Abstract is missing.
- PCEN: Potential Correlation-Enhanced Network for Multimodal Named Entity RecognitionJiakai Geng, Chenyang Zhang, Linjing Li, Qing Yang, Daniel Dajun Zeng. 1-6 [doi]
- MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel MalwareMaksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas. 1-3 [doi]
- Controllable News Comment Generation based on Attribute Level Contrastive LearningHanyi Zou, Nan Xu, Qingchao Kong, Wenji Mao. 1-6 [doi]
- Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding ApproachBenjamin Ampel, Kaeli Otto, Sagar Samtani, Hsinchun Chen. 1-6 [doi]
- A Two-Stage Prompt Learning Method for Jointly Predicting Topic and PersonalityYilin Wu, Minjie Yuan, Yuxuan Song, Liping Chen, Chenyu Yuan, Qiudan Li. 1-3 [doi]
- A Continual Learning Framework for Event Prediction with Temporal Knowledge GraphsFan Yang, Jie Bai, Linjing Li, Daniel Zeng 0001. 1-6 [doi]
- Learning to Listen and Listening to Learn: Spoofed Audio Detection Through Linguistic Data AugmentationZahra Khanjani, Lavon Davis, Anna Tuz, Kifekachukwu Nwosu, Christine Mallinson, Vandana P. Janeja. 1-6 [doi]
- Boosting Domain-Specific Question Answering Through Weakly Supervised Self-TrainingMinzheng Wang, Jia Cao, Qingchao Kong, Yin Luo. 1-6 [doi]
- Adversarial Topic-Aware Memory Network for Cross-Lingual Stance DetectionRuike Zhang, Nan Xu, Wenji Mao, Daniel Zeng 0001. 1-6 [doi]
- An Evolutionary Algorithm for Adversarial SQL Injection Attack GenerationMaryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari. 1-6 [doi]
- Building the Future of Intelligence, Surveillance, and Reconnaissance (ISR) Collections: The Development and Evaluation of a Collaborative ISR Tool to Support Intel AnalystsJustin M. Nelson, Timothy L. Heggedahl, Mary E. Frame, Anna M. Maresca, Bradley R. Schlessman. 1-6 [doi]
- Shoulder Surfing on Mobile Authentication: Perception vis-a-vis Performance from the Attacker's PerspectiveKanlun Wang, Lina Zhou, Dongsong Zhang, Jianwei Lai. 1-6 [doi]
- Named Entity Recognition for Epidemiological Investigation in COVID-19Chunmiao Yu, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Tianyi Luo, Jiaojiao Wang. 1-6 [doi]
- Towards Low-Barrier Cybersecurity Research and Education for Industrial Control SystemsColman McGuan, Chansu Yu, Qin Lin. 1-6 [doi]
- Change Management using Generative Modeling on Digital TwinsNilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi. 1-6 [doi]
- Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face PlatformAdhishree Kathikar, Aishwarya Nair, Ben Lazarine, Agrim Sachdeva, Sagar Samtani. 1-6 [doi]
- Neuro-Logic Learning for Relation Reasoning over Event Knowledge GraphWei Tang, Qingchao Kong, Yin Luo, Wenji Mao. 1-6 [doi]
- An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework DomainsJoshua Bolton, Lavanya Elluri, Karuna Pande Joshi. 1-6 [doi]
- SoK: Cybersecurity Regulations, Standards and Guidelines for the Healthcare SectorMaria Patrizia Carello, Alberto Marchetti-Spaccamela, Leonardo Querzoni, Marco Angelini. 1-6 [doi]
- Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer ApproachBenjamin Ampel, Tala Vahedi, Sagar Samtani, Hsinchun Chen. 1-6 [doi]
- Extracting Actionable Cyber Threat Intelligence from Twitter StreamMoumita Das Purba, Bill Chu. 1-6 [doi]
- Context-Augmented Key Phrase Extraction from Short Texts for Cyber Threat Intelligence TasksAvishek Bose, Huichen Yang, Marissa Shivers, Ahat Orazgeldiyev, William H. Hsu. 1-6 [doi]
- A Stage Model for Understanding Phishing Victimization Behavior in Embedded TrainingLina Zhou, Dongsong Zhang, Zhihui Liu. 1-6 [doi]
- Building Human Digital Twins: Cases for Intelligence and Security InformaticsWingyan Chung. 1-3 [doi]
- Vehicle Classification in Intelligent Transportation Systems Using Deep Learning and Seismic DataSherief Hashima, Mohamed H. Saad, Kohei Hatano, Hamada Rizk. 1-6 [doi]
- Dynamic Causal Modelling and Predictive Analysis for the COVID-19 PandemicWeiguang Zhang, Saike He, Peijie Zhang, Daniel Dajun Zeng. 1-6 [doi]
- Style-Driven Multi-Perspective Relevance Mining Model for Hotspot Reprint Paragraph PredictionLinzi Wang, Haoda Qian, Qiudan Li, David Jingjun Xu, Daniel Dajun Zeng. 1-6 [doi]
- AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on TwitterAbdullah Bani Melhem, Ahmed AlEroud, Zain A. Halloush. 1-6 [doi]
- Deep Learning Based Behavior Anomaly Detection within the Context of Electronic CommerceAlexander I-Chi Lai, Hung-chih Yang. 1-6 [doi]