- POSTER: Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models - Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad and Tamer Abuhmed 
- POSTER: Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE - Salman Ahmed, Ya Xiao, Taejoong Chung, Carol Fung, Moti Yung and Danfeng Yao 
- POSTER: A Systematic Study of Bulletin Board and Its Application - Misni Suwito, Bayu Tama, Bagus Santoso, Sabyasach Dutta, Haowen Tan, Ueshige Yoshifumi and Kouichi Sakurai 
- POSTER: TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal and Masaki Inamura 
- POSTER: Towards Polyvalent Adversarial Attacks on URL classification engines - Fabien Charmet, Tomohiro Morikawa, Harry Chandra Tanuwidjaja and Takeshi Takahashi 
- POSTER: Black-box and Target-specific Attack Against Interpretable Deep Learning Systems - Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad and Tamer Abuhmed 
- POSTER: Base64 Malleability in Practice - Konstantinos Chalkias and Panagiotis Chatzigiannis 
- POSTER: Decentralized Federated Learning for Internet of Things Anomaly Detection - Zhuotao Lian and Chunhua Su 
- POSTER: Autonomous Network Defence using Reinforcement Learning - Myles Foley, Chris Hicks, Kate Highnam and Vasilios Mavroudis 
- POSTER: IoT System Trustworthiness Assurance - Razvan Beuran, Sian En Ooi, Abbie Barbir and Yasuo Tan 
- POSTER: Vulnerability Detection via Multimodal Learning: Datasets and Analysis - Xin Zhou and Rakesh Verma 
- POSTER: RBMon: Real Time System Behavior Monitoring Tool - Nitesh Kumar, Anand Handa and Sandeep K. Shukla 
- POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning - Janaka Senanayake, Harsha Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras 
- POSTER: The Personalities of Social Media Posts and Photos - Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison and Eric Chan-Tin 
- POSTER: Email Summarisation to Assist Users in Phishing Identification - Amir Kashapov, Tingmin Wu, Sharif Abuadbba and Carsten Rudolph 
- POSTER: Enabling Attribute-Based Access Control in Linux Kernel - H.O Sai Varshith, Shamik Sural, Jaideep Vaidya and Vijay Atluri 
- POSTER: Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware - Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed and Mohammed Abuhamad 
- POSTER: Decentralized and Collaborative Tracing for Group Signatures - Maharage Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai