IFS-P5.5
          CLPSD: DETECTING ETHEREUM PHISHING SCAMS BASED ON CURRICULUM LEARNING
Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li, Inner Mongolia University, China
              Session:
                IFS-P5: Applied Cryptography  Poster
              Track:
                Information Forensics and Security
              Location:
                Poster Zone 4A
Poster Board PZ-4A.5
              Poster Board PZ-4A.5
Presentation Time:
                Thu, 18 Apr, 13:10 - 15:10  (UTC +9)
              Session Chair:
Zeki Erkin, Delft University of Technology
Session IFS-P5
            IFS-P5.1: ENHANCED SCREEN SHOOTING RESILIENT DOCUMENT WATERMARKING
  Heng Wang, Hongxia Wang, Xinyi Huang, Zhenhao Shi, Sichuan University, China
  IFS-P5.2: Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography
  Zihan Chen, Tianrui Liu, Jun-jie Huang, Wentao Zhao, Xing Bi, National University of Defense Technology, China; Meng Wang, Hefei University of Technology, China
  IFS-P5.3: SECURELY AND EFFICIENTLY OUTSOURCING NEURAL NETWORK INFERENCE VIA PARALLEL MSB EXTRACTION
  Xin Liu, Ning Xi, Ke Cheng, Jiaxuan Fu, Xinghui Zhu, Yulong Shen, Jianfeng Ma, Xidian University, China
  IFS-P5.4: JPEG ENCRYPTION WITH DC PREDICTION AND RUN-BASED RS PAIRS PERMUTATION
  Yanyixiao Wang, Peiya Li, Jinan University, China
  IFS-P5.5: CLPSD: DETECTING ETHEREUM PHISHING SCAMS BASED ON CURRICULUM LEARNING
  Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li, Inner Mongolia University, China
  IFS-P5.6: Gradient Inversion Attacks on Acoustic Signals: Revealing Security Risks in Audio Recognition Systems
  Pretom Roy Ovi, Aryya Gangopadhyay, University of Maryland Baltimore County, United States of America
  IFS-P5.7: IMAGE STEGANOGRAPHY WITH DEEP ORTHOGONAL FUSION OF MULTI-SCALE CHANNEL ATTENTION
  Yinyin Peng, Donghui Hu, Gang Pei, Yaofei Wang, Hefei University of Technology, China
  IFS-P5.8: ON THE PRIVACY OF FEDERATED CLUSTERING: A CRYPTOGRAPHIC VIEW
  Qiongxiu Li, Tsinghua University, China; Lixia Luo, Huawei Inc., China
  IFS-P5.9: MLMTD: A MULTI-LAYER MALICIOUS TRAFFIC DETECTION MODEL BASED ON MULTI-BRANCH OCTAVE CONVOLUTION AND ATTENTION MECHANISM
  Ziang Li, Institute of Information Engineering,  Chinese Academy of Sciences & School of Cyber Security,  University of Chinese Academy of Sciences, China; Chengxiang Si, National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC), China; Zhenyu Cheng, Shuyuan Zhao, Yong Ding, Institute of Information Engineering,  Chinese Academy of Sciences, China
  IFS-P5.10: ENHANCING STEGANOGRAPHY OF GENERATIVE IMAGE BASED ON IMAGE RETOUCHING
  Yue Gao, Jinshuai Yang, Cheng Chen, Kaiyi Pang, Yongfeng Huang, Tsinghua University, China
  IFS-P5.11: CPMSVD: Cross-Project Multiclass Software Vulnerability Detection via Fused Deep Feature and Domain Adaptation
  Gewangzi Du, Liwei Chen, Tongshuai Wu, Chenguang Zhu, Gang Shi, Chinese Academy of Sciences, China
  IFS-P5.12: A FORMAT COMPLIANT ENCRYPTION METHOD FOR 3D OBJECTS ALLOWING HIERARCHICAL DECRYPTION
  Bianca Jansen van Rensburg, William Puech, LIRMM,  Univ. Montpellier / CNRS, France; Jean-Pierre Pedeboy, Strategies Company, France
            Contacts