IFS-P4: Network and System Security
Thu, 18 Apr, 13:10 - 15:10 (UTC +9)
Location: Poster Zone 1B
Session Type: Poster
Session Chair: Remi Cogranne, University of Troyes
Track: Information Forensics and Security
Click the to view the manuscript on IEEE Xplore Open Preview
 

IFS-P4.1: SourceP: Detecting Ponzi Schemes on Ethereum with Source Code

Pengcheng Lu, Liang Cai, Yin Keting, Zhejiang University, China
 

IFS-P4.2: TRANSFORMER MODEL WITH MULTI-TYPE CLASSIFICATION DECISIONS FOR INTRUSION ATTACK DETECTION OF TRACK TRAFFIC AND VEHICLE

Quanlong Guan, Tian Zhang, Yu Qin, Yuyu Zhou, Yangguang Zhu, Jinan University, China; Yuansheng Zhong, Guangdong Testing Institute of Product Quality Supervision, China; Xiujie Huang, Jinan University, China; Zhifei Duan, Guangzhou XPeng Motors Technology Co. Ltd, China; Zhefu Li, Jinan University, China; Changjiang Liu, Guangdong Testing Institute of Product Quality Supervision, China; Xiaofeng Wu, Guangzhou Polytechnic of Sports, China
 

IFS-P4.3: UNCOVERING STRONG TIES: A STUDY OF INDIRECT SYBIL ATTACK ON SIGNED SOCIAL NETWORK

Yu Bu, Yulin Zhu, Longling Geng, Kai Zhou, The Hong Kong Polytechnic University, Hong Kong
 

IFS-P4.4: A TARGETED ADVERSARIAL ATTACK METHOD FOR MULTI-CLASSIFICATION MALICIOUS TRAFFIC DETECTION

Peishuai Sun, Institute of Information Engineering, Chinese Academy of Sciences, China; Chengxiang Si, National Computer Network Emergency Response Technical Team/Coordination Center of China, China; Shuhao Li, Zhongguancun Laboratory, China; Zhenyu Cheng, Shuyuan Zhao, Qingyun Liu, Institute of Information Engineering, Chinese Academy of Sciences, China

IFS-P4.5: HOW TO DISTURB NETWORK RECONNAISSANCE: A MOVING TARGET DEFENSE APPROACH BASED ON DEEP REINFORCEMENT LEARNING

Tao Zhang, Beijing Jiaotong University, China; Changqiao Xu, Beijing University of Posts and Telecommunications, China; Jiahao Shen, Beihang University, China; Xiaohui Kuang, Beijing University of Posts and Telecommunications, China; Luigi Alfredo Grieco, Politecnico di Bari, Italy

IFS-P4.6: Absolute Security in Terahertz Wireless Links

Alejandro Cohen, Technion, Israel; Rafael G. L. D’Oliveira, Clemson University, United States of America; Chia-Yi Yeh, MIT, United States of America; Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Brown University, United States of America; Edward W. Knightly, Rice University, United States of America; Muriel Médard, MIT, United States of America; Daniel M. Mittleman, Brown University, United States of America
 

IFS-P4.8: Least-Effort Adversarial Attack Against Gait-based Identity Recognition System

Jianmin Dong, Zhejiang Lab, China; Da-Tian Peng, Northwestern Polytechnical University, China; Taihao Li, Zhejiang Lab, China
 

IFS-P4.9: HARNESSING THE POWER OF LARGE VISION LANGUAGE MODELS FOR SYNTHETIC IMAGE DETECTION

Mamadou Keita, Univ. Polytechnique Hauts-de-France, France; Wassim Hamidouche, Technology Innovation Institute, United Arab Emirates; Hassen Bougueffa, Univ. Polytechnique Hauts-de-France, France; Abdenour Hadid, Sorbonne Center for Artificial Intelligence, Sorbonne University, United Arab Emirates; Abdelmalik Taleb-Ahmed, Univ. Polytechnique Hauts-de-France, France
 

IFS-P4.10: DISCOVERING MALICIOUS SIGNATURES IN SOFTWARE FROM STRUCTURAL INTERACTIONS

Chenzhong Yin, Hantang Zhang, Mingxi Cheng, Xiongye Xiao, Xinghe Chen, Xin Ren, Paul Bogdan, University of Southern California, United States of America