technology); Zhang, Peiyun (Nanjing University of Information Science and Technology); Fu, Zhangjie (Nanjing University of Information Science and Technology); Lu, Kezhong (Chizhou University)

KP-WF: Cross-domain Few-shot Website Fingerprinting

Author: Liu, Lin (College of Computer, National University of Defense Technology, Changsha, China); Wei, Ziling (College of Computer, National University of Defense Technology, Changsha, China); Chen, Shuhui (College of Computer, National University of Defense Technology, Changsha, China); su, jinshu (College of Computer, National University of Defense Technology, Changsha, China); Yuan, Yong (College of Computer, National University of Defense Technology, Changsha, China)

MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network

Author: Lu, Tianbo (Beijing University of Posts and Telecommunications); Tao, Xiaohan (Beijing University of Posts and Telecommunications); Li, Yanfang (Beijing University of Posts and Telecommunications); Shang, Jiaze (Beijing University of Posts and Telecommunications)

Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling

Author: Cvitic, Ivan (Faculty of Transport and Traffic Sciences, University of Zagreb); Peraković, Dragan (University of Zagreb, Faculty of Traffic and Transport Sciences, Croatia); Vladava, Josip (University of Zagreb, Faculty of Transport and Traffic Sciences); Gavrilović, Karlo (University of Zagreb, Faculty of Transport and Traffic Sciences)

Pixel-level Face Correction Task for More Generalized Deepfake Detection

Author: Li, Xiang (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications); Lin, Qingran (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications)

SecureSem: Sensitive Text Classification based on Semantic Feature Optimization

Author: qin, kangyuan (Institute of Information Engineering, Chinese Academy of Sciences); Liu, Ran (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Min (Institute of Information Engineering, Chinese Academy of Sciences); Li, Gang (School of Information Technology, Deakin University); Liu, Mingqi (Institute of Information Engineering, Chinese Academy of Sciences); Li, Jiangyuan (Department of Computer Science, Beijing Technology and Business University); Huang, Weiqing (Institute of Information Engineering, Chinese Academy of Sciences); Jiang, Jianguo (Institute of Information Engineering, Chinese Academy of Sciences)

Securing Social Relationships: An Algorithm for Privacy Preservation Targeting Vulnerable Nodes of Social Networks

Author: Shen, Jiawei (Hebei University); Tian, Junfeng (Hebei University); Wang, Ziyuan (Hebei University)

Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture

Author: Bi, Pengcheng (University of Chinese Academy of Sciences); Wang, Qi (National Computer Network Emergency Response Technical Team Coordination Center of China); Lv, Zhuohang (National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing); Yun, Xiaochun (Zhongguancun National Laboratory); Zang, Tianning (Institute of Information Engineering, Chinese Academy of Sciences)

The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router

Author: Ozer, Akif (Purdue University); Karabiyik, Umit (Purdue University)

Vehicle Forensics: Analysis of Forensic Tools, Mobile Device Extractions, and Live Network Capture Artifacts

Author: McKay, Catherine (University College Dublin); Le Khac, Nhien An (University College Dublin)

SCOUT: Surveillance and Cyber harassment Observation of Unseen Threats

Author: Biswal, Sumitra (Bosch Global Software Technologies Pvt. Ltd.)

Detecting UAV Zero-Day Attacks and Developing Proactive IDS Signature with Honeypot Intelligence

Author:

Jamil, Abdul Majid <[email protected]> (Wuhan University)

Detecting Criminal Networks via Non-Content Communication Data Analysis

Author: Rangappa, Pradeep (Idiap Research Institute); Muscat, Amanda (Idiap Research Institute); Sanchez Lara, Alejandra (Idiap Research Institute); Motlicek, Petr (Idiap Research Institute); Antonopoulou, Michaela (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Fourfouris, Ioannis (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Skarlatos, Antonios (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Avgerinos, Nikos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Tsangaris, Manolis (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece)

Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails

Author: Josten, Malte (University of Duisburg-Essen); Weis, Torben (University of Duisburg-Essen)

Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack

Author: Jin, Jifang (Beijing Electronic Science and Technology Institute); nie, ziran (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Xie, Bingqi (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)

What Do We Know About the Psychology of Insider Threats?

Author: Ruohonen, Jukka (University of Southern Denmark); Saddiqa, Mubashrah (University of Southern Denmark)

Toward Forensic Friendly AI IntegratingBlockchain with Federated Learning to Enhance AI Trustworthiness

Author: Mohammed, Safiia (University of Windsor)

Image Segmentation Techniques for Bone Cancer Identification using X-ray and MRI Imagery

Author: M, Likitha (Ramaiah Institute of Technology)

METAFRAUD: AN ANALYSIS OF MULTIDIMENSIONAL APPROACH TO FRAUD DETECTION

Author: H, Hemashree (Sri Venkateshwara College Of Engineering); G, Anushka (Sri Venkateshwara College Of Engineering); H, Harshitha (Sri Venkateshwara College Of Engineering); DK, Bhavana (Sri Venkateshwara College Of Engineering)

Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model

Author: Hadi, Hassan Jalil (wuhan university)

The Vulnerable Brain

Author: Acharya, Siddharth (IIT Madras); Acharya, Adithya (IIT Madras)

UNMASKING ILLICT TRANSACTION USING MACHINE LEARNING STRATEGIES TO THWART CREDIT CARD FRAUD

Author: M, Vikram (IFET COLLEGE OF ENGINEERING); Gilmary, Dr Rosario (Ifet College of engineering)

Lightweight Multi-Tier IDS for UAV Security: Enhancing UAV Zero-Day Attacks with Honeypot Threat Intelligence

 

Author: Jamil, Abdul Majid (Wuhan University)

Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data

 

Author: Ikuesan, Richard Adeyemi (Zayed University); Obojo, Victor (Cyber Threat Intelligence Division, CyberDome); Galadima, Haula (Cyber Threat Intelligence Division, CyberDome)

ENF Match with Masking: a new method for searching with sparse signal

 

Author: Landro, Nicola (European Commission – Joint Research Centre); Schiavone, Lorenzo (European Commission – Joint Research Centre); Ferreira, Anselmo Castelo Branco (European Commission – Joint Research Centre); Beslay, Laurent (European Commission – Joint Research Centre)

Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data

Author: Farabi, Khan Mohammad Al (University of Georgia); Agrawal, Gagan (University of Georgia); Dorai, Gokila (Augusta University); Bardhan, Rajon (Augusta University); Maleki, Hoda (Augusta University); Kadri, Thomas E. (University of Georgia)

ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats

 

Author: Zhu, Zhiling (Zhejiang University of Technology); Chen, Tieming (Zhejiang University of Technology); Song, Qijie (Zhejiang University of Technology); Lu, Yiheng (Zhejiang University of Technology); Zheng, Yulin (Zhejiang University of Technology)

Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning

 

Author: Lam, Yi Anson (The University of Hong Kong); Chow, Kam Pui (The University of Hong Kong); Yiu, Siu Ming (The University of Hong Kong)

The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI

Author: Sakshi Singh (University at Albany), Kimberly Cornell (University at Albany), Lakshika Vaishnav (University of Albany)

Workshop Track Papers

EAI Workshop on Deep Learning and Cyber-Physical Systems for Security, Health, and Sustainability

Enhancing Visibility in Image with deep Learning Network : A Dehazing Approach

Author: Dongare, Supriya (M S Ramaiah institute of technology); Naik, Darshana A (M S Ramaiah Institute of Technology)

Image Segmentation Techniques for Bone Cancer Identification using X-ray and MRI Imagery

Author: M, Likitha (Ramaiah Institute of Technology)

Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review

Author: Sangiovanni, Mirella (Tilburg University, Jads); Manias, George (Tilburg University, Jads); van den Heuvel, Willem-Jan J.A.M. (Tilburg University/Jads)

Firearm detection with face recognition using yolo v8

Author: K, Sheela (IFET COLLEGE OF ENGINEERING); S, Vasanth (Ifet college of engineering)

CODECRAFT: An Automatic Code Generation tool for design And implementation of User Interface

Author: Maduwanthi, Vijini (SLIIT)

Blossom Buddy Roses App: A Mobile Application for Roses Floriculture

Author: Kulasekara, Sameesha Rashani (Sri Lanka Institute of Information Technology); Weerasinghe, Gayani Madhushani (Sri Lanka Institute of Information Technology); Hewage, Kavindu Madutharanga (Sri Lanka Institute of Information Technology); Bandara, Kavinda Nipun (Sri Lanka Institute of Information Technology)

Hacking Mobile Biometrics with the Photograph of a Fingerprint

Author: Dill, Sarah (Rochester Institute of Technology); Hommel, Joseph (Rochester Institute of Technology); Kennedy, Justin (Rochester Institute of Technology); Woerpel, Vaughn (Rochester Institute of Technology); Pelletier, Justin (Rochester Institute of Technology)