Title | Authors (primary affiliation) |
Synthetic Malware Using Deep Variational Autoencoders and Generative Adversarial Networks | Aaron Choi (San Jose State University, USA); Albert Giang (San Jose State University, USA); Sajit Jumani (San Jose State University, USA); David Luong (San Jose State University, USA); Fabio Di Troia (San Jose State University, USA) |
Scalable Image Clustering to screen for self-produced CSAM | Samantha Klier (University of the Bundeswehr Munich, Germany) |
ET-TextCNN: A Faster Method for Encrypted Traffic Classification Based on TextCNN | Laifeng Huang (Zhongxing Telecommunication Equipment (ZTE) Corporation, China); Zhiguo Yang (Zhongxing Telecommunication Equipment (ZTE) Corporation, China); Hongye He (Zhongxing Telecommunication Equipment (ZTE) Corporation, China); Xiangning Chen (Zhongxing Telecommunication Equipment (ZTE) Corporation, China); Jinbo Cao (Zhongxing Telecommunication Equipment (ZTE) Corporation, China); Qionghui Luo (Zhongxing Telecommunication Equipment (ZTE) Corporation / HuNan University, China) |
Massively Parallel Evasion Attacks and the Pitfalls of Adversarial Retraining | Charles Meyers (Umeå University, Sweden); Tommy Löfstedt (Umea University, Sweden); Erik Elmroth (Umea University, Sweden) |
Mitigating Adversarial Reconnaissance in IoT Anomaly Detection Systems: A Moving Target Defense Approach based on Reinforcement Learning | Arnold Osei (University of Winnipeg, Canada); Yaser Al Mtawa (University of Winnipeg, Canada); Talal Halabi (Laval University, Canada) |
Proof-of-resource: A resource-efficient consensus mechanism for IoT devices in blockchain networks | Mahmoud Abbasi (University of Salamanca, Spain); Javier Prieto (University of Salamanca, Spain); Marta Plaza-Hernandez (University of Salamanca, Spain); Juan Manuel Corchado (University of Salamanca, Spain) |