IFS-P4.3

UNCOVERING STRONG TIES: A STUDY OF INDIRECT SYBIL ATTACK ON SIGNED SOCIAL NETWORK

Yu Bu, Yulin Zhu, Longling Geng, Kai Zhou, The Hong Kong Polytechnic University, Hong Kong

Session:
IFS-P4: Network and System Security Poster

Track:
Information Forensics and Security

Location:
Poster Zone 1B
Poster Board PZ-1B.3

Presentation Time:
Thu, 18 Apr, 13:10 - 15:10 (UTC +9)

Session Chair:
Remi Cogranne, University of Troyes
View Manuscript
Presentation
Discussion
Resources
Session IFS-P4
IFS-P4.1: SourceP: Detecting Ponzi Schemes on Ethereum with Source Code
Pengcheng Lu, Liang Cai, Yin Keting, Zhejiang University, China
IFS-P4.2: TRANSFORMER MODEL WITH MULTI-TYPE CLASSIFICATION DECISIONS FOR INTRUSION ATTACK DETECTION OF TRACK TRAFFIC AND VEHICLE
Quanlong Guan, Tian Zhang, Yu Qin, Yuyu Zhou, Yangguang Zhu, Jinan University, China; Yuansheng Zhong, Guangdong Testing Institute of Product Quality Supervision, China; Xiujie Huang, Jinan University, China; Zhifei Duan, Guangzhou XPeng Motors Technology Co. Ltd, China; Zhefu Li, Jinan University, China; Changjiang Liu, Guangdong Testing Institute of Product Quality Supervision, China; Xiaofeng Wu, Guangzhou Polytechnic of Sports, China
IFS-P4.3: UNCOVERING STRONG TIES: A STUDY OF INDIRECT SYBIL ATTACK ON SIGNED SOCIAL NETWORK
Yu Bu, Yulin Zhu, Longling Geng, Kai Zhou, The Hong Kong Polytechnic University, Hong Kong
IFS-P4.4: A TARGETED ADVERSARIAL ATTACK METHOD FOR MULTI-CLASSIFICATION MALICIOUS TRAFFIC DETECTION
Peishuai Sun, Institute of Information Engineering, Chinese Academy of Sciences, China; Chengxiang Si, National Computer Network Emergency Response Technical Team/Coordination Center of China, China; Shuhao Li, Zhongguancun Laboratory, China; Zhenyu Cheng, Shuyuan Zhao, Qingyun Liu, Institute of Information Engineering, Chinese Academy of Sciences, China
IFS-P4.5: HOW TO DISTURB NETWORK RECONNAISSANCE: A MOVING TARGET DEFENSE APPROACH BASED ON DEEP REINFORCEMENT LEARNING
Tao Zhang, Beijing Jiaotong University, China; Changqiao Xu, Beijing University of Posts and Telecommunications, China; Jiahao Shen, Beihang University, China; Xiaohui Kuang, Beijing University of Posts and Telecommunications, China; Luigi Alfredo Grieco, Politecnico di Bari, Italy
IFS-P4.6: Absolute Security in Terahertz Wireless Links
Alejandro Cohen, Technion, Israel; Rafael G. L. D’Oliveira, Clemson University, United States of America; Chia-Yi Yeh, MIT, United States of America; Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Brown University, United States of America; Edward W. Knightly, Rice University, United States of America; Muriel Médard, MIT, United States of America; Daniel M. Mittleman, Brown University, United States of America
IFS-P4.7: A COMPREHENSIVE ANALYSIS OF BIASES AND CUES IN NLU DATASETS AND MODELS WITH ICQ
Shanshan Huang, Shanghai Jiao Tong University, China
IFS-P4.8: Least-Effort Adversarial Attack Against Gait-based Identity Recognition System
Jianmin Dong, Zhejiang Lab, China; Da-Tian Peng, Northwestern Polytechnical University, China; Taihao Li, Zhejiang Lab, China
IFS-P4.9: HARNESSING THE POWER OF LARGE VISION LANGUAGE MODELS FOR SYNTHETIC IMAGE DETECTION
Mamadou Keita, Univ. Polytechnique Hauts-de-France, France; Wassim Hamidouche, Technology Innovation Institute, United Arab Emirates; Hassen Bougueffa, Univ. Polytechnique Hauts-de-France, France; Abdenour Hadid, Sorbonne Center for Artificial Intelligence, Sorbonne University, United Arab Emirates; Abdelmalik Taleb-Ahmed, Univ. Polytechnique Hauts-de-France, France
IFS-P4.10: DISCOVERING MALICIOUS SIGNATURES IN SOFTWARE FROM STRUCTURAL INTERACTIONS
Chenzhong Yin, Hantang Zhang, Mingxi Cheng, Xiongye Xiao, Xinghe Chen, Xin Ren, Paul Bogdan, University of Southern California, United States of America
Contacts