IFS-P2: Anonymization, Security and Privacy |
Session Type: Poster |
Time: Friday, 8 May, 11:45 - 13:45 |
Location: On-Demand |
Virtual Session: View on Virtual Platform |
Session Chair: Remy Cogranne, Université de Technologie de Troyes |
IFS-P2.1: ANTI-JAMMING ROUTING FOR INTERNET OF SATELLITES: A REINFORCEMENT LEARNING APPROACH |
Chen Han; Army Engineering University |
Aijun Liu; Army Engineering University |
Liangyu Huo; Beihang University |
Haichao Wang; Army Engineering University |
Xiaohu Liang; Army Engineering University |
IFS-P2.2: ELECTRO-MAGNETIC SIDE-CHANNEL ATTACK THROUGH LEARNED DENOISING AND CLASSIFICATION |
Florian Lemarchand; Institut d'Eléctronique et de Télécommunications de Rennes |
Cyril Marlin; DGA-MI |
Florent Montreuil; DGA-MI |
Erwan Nogues; DGA-MI |
Maxime Pelcat; Institut d'Eléctronique et de Télécommunications de Rennes |
IFS-P2.3: DETECTION OF MALICIOUS VBSCRIPT USING STATIC AND DYNAMIC ANALYSIS WITH RECURRENT DEEP LEARNING |
Jack W. Stokes; Microsoft Corporation |
Rakshit Agrawal; University of California, Santa Cruz |
Geoff McDonald; Microsoft Corporation |
IFS-P2.4: DYNAMIC ATTACK SCORING USING DISTRIBUTED LOCAL DETECTORS |
Zahra Zohrevand; Simon Fraser University |
Uwe Glässer; Simon Fraser University |
IFS-P2.5: HIJACKING TRACKER: A POWERFUL ADVERSARIAL ATTACK ON VISUAL TRACKING |
Xiyu Yan; Tsinghua University |
Xuesong Chen; Shenzhen Graduate School of Peking University |
Yong Jiang; Tsinghua University |
Shu-Tao Xia; Tsinghua University |
Yong Zhao; Shenzhen Graduate School of Peking University |
Feng Zheng; Southern University of Science and Technology |
IFS-P2.6: ADVMS: A MULTI-SOURCE MULTI-COST DEFENSE AGAINST ADVERSARIAL ATTACKS |
Xiao Wang; Boston University |
Siyue Wang; Northeastern University |
Pin-Yu Chen; IBM Research |
Xue Lin; Northeastern University |
Peter Chin; Boston University |
IFS-P2.7: CLASSIFYING ANOMALIES FOR NETWORK SECURITY |
Emily Do; Massachusetts Institute Of Technology |
Vijay Gadepally; Lincoln Laboratory/Massachusetts Institute of Technology |
IFS-P2.8: A SWITCHING TRANSMISSION GAME WITH LATENCY AS THE USER'S COMMUNICATION UTILITY |
Andrey Garnaev; Rutgers University |
Athina Petropulu; Rutgers University |
Wade Trappe; Rutgers University |
H. Vincent Poor; Princeton University |
IFS-P2.9: AN EFFICIENT METHODOLOGY TO DE-ANONYMIZE THE 5G-NEW RADIO PHYSICAL DOWNLINK CONTROL CHANNEL |
Benjamin Gardner; Naval Postgraduate School |
John Roth; Naval Postgraduate School |
IFS-P2.10: JOINT LEARNING OF ASSIGNMENT AND REPRESENTATION FOR BIOMETRIC GROUP MEMBERSHIP |
Marzieh Gheisari; Inria |
Teddy Furon; Inria |
Laurent Amsaleg; IRISA |
IFS-P2.11: PRIVATE FL-GAN: DIFFERENTIAL PRIVACY SYNTHETIC DATA GENERATION BASED ON FEDERATED LEARNING |
Bangzhou Xin; University of Science and Technology of China |
Wei Yang; University of Science and Technology of China |
Yangyang Geng; University of Science and Technology of China |
Sheng Chen; University of Science and Technology of China |
Shaowei Wang; Tencent Games |
Liusheng Huang; University of Science and Technology of China |