Program
Registration
Opening Session
Prof. Sanjay Goel, SUNY Albany
Prof. Imrich Chlamtac, President of European Alliance for Innovation
Prof. Dragan Perakovic, University of Zagreb
Coffee Break
Session 1: Artificial Intelligence & Security
Hacking Mobile Biometrics with the Photograph of a Fingerprint - Sarah Dill (Rochester Institute of Technology); Joseph Hommel (Rochester Institute of Technology); Justin Kennedy (Rochester Institute of Technology); Vaughn Woerpel (Rochester Institute of Technology); Justin Pelletier (Rochester Institute of Technology
Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling - Ivan Cvitic (Faculty of Transport and Traffic Sciences, University of Zagreb); Dragan Peraković (University of Zagreb); Josip Vladava (University of Zagreb); Karlo Gavrilović (University of Zagreb)
Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review - Erdal BAŞARAN (Agri Ibrahim Cecen University); Sanjay Goel (Information Security and Digital Forensics University at Albany); Yuksel Celik (University at Albany)
CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning - Chunyan Ma (Chinese Academy of Sciences); Zhengwei Jiang (Chinese Academy of Sciences); Kai Zhang (Chinese Academy of Sciences); Jun Jiang (Chinese Academy of Sciences); Peian Yang (Chinese Academy of Sciences); Bo Xu (People's Public Security University of China); Huamin Feng (Beijing Electronic Science and Technology Institute)
Lunch
Session 2: Multimedia Forensics
Toward Forensic Friendly AI Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness - Safiia Mohammed (University of Windsor)
The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router - Akif Ozer (Purdue University); Umit Karabiyik (Purdue University)
ENF Match with Masking: a new method for searching with sparse signal - Nicola Landro (European Commission - Joint Research Centre); Lorenzo Schiavone (European Commission - Joint Research Centre); Anselmo Castelo Branco Ferreira (European Commission - Joint Research Centre); Laurent Beslay (European Commission - Joint Research Centre)
Lightweight Multi-Tier IDS for UAV Security: Enhancing UAV Zero-Day Attacks with Honeypot Threat Intelligence - Abdul Majid Jamil (Wuhan University); Yue Cao (Wuhan University); Hassan Jalil Hadi (Wuhan University); Naveed Ahmad (Prince Sultan University); Aduwati Sali (University Putra Malaysia); Mohammed Ali Alshare (Prince Sultan University); Long Chen (BEIJING UNIVERSITY OF CHEMICAL TECHNOLOGY)
Session 3: Intrusion Detection
Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model -Hassan Jalil Hadi (Wuhan University); Yue Cao (Wuhan University); Faisal Bashir Hussain (Bahria University); Naveed Ahamad (Prince Sultan University); Mohammed ali Alshara (Prince Sultan University); Insaf Ullah (University of Essex); Yasir Javed (Prince Sultan University); Yinglong He (University of Surrey)
APTChaser: Cyber Threat Attribution via Attack Technique Modeling - Zhang Yiming (Chinese Academy of Sciences); Yang Peian (Chinese Academy of Sciences); Jiang Zhengwei (Chinese Academy of Sciences); Ma Chunyan (Chinese Academy of Sciences); Cui Mengjiao (Chinese Academy of Sciences); You Yizhe (Chinese Academy of Sciences)
What Do We Know About the Psychology of Insider Threats? - Jukka Ruohonen (University of Southern Denmark); Mubashrah Saddiqa (University of Southern Denmark)
A Digital Profiling Triage Model for Industrial Espionage - Jieun Dokko (Texas Tech University); Michael Shin (Texas Tech University)
Coffee Break
Session 4: Intrusion and Fraud Detection
Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning - Yi Anson Lam (The University of Hong Kong); Kam Pui Chow (The University of Hong Kong); Siu Ming Yiu (The University of Hong Kong)
Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture - Pengcheng Bi (University of Chinese Academy of Sciences); Qi Wang (National Computer Network Emergency Response Technical Team Coordination Center of China); Zhuohang Lv (National Computer Network Emergency Response Technical Team Coordination Center of China); Xiaochun Yun (Zhongguancun National Laboratory); Tianning Zang (Chinese Academy of Sciences)
ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning - Yuedong Pan (Institute of Information Engineering, Chinese Academy of Sciences);
Lixin Zhao (Institute of Information Engineering, Chinese Academy of Sciences); Chaofei Li (Institute of Information Engineering,Chinese Academy of Sciences); Tao Leng (Institute of Information Engineering, Chinese Academy of Sciences); Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences); Lijun Cai (Institute of Information Engineering, Chinese Academy of Sciences); Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences);
Social Program - Cruise around Dubrovnik
Keynote Talk by Prof. Enes Sukić, University Union- Nikola Tesla, Belgrade, Serbia
Industry Presentations
INsig2 Croatia, DCSO Germany, Ventura ERM Brazil
Coffee Break
Session 5: Large Language Models, Advances in Security and Forensics
Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails - Malte Josten (University of Duisburg-Essen); Torben Weis (University of Duisburg-Essen)
SecureSem: Sensitive Text Classification based on Semantic Feature Optimization -Kangyuan Qin (Institute of Information Engineering, Chinese Academy of Sciences); Ran Liu (Institute of Information Engineering, Chinese Academy of Sciences); Min Yu (Institute of Information Engineering, Chinese Academy of Sciences); Gang Li (School of Information Technology, Deakin University); Mingqi Liu (Institute of Information Engineering, Chinese Academy of Sciences); Jiangyuan Li (Department of Computer Science, Beijing Technology and Business University); Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences); Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences)
The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI - Lakshika Vaishnav (University at Albany), Sakshi Singh, Kimberly Cornell
Session 6: Advances in Security and Fotrensics
Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review - Mirella Sangiovanni (Tilburg University, Jads); George Manias (Tilburg University, Jads); Willem-Jan J.A.M. van den Heuvel (Tilburg University,Jads)
Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project - Pradeep Rangappa (Idiap Research Institute); Amanda Muscat (Idiap Research Institute); Alejandra Sanchez Lara (Idiap Research Institute); Petr Motlicek (Idiap Research Institute); Michaela Antonopoulou (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Ioannis Fourfouris (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Antonios Skarlatos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Nikos Avgerinos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Manolis Tsangaris (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece)
The lecture: Executive Summary of cyber breaches and cyber crime in Brazil: what we’ve seen in the past 5 years. Domingo Montanaro CEO and Cofounder Ventura Enterprise Risk Management
Lunch
Online Session: Security Analytics, Threat Intelligence,Multimedia Forensics
Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse - Ruiyuan Yang (Xidian University); Guohao Li (Xidian University); Li Yang (Xidian University); Hao Zhang (Xidian University); Jiangyu Wang (Xidian University); Anyuan Sang (Xidian University)
EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency - Bo Cui (Inner Mongolia University); Jia Zhang (Inner Mongolia University)
Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security - Junjiang He (Sichuan University); Jiayan Wang (Sichuan University); Jiangchuan Chen (Sichuan University); Wenbo Fang (Sichuan University); Lei Zhang (Sichuan University); Tao Li (Sichuan University)
Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators - Song Ding (Nanjing University of Information Science and Technology); Fuya Xu (Nanjing University of Information Science and Technology); Peiyun Zhang (Nanjing University of Information Science and Technology); Zhangjie Fu (Nanjing University of Information Science and Technology); Kezhong Lu (Chizhou University)
ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats - Zhiling Zhu (Zhejiang University of Technology); Tieming Chen (Zhejiang University of Technology); Qijie Song (Zhejiang University of Technology); Yiheng Lu (Zhejiang University of Technology); Yulin Zheng (Zhejiang University of Technology)
Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data - Ikuesan, Richard Adeyemi (Zayed University); Obojo, Victor (Cyber Threat Intelligence Division, CyberDome); Galadima, Haula (Cyber Threat Intelligence Division, CyberDome)
A Comprehensive Survey on Basic Safety Message Attacks and Their Detection - Mohamed, Ahmed (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)
BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU - Yang, Xiaotong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Meng, Yi (Xinjiang University); Mei, Yihe (Xinjiang University); Zhao, Guodong (xinjiang university)
AnGSL: Graph-Based Android Malware Detection Method - Zhao, Guodong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Mei, Yihe (Xinjiang University); Meng, Yi (Xinjiang University); Yang, Xiaotong (Xinjiang University)
Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security - He, Junjiang (Sichuan University); Wang, Jiayan (Sichuan University); Chen, Jiangchuan (Sichuan University); Fang, Wenbo (Sichuan University); Zhang, Lei (Sichuan University); Li, Tao (Sichuan University)
MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network - Lu, Tianbo (Beijing University of Posts and Telecommunications); Tao, Xiaohan (Beijing University of Posts and Telecommunications); Li, Yanfang (Beijing University of Posts and Telecommunications); Shang, Jiaze (Beijing University of Posts and Telecommunications)
An IP Anti-Geolocation Method Based on Constructed Landmarks - Lu, Enshang (Information Engineering University); Ding, Shichang (Henan Key Laboratory of Cyberspace Situation Awareness); Yang, Chunfang (Information Engineering University); Gong, Daofu (Information Engineering University); Li, Ruixiang (Henan Key Laboratory of Cyberspace Situation Awareness); Zhu, Kaijie (Zhongguancun Laboratory); Luo, Xiangyang (Information Engineering University)
Burst Sequence Based Graph Neural Network for Video Traffic Identification - xiong, jian (university of jinan/Shandong Provincial Key Laboratory of Network Based Intelligent Computing); bao, yingshuo (University of Jinan/ Shandong Provincial Key Laboratory of Network Based Intelligent Computing); peng, lizhi (Quancheng Laboratory/University of Jinan); li, shengbao (School of Cyber Security, University of Chinese Academy of Sciences/Shandong Branch of National Computer Network Emergency Response Technical Team/Coordination Center of China); zhao, kun (Inspur Computer Technology Co., Ltd)
KP-WF: Cross-domain Few-shot Website Fingerprinting - Liu, Lin (College of Computer, National University of Defense Technology, Changsha, China); Wei, Ziling (College of Computer, National University of Defense Technology, Changsha, China); Chen, Shuhui (College of Computer, National University of Defense Technology, Changsha, China); su, jinshu (College of Computer, National University of Defense Technology, Changsha, China); Yuan, Yong (College of Computer, National University of Defense Technology, Changsha, China)
Coffee Break
Online Session: Generative AI, Emerging Threats
Pixel-level Face Correction Task for More Generalized Deepfake Detection - Li, Xiang (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications); Lin, Qingran (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications)
Securing Social Relationships: An Algorithm for Privacy Preservation Targeting Vulnerable Nodes of Social Networks - Shen, Jiawei (Hebei University); Tian, Junfeng (Hebei University); Wang, Ziyuan (Hebei University)
Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data - Farabi, Khan Mohammad Al (University of Georgia); Agrawal, Gagan (University of Georgia); Dorai, Gokila (Augusta University); Bardhan, Rajon (Augusta University); Maleki, Hoda (Augusta University); Kadri, Thomas E. (University of Georgia)
Driven to Evidence: The Digital Forensic Trail of Vehicles - McKay, Catherine (University College Dublin); Le-Khac, Nhien-An (University College Dublin)
Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing - Liu, Jinzhao (Shandong University of Technology); Yu, Xiao (Shandong University of Technology); Zhang, Li (Communication University of Zhejiang); Zhang, Yanqiu (Shandong University of Technology); Li, YuanZhang (Beijing Institute of Technology); Tan, Kun (Shandong Institute of Information Technology Industry Development); Tan, Yuan (Beijing Institute of Technology)
Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack - Jin, Jifang (Beijing Electronic Science and Technology Institute); nie, ziran (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Xie, Bingqi (Beijing Electronic Science and Technology Institute); Huang, Xiaobing (Qianghua Times (Chengdu) Technology Co., Ltd); duan, xiaoyi (Beijing Electronic Science and Technology Institute)
Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals - Jin, Jifang (Beijing Electronic Science and Technology Institute); su, yonghua (beijing electronic science and technology institute); Wang, Zunyang (Beijing Electronic Science and Technology Institude); li, Pengyu (Beijing Electronic Science and Technology Institute); Huang, Zhan (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)