POSTER: Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models
Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad and Tamer Abuhmed
POSTER: Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE
Salman Ahmed, Ya Xiao, Taejoong Chung, Carol Fung, Moti Yung and Danfeng Yao
POSTER: A Systematic Study of Bulletin Board and Its Application
Misni Suwito, Bayu Tama, Bagus Santoso, Sabyasach Dutta, Haowen Tan, Ueshige Yoshifumi and Kouichi Sakurai
POSTER: TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal and Masaki Inamura
POSTER: Towards Polyvalent Adversarial Attacks on URL classification engines
Fabien Charmet, Tomohiro Morikawa, Harry Chandra Tanuwidjaja and Takeshi Takahashi
POSTER: Black-box and Target-specific Attack Against Interpretable Deep Learning Systems
Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad and Tamer Abuhmed
POSTER: Base64 Malleability in Practice
Konstantinos Chalkias and Panagiotis Chatzigiannis
POSTER: Decentralized Federated Learning for Internet of Things Anomaly Detection
Zhuotao Lian and Chunhua Su
POSTER: Autonomous Network Defence using Reinforcement Learning
Myles Foley, Chris Hicks, Kate Highnam and Vasilios Mavroudis
POSTER: IoT System Trustworthiness Assurance
Razvan Beuran, Sian En Ooi, Abbie Barbir and Yasuo Tan
POSTER: Vulnerability Detection via Multimodal Learning: Datasets and Analysis
Xin Zhou and Rakesh Verma
POSTER: RBMon: Real Time System Behavior Monitoring Tool
Nitesh Kumar, Anand Handa and Sandeep K. Shukla
POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning
Janaka Senanayake, Harsha Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras
POSTER: The Personalities of Social Media Posts and Photos
Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison and Eric Chan-Tin
POSTER: Email Summarisation to Assist Users in Phishing Identification
Amir Kashapov, Tingmin Wu, Sharif Abuadbba and Carsten Rudolph
POSTER: Enabling Attribute-Based Access Control in Linux Kernel
H.O Sai Varshith, Shamik Sural, Jaideep Vaidya and Vijay Atluri
POSTER: Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware
Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed and Mohammed Abuhamad
POSTER: Decentralized and Collaborative Tracing for Group Signatures
Maharage Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai