Abstract is missing.
- Efficient and Secure Implementation of BLS Multisignature Scheme on TPMMustapha Hedabou, Yunusa Simpa Abdulsalam. 1-6 [doi]
- Twitter Bot Detection with Reduced Feature SetJefferson Viana Fonseca Abreu, Célia Ghedini Ralha, João José Costa Gondim. 1-6 [doi]
- Political Fake Statement Detection via Multistage Feature-assisted Neural ModelingFuad Mire Hassan, Mark Lee. 1-6 [doi]
- Social Emotion Cause Extraction from Online TextsXinglin Xiao, Lei Wang, Qingchao Kong, Wenji Mao. 1-6 [doi]
- Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled DataPerry Deng, Cooper Linsky, Matthew Wright 0001. 1-6 [doi]
- A Survey of Real-Time Social-Based Traffic DetectionHashim Abu-gellban. 1-6 [doi]
- A Proxy-Based Encrypted Online Social Network With Fine-Grained AccessFabian Schillinger, Christian Schindelhauer. 1-5 [doi]
- Improving the Data Quality for Credit Card Fraud DetectionRongrong Jing, Hu Xian, Yidi Li, Xingwei Zhang, Xiaolong Zheng 0001, Zhu Zhang, Daniel Zeng. 1-6 [doi]
- A Human-Network-Security-Interface for an Average JoeRajasekhar Ganduri, Ram Dantu, Mark A. Thompson, Samuel Evans, Logan Widick. 1-6 [doi]
- Effective Voice Fuzzing Method for Finding Vulnerabilities in AI Speech Recognition DevicesSo-Hyun Park, Il-Gu Lee. 1-6 [doi]
- An Expert System for Classifying Harmful Content on the Dark WebHanae Kobayashi, Masashi Kadoguchi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto. 1-6 [doi]
- Deep Self-Supervised Clustering of the Dark Web for Cyber Threat IntelligenceMasashi Kadoguchi, Hanae Kobayashi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto. 1-6 [doi]
- A Bootstrapped Model to Detect Abuse and Intent in White Supremacist CorporaB. Simons, David B. Skillicorn. 1-6 [doi]
- Is the user identity perception influenced by the blockchain technology?Andreea-Elena Panait. 1-3 [doi]
- Analyzing the Evolutionary Characteristics of the Cluster of COVID-19 under Anti-contagion PoliciesPu Miao, Hu Tian, Xingwei Zhang, Saike He, Xiaolong Zheng 0001, Desheng Dash Wu, Daniel Zeng. 1-6 [doi]
- Conceptual Models for Counter-Terrorism and Intelligence Knowledge BasesAntonio Badia. 1-3 [doi]
- Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding ApproachSteven Ullman, Sagar Samtani, Ben Lazarine, Hongyi Zhu, Benjamin Ampel, Mark W. Patton, Hsinchun Chen. 1-6 [doi]
- Towards a Story Scheme Ontology of Terrorist MOsJ. G. T. Peters, Floris J. Bex. 1-6 [doi]
- A virtual simulation environment using deep learning for autonomous vehicles obstacle avoidanceLeila Haj Meftah, Rafik Braham. 1-7 [doi]
- Identifying Proficient Cybercriminals Through Text and Network AnalysisJan William Johnsen, Katrin Franke. 1-7 [doi]
- XGBoosted Misuse Detection in LAN-Internal Traffic DatasetZhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai. 1-6 [doi]
- Discerning User Activity in Extended Reality Through Side-Channel Accelerometer ObservationsTiago Martins Andrade, Max Smith-Creasey, Jonathan Francis Roscoe. 1-3 [doi]
- Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface WebYizhi Liu, Fang-Yu Lin, Zara Ahmad-Post, MohammadReza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li, Hsinchun Chen. 1-6 [doi]
- A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning ResearchSmirti Dwibedi, Medha Pujari, Weiqing Sun. 1-6 [doi]
- The Four-Stages Strategies on Social Media to Cope with "Infodemic" and Repair Public Trust: Covid-19 Disinformation and Effectiveness of Government Intervention in ChinaYonghan Zhu, Yuqiao Jiang. 1-5 [doi]
- Scalable Malware Clustering using Multi-Stage Tree ParallelizationMuqeet Ali, Josiah Hagen, Jonathan Oliver. 1-6 [doi]
- An Ordinal Approach to Modeling and Visualizing Phishing SusceptibilityDavid G. Dobolyi, Ahmed Abbasi, F. Mariam Zahedi, Anthony Vance. 1-6 [doi]
- Characterizing the Landscape of COVID-19 Themed Cyberattacks and DefensesMir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu. 1-6 [doi]
- Malware Family Fingerprinting Through Behavioral AnalysisAaron Walker, Shamik Sengupta. 1-5 [doi]
- Evaluating Effectiveness of Adversarial Examples on State of Art License Plate Recognition ModelsKanishk Rana, Rahul Madaan. 1-3 [doi]
- Multi-Dimensional Anomalous Entity Detection via Poisson Tensor FactorizationMaksim E. Eren, Juston S. Moore, Boian S. Alexandro. 1-6 [doi]
- Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare UsecaseMatthew Sills, Priyanka Ranade, Sudip Mittal. 1-6 [doi]
- Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim ClassificationBibek Upadhayay, Vahid Behzadan. 1-6 [doi]
- APIN: Automatic Attack Path Identification in Computer NetworksEric Ficke, Shouhuai Xu. 1-6 [doi]
- Detecting Cyber-Adversarial Videos in Traditional Social mediaBingyan Du, Pranay Singhal, Victor A. Benjamin, Weifeng Li 0002. 1-3 [doi]
- From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity TextsMoumita Das Purba, Bill Chu, Ehab Al-Shaer. 1-6 [doi]
- Heuristic Phishing Detection and URL Checking Methodology Based on Scraping and Web CrawlingRômulo Almeida, Carla M. Westphall. 1-6 [doi]
- Data-Driven Characterization and Detection of COVID-19 Themed Malicious WebsitesMir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu. 1-6 [doi]
- Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning ApproachBenjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen. 1-6 [doi]
- A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark WebNing Zhang, MohammadReza Ebrahimi, Weifeng Li, Hsinchun Chen. 1-6 [doi]
- DeepGuard: Deep Generative User-behavior Analytics for Ransomware DetectionGaddisa Olani Ganfure, Chun-Feng Wu, Yuan-Hao Chang, Wei Kuan Shih. 1-6 [doi]
- Phishcasting: Deep Learning for Time Series Forecasting of Phishing AttacksSyed Hasan Amin Mahmood, Syed Mustafa Ali Abbasi, Ahmed Abbasi, Fareed Zaffar. 1-6 [doi]
- Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement LearningArnab Bhattacharya, Thiagarajan Ramachandran, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar. 1-6 [doi]
- Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and BehaviorAritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin. 1-6 [doi]
- Fraud Prevention Within the Brazilian Governmental Public-Key InfrastructureFernanda Oliveira Gomes, Bruno Machado Agostinho, Jean Everson Martina. 1-6 [doi]
- Adaptive and Predictive SDN Control During DDoS AttacksJagannadh Vempati, Ram Dantu, Syed Badruddoja, Mark A. Thompson. 1-6 [doi]
- Assessing GAN-based approaches for generative modeling of crime text reportsSamira Khorshidi, George O. Mohler, Jeremy G. Carter. 1-6 [doi]
- Detection of Malicious Domains Using Passive DNS with XGBoostMarcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi. 1-3 [doi]
- Performance Analysis of Secure Real-time Transport Protocol Using Elliptic CurvesNilanjan Sen, Ram Dantu, Mark A. Thompson. 1-7 [doi]
- A KG-based Enhancement Framework for Fact Checking Using Category InformationShuai Wang, Lei Wang, Wenji Mao. 1-6 [doi]
- Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding ApproachBen Lazarine, Sagar Samtani, Mark W. Patton, Hongyi Zhu, Steven Ullman, Benjamin Ampel, Hsinchun Chen. 1-6 [doi]