Login Paper Search My Schedule Paper Index Help

My ICASSP 2020 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)
Click on the icon to view the manuscript on IEEE XPlore in the IEEE ICASSP 2020 Open Preview.

Clicking on the Add button next to a paper title will add that paper to your custom schedule.
Clicking on the Remove button next to a paper will remove that paper from your custom schedule.

FR2.I: Anonymization, Security and Privacy

Session Type: Poster
Time: Friday, 8 May, 11:45 - 13:45
Location: On-Demand
Session Chair: Remy Cogranne, Université de Technologie de Troyes
 
   FR2.I.1: ANTI-JAMMING ROUTING FOR INTERNET OF SATELLITES: A REINFORCEMENT LEARNING APPROACH
         Chen Han; Army Engineering University
         Aijun Liu; Army Engineering University
         Liangyu Huo; Beihang University
         Haichao Wang; Army Engineering University
         Xiaohu Liang; Army Engineering University
 
   FR2.I.2: ELECTRO-MAGNETIC SIDE-CHANNEL ATTACK THROUGH LEARNED DENOISING AND CLASSIFICATION
         Florian Lemarchand; Institut d'Eléctronique et de Télécommunications de Rennes
         Cyril Marlin; DGA-MI
         Florent Montreuil; DGA-MI
         Erwan Nogues; DGA-MI
         Maxime Pelcat; Institut d'Eléctronique et de Télécommunications de Rennes
 
   FR2.I.3: DETECTION OF MALICIOUS VBSCRIPT USING STATIC AND DYNAMIC ANALYSIS WITH RECURRENT DEEP LEARNING
         Jack W. Stokes; Microsoft Corporation
         Rakshit Agrawal; University of California, Santa Cruz
         Geoff McDonald; Microsoft Corporation
 
   FR2.I.4: DYNAMIC ATTACK SCORING USING DISTRIBUTED LOCAL DETECTORS
         Zahra Zohrevand; Simon Fraser University
         Uwe Glässer; Simon Fraser University
 
   FR2.I.5: HIJACKING TRACKER: A POWERFUL ADVERSARIAL ATTACK ON VISUAL TRACKING
         Xiyu Yan; Tsinghua University
         Xuesong Chen; Shenzhen Graduate School of Peking University
         Yong Jiang; Tsinghua University
         Shu-Tao Xia; Tsinghua University
         Yong Zhao; Shenzhen Graduate School of Peking University
         Feng Zheng; Southern University of Science and Technology
 
   FR2.I.6: ADVMS: A MULTI-SOURCE MULTI-COST DEFENSE AGAINST ADVERSARIAL ATTACKS
         Xiao Wang; Boston University
         Siyue Wang; Northeastern University
         Pin-Yu Chen; IBM Research
         Xue Lin; Northeastern University
         Peter Chin; Boston University
 
   FR2.I.7: CLASSIFYING ANOMALIES FOR NETWORK SECURITY
         Emily Do; Massachusetts Institute Of Technology
         Vijay Gadepally; Lincoln Laboratory/Massachusetts Institute of Technology
 
   FR2.I.8: A SWITCHING TRANSMISSION GAME WITH LATENCY AS THE USER'S COMMUNICATION UTILITY
         Andrey Garnaev; Rutgers University
         Athina Petropulu; Rutgers University
         Wade Trappe; Rutgers University
         H. Vincent Poor; Princeton University
 
   FR2.I.9: AN EFFICIENT METHODOLOGY TO DE-ANONYMIZE THE 5G-NEW RADIO PHYSICAL DOWNLINK CONTROL CHANNEL
         Benjamin Gardner; Naval Postgraduate School
         John Roth; Naval Postgraduate School
 
   FR2.I.10: JOINT LEARNING OF ASSIGNMENT AND REPRESENTATION FOR BIOMETRIC GROUP MEMBERSHIP
         Marzieh Gheisari; Inria
         Teddy Furon; Inria
         Laurent Amsaleg; IRISA
 
   FR2.I.11: PRIVATE FL-GAN: DIFFERENTIAL PRIVACY SYNTHETIC DATA GENERATION BASED ON FEDERATED LEARNING
         Bangzhou Xin; University of Science and Technology of China
         Wei Yang; University of Science and Technology of China
         Yangyang Geng; University of Science and Technology of China
         Sheng Chen; University of Science and Technology of China
         Shaowei Wang; Tencent Games
         Liusheng Huang; University of Science and Technology of China