Evaluation of Secure Remote Offering Service for Information Bank |
Keita Kayaba (FUJITSU LABORATORIES LTD.); Hidenobu Oguri (FUJITSU LABORATORIES LTD.); Yuji Yamaoka (FUJITSU LABORATORIES LTD.) |
A Score Fusion Method by Neural Network in Multi-Factor Authentication |
Katsuya Matsuoka (The University of Tokyo); Mhd Irvan (The University of Tokyo); Ryosuke Kobayashi (The University of Tokyo); Rie Shigetomi Yamaguchi (The University of Tokyo) |
Service-Oriented Modeling for Cyber Threat Analysis |
Kees Leune (Adelphi University); Sung Kim (Adelphi University) |
DRAT: A Drone Attack Tool for Vulnerability Assessment |
Mohammad Shameel Bin Mohammad Fadilah (University of Glasgow); Vivek Balachandran (Singapore Institute of Technology); Peter Loh (Singapore Institute of Technology); Melissa Chua (Defence Science and Technology Agency) |
GRAMAC: A Graph Based Android Malware Classification Mechanism |
Devyani Vij (Indian Institute of Information Technology and Management - Kerala); Vivek Balachandran (Singapore Institute of Technology); Tony Thomas (Indian Institute of Information Technology and Management - Kerala); Roopak Surendran (Indian Institute of Information Technology and Management - Kerala) |
A Performance Study on Cryptographic Algorithms for IoT Devices |
Eduardo Anaya (California State University, Sacramento); Jimil Patel (California State University, Sacramento); Prerak Shah (California State University, Sacramento); Vrushank Shah (California State University, Sacramento); Yuan Cheng (California State University, Sacramento) |
A Performance Comparison of WireGuard and OpenVPN |
Steven Mackey (California State University, Sacramento); Ivan Mihov (California State University, Sacramento); Alex Nosenko (California State University, Sacramento); Francisco Vega (California State University, Sacramento); Yuan Cheng (California State University, Sacramento) |
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries |
Peeyush Gupta (University of California, Irvine); Yin Li (Xinyang Normal University); Sharad Mehrotra (University of California, Irvine); Nisha Panwar (University of California, Irvine); Shantanu Sharma (University of California, Irvine) |
Poisoning Attacks in Federated Learning - an Evaluation on Traffic Sign Datasets |
Florian Nuding (Vienna University of Technology); Rudolf Mayer (SBA Research gGmbH & Vienna University of Technology) |
On the Impact of Word Representation in Hate Speech and Offensive Language Detection and Explanation |
Ruijia Hu (Clemson University); Wyatt Dorris (Clemson University); Nishant Vishwamitra (Clemson University); Feng Luo (Clemson University); Matthew Costello (Clemson University) |
Deployment-quality and Accessible Solutions for Cryptography Code Development |
Sazzadur Rahaman (Virginia Tech); Ya Xiao (Virginia Tech); Sharmin Afrose (Virginia Tech); Ke Tian (Virginia Tech); Miles Frantz (Virginia Tech); Na Meng (Virginia Tech); Barton Miller (University of WIsconsin-Madison); Fahad Shaon (UT Dallas); Murat Kantarcioglu (UT Dallas); Danfeng Yao (Virginia Tech) |
A Comprehensive Benchmark on Java Cryptographic API Misuses |
Sharmin Afrose (Virginia Tech); Sazzadur Rahaman (Virginia Tech); Danfeng Yao (Virginia Tech) |