IFS-P4.3

WHEN SIGNALS BEND: CURVATURE-GUIDED SELECTIVE GRAPH REWIRING FOR FEW-SHOT BOT DETECTION

Bradley Ashmore, Wright State University, United States of America; Lingwei Chen, Rochester Institute of Technology, United States of America

Session:
IFS-P4: Representation Learning and Structural Methods Poster

Track:
Information Forensics and Security [IF]

Location:
Poster Area 24

Presentation Time:
Tue, 5 May, 16:30 - 18:30

Presentation
Discussion
Resources
No resources available.
Session IFS-P4
IFS-P4.1: Nethira: A Heterogeneity-aware Hierarchical Pre-trained Model for Network Traffic Classification
Chungang Lin, Weiyao Zhang, Haitong Luo, Xuying Meng, Yujun Zhang, Institute of Computing Technology, Chinese Academy of Sciences, China
IFS-P4.2: DIFFACLFSMD: DIFFUSION-AUGMENTED CONTRASTIVE LEARNING FOR FEW-SHOT MALWARE DETECTION
Shumian Yang, Wenyuan Hou, Xin Li, Dawei Zhao, Lijuan Xu, Jiabin Yang, Qilu University of Technology (Shandong Academy of Sciences), China
IFS-P4.3: WHEN SIGNALS BEND: CURVATURE-GUIDED SELECTIVE GRAPH REWIRING FOR FEW-SHOT BOT DETECTION
Bradley Ashmore, Wright State University, United States of America; Lingwei Chen, Rochester Institute of Technology, United States of America
IFS-P4.4: CHANGE-AWARE TEMPORAL ALIGNMENT ON HETEROGENEOUS GRAPH SNAPSHOTS FOR INSIDER THREAT DETECTION
Min Yang, YingJie Zhou, Di Wu, Sichuan University, China; Guansong Pang, Singapore Management University, Singapore; Ce Zhu, University of Electronic Science and Technology of China, China
IFS-P4.5: DIFFUSION-BASED NATURAL ADVERSARIAL PERTURBATIONS TOWARDS SEGMENT ANYTHING MODEL
Haodong Xiao, Harbin Institute of Technology, Shenzhen, China; Wenbo Yu, Hao Fang, Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, China; Shuoyang Sun, Bin Chen, Xuan Wang, Harbin Institute of Technology, Shenzhen, China; Shu-Tao Xia, Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, China
IFS-P4.6: DPO-REGULARIZED REGRESSION FOR AGE PREDICTION
Mahsa Zamani, Rita Singh, Bhiksha Raj, Carnegie Mellon University, United States of America
IFS-P4.7: STYLE ATTACK DISGUISE: WHEN FONTS BECOME A CAMOUFLAGE FOR ADVERSARIAL INTENT
Yangshijie Zhang, Lanzhou University, China; Xinda Wang, Jialin Liu, Peking University, China; Wenqiang Wang, Sun Yat-sen University, China; Zhicong Ma, Xingxing Jia, Lanzhou University, China
IFS-P4.8: THEMIS: Bridging Documentation and Code to Uncover Access Control Vulnerabilities in GitLab
Yujie Sun, Huina Chao, Yeting Li, Xinyi Wang, Institute of Information Engineering, Chinese Academy of Sciences, China; Yiming Liu, eSurfing Cloud, China Telecom, China; Jialun Cao, The Hong Kong University of Science and Technology, China; Qin Mai, Hengyu Yang, Feng Li, Wei Huo, Baoxu Liu, Institute of Information Engineering, Chinese Academy of Sciences, China
IFS-P4.9: Fake Path Co-Construction Source Location Privacy Protection Scheme Design For UWSNs
Ming-Hao Wei, Chih-Min Chao, Chih-Yu Lin, Chun-Chao Yeh, National Taiwan Ocean University, Taiwan
IFS-P4.10: IDENTITY LEAKAGE THROUGH ACCENT CUES IN VOICE ANONYMISATION
Rayane Bakari, Olivier Le Blouch, Nicolas Gengembre, Orange, France; Nicholas Evans, Michele Panariello, EURECOM, France
Contacts