Accepted papers

TitleAuthors (primary affiliation)
Synthetic Malware Using Deep Variational Autoencoders and Generative Adversarial NetworksAaron Choi (San Jose State University, USA);
Albert Giang (San Jose State University, USA);
Sajit Jumani (San Jose State University, USA);
David Luong (San Jose State University, USA);
Fabio Di Troia (San Jose State University, USA)
Scalable Image Clustering to screen for self-produced CSAMSamantha Klier (University of the Bundeswehr Munich, Germany)
ET-TextCNN: A Faster Method for Encrypted Traffic Classification Based on TextCNNLaifeng Huang (Zhongxing Telecommunication Equipment (ZTE) Corporation, China);
Zhiguo Yang (Zhongxing Telecommunication Equipment (ZTE) Corporation, China);
Hongye He (Zhongxing Telecommunication Equipment (ZTE) Corporation, China);
Xiangning Chen (Zhongxing Telecommunication Equipment (ZTE) Corporation, China);
Jinbo Cao (Zhongxing Telecommunication Equipment (ZTE) Corporation, China);
Qionghui Luo (Zhongxing Telecommunication Equipment (ZTE) Corporation / HuNan University, China)
Massively Parallel Evasion Attacks and the Pitfalls of Adversarial RetrainingCharles Meyers (Umeå University, Sweden);
Tommy Löfstedt (Umea University, Sweden);
Erik Elmroth (Umea University, Sweden)
Mitigating Adversarial Reconnaissance in IoT Anomaly Detection Systems: A Moving Target Defense Approach based on Reinforcement LearningArnold Osei (University of Winnipeg, Canada);
Yaser Al Mtawa (University of Winnipeg, Canada);
Talal Halabi (Laval University, Canada)
Proof-of-resource: A resource-efficient consensus mechanism for IoT devices in blockchain networksMahmoud Abbasi (University of Salamanca, Spain);
Javier Prieto (University of Salamanca, Spain);
Marta Plaza-Hernandez (University of Salamanca, Spain);
Juan Manuel Corchado (University of Salamanca, Spain)