Technical Program

Click on the icon to view the manuscript on IEEE XPlore in the IEEE ICASSP 2020 Open Preview.

IFS-P2: Anonymization, Security and Privacy

Session Type: Poster
Time: Friday, 8 May, 11:45 - 13:45
Location: On-Demand
Virtual Session: View on Virtual Platform
Session Chair: Remy Cogranne, Université de Technologie de Troyes
 
 IFS-P2.1: ANTI-JAMMING ROUTING FOR INTERNET OF SATELLITES: A REINFORCEMENT LEARNING APPROACH
         Chen Han; Army Engineering University
         Aijun Liu; Army Engineering University
         Liangyu Huo; Beihang University
         Haichao Wang; Army Engineering University
         Xiaohu Liang; Army Engineering University
 
 IFS-P2.2: ELECTRO-MAGNETIC SIDE-CHANNEL ATTACK THROUGH LEARNED DENOISING AND CLASSIFICATION
         Florian Lemarchand; Institut d'Eléctronique et de Télécommunications de Rennes
         Cyril Marlin; DGA-MI
         Florent Montreuil; DGA-MI
         Erwan Nogues; DGA-MI
         Maxime Pelcat; Institut d'Eléctronique et de Télécommunications de Rennes
 
 IFS-P2.3: DETECTION OF MALICIOUS VBSCRIPT USING STATIC AND DYNAMIC ANALYSIS WITH RECURRENT DEEP LEARNING
         Jack W. Stokes; Microsoft Corporation
         Rakshit Agrawal; University of California, Santa Cruz
         Geoff McDonald; Microsoft Corporation
 
 IFS-P2.4: DYNAMIC ATTACK SCORING USING DISTRIBUTED LOCAL DETECTORS
         Zahra Zohrevand; Simon Fraser University
         Uwe Glässer; Simon Fraser University
 
 IFS-P2.5: HIJACKING TRACKER: A POWERFUL ADVERSARIAL ATTACK ON VISUAL TRACKING
         Xiyu Yan; Tsinghua University
         Xuesong Chen; Shenzhen Graduate School of Peking University
         Yong Jiang; Tsinghua University
         Shu-Tao Xia; Tsinghua University
         Yong Zhao; Shenzhen Graduate School of Peking University
         Feng Zheng; Southern University of Science and Technology
 
 IFS-P2.6: ADVMS: A MULTI-SOURCE MULTI-COST DEFENSE AGAINST ADVERSARIAL ATTACKS
         Xiao Wang; Boston University
         Siyue Wang; Northeastern University
         Pin-Yu Chen; IBM Research
         Xue Lin; Northeastern University
         Peter Chin; Boston University
 
 IFS-P2.7: CLASSIFYING ANOMALIES FOR NETWORK SECURITY
         Emily Do; Massachusetts Institute Of Technology
         Vijay Gadepally; Lincoln Laboratory/Massachusetts Institute of Technology
 
 IFS-P2.8: A SWITCHING TRANSMISSION GAME WITH LATENCY AS THE USER'S COMMUNICATION UTILITY
         Andrey Garnaev; Rutgers University
         Athina Petropulu; Rutgers University
         Wade Trappe; Rutgers University
         H. Vincent Poor; Princeton University
 
 IFS-P2.9: AN EFFICIENT METHODOLOGY TO DE-ANONYMIZE THE 5G-NEW RADIO PHYSICAL DOWNLINK CONTROL CHANNEL
         Benjamin Gardner; Naval Postgraduate School
         John Roth; Naval Postgraduate School
 
 IFS-P2.10: JOINT LEARNING OF ASSIGNMENT AND REPRESENTATION FOR BIOMETRIC GROUP MEMBERSHIP
         Marzieh Gheisari; Inria
         Teddy Furon; Inria
         Laurent Amsaleg; IRISA
 
 IFS-P2.11: PRIVATE FL-GAN: DIFFERENTIAL PRIVACY SYNTHETIC DATA GENERATION BASED ON FEDERATED LEARNING
         Bangzhou Xin; University of Science and Technology of China
         Wei Yang; University of Science and Technology of China
         Yangyang Geng; University of Science and Technology of China
         Sheng Chen; University of Science and Technology of China
         Shaowei Wang; Tencent Games
         Liusheng Huang; University of Science and Technology of China