Workshop Accepted Papers
8th Workshop on Safety and Security in Intelligent Vehicles (SSIV)
- Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications
Aawista Chaudhry (Queen’s University), Talal Halabi (University of Winnipeg), Mohammad Zulkernine (Queen’s University)
- Certify the Uncertified: Towards Assessment of Virtualization for Mixed-criticality in the Automotive Domain [teaser video]
Marcello Cinque (Universita degli Studi di Napoli Federico II), Luigi De Simone (Universita degli Studi di Napoli Federico II), Andrea Marchetta (Universita degli Studi di Napoli Federico II)
- Tiny Black Boxes: A nano-Drone Safety Architecture
Connor Sexton (California Polytechnic State University/ San Luis Obispo), Joseph Callenes (California Polytechnic State University/ San Luis Obispo)
- Alternative Route-Based Attacks in Metropolitan Traffic Systems [teaser video]
Sidney La Fontaine (Northeastern University - United States), Naveen Muralidhar (Northeastern University - United States), Michael Clifford (Toyota InfoTech Labs - United States), Tina Eliassi-Rad (Northeastern University - United States), Cristina Nita-Rotaru (Northeastern University - United States)
5th Workshop on Dependable and Secure Machine Learning (DSML)
- Autonomous Attack Mitigation for Industrial Control Systems [teaser video]
John Mern (Stanford University), Kyle Hatch (Stanford University), Ryan Silva (Johns Hopkins University Applied Physics Laboratory), Cameron Hickert (Johns Hopkins University Applied Physics Laboratory), Tamim Sookoor (Johns Hopkins University Applied Physics Laboratory), Mykel J. Kochenderfer (Stanford University)
- Federated Learning with Anomaly Client Detection and Decentralized Parameter Aggregation
Shu Liu (Beijing University of Posts and Telecommunications), Yanlei Shang (Beijing University of Posts and Telecommunications)
- Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems [teaser video] [full video]
Xugui Zhou (University of Virginia), Maxfield Kouzel (University of Virginia), Homa Alemzadeh (University of Virginia)
- On the impact of non-IID data on the performance and fairness of differentially private federated learning [teaser video]
Saba Amiri (University of Amsterdam), Adam Belloum (University of Amsterdam), Eric Nalisnick (University of Amsterdam), Sander Klous (University of Amsterdam), Leon Gommans (Air France - KLM)
- A Novel Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs
Arunava Roy (The University of Memphis), dipankar dasgupta (The University of Memphis)
- Towards Building Resilient Ensembles against Training Data Faults
Abraham Chan (The University of British Columbia), Arpan Gujarati (The University of British Columbia), Karthik Pattabiraman (The University of British Columbia), Sathish Gopalakrishnan (The University of British Columbia)
- General Probability in Coq [teaser video] [full video]
Avraham Shinnar (IBM Research), Barry Trager (IBM Research)
4th Workshop on Data-Centric Dependability and Security (DCDS)
- Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems [teaser video] [full video]
Sahiti Bommareddy (Johns Hopkins University), Benjamin Gilby (University of Pittsburgh), Maher Khan (University of Pittsburgh), Imes Chiu (U.S. Army Corps of Engineers (USACE)), Mathaios Panteli (University of Cyprus), John van de Lindt (Colorado State University), Linton Wells (George Mason University), Yair Amir (Johns Hopkins University), Amy Babay (University of Pittsburgh)
- Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols [teaser video] [full video]
Stephan Kleber (Ulm University), Milan Stute (Technische Universität Darmstadt), Matthias Hollick (Technische Universität Darmstadt), Frank Kargl (Ulm University)
- A Dataset of Linux Failure Data for Dependability Evaluation and Improvement [teaser video]
João R. Campos (University of Coimbra), Ernesto Costa (University of Coimbra), Marco Vieira (University of Coimbra)
- Privacy Leakage Analysis for Colluding Smart Apps
Junzhe Wang (University of South Carolina), Lannan Luo (University of South Carolina)
- A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks [full video]
Tina Moghaddam (University of Queensland), Minjune Kim (University of Queensland), Jin-Hee Cho (Virginia Tech), Hyuk Lim (Korea Institute of Energy Technology (KENTECH)), Terrence J. Moore (US Army Research Lab.), Frederica F. Nelson (US Army Research Lab.), Dan Dongseong Kim (University of Queensland)
2nd Workshop on Artificial Intelligence To Security (AITS)
- Repairing Security Vulnerabilities Using Pre-trained Programming Language Models [teaser video] [full video]
Kai Huang (Xidian University), Su Yang (University of Chinese Academy of Sciences), Hongyu Sun (Xidian University), Chengyi Sun (University of Chinese Academy of Sciences), Xuejun Li (Xidian University), Yuqing Zhang (University of Chinese Academy of Sciences)
- An Overview of Sybil Attack Detection Mechanisms in VFC [teaser video] [full video]
Haonan Yang (Hainan University & National Computer Network Intrusion Prevention Center), Yongchao Zhong (Hainan University & National Computer Network Intrusion Prevention Center), Bo Yang (Hainan University & National Computer Network Intrusion Prevention Center), Yiyu Yang (National Computer Network Intrusion Prevention Center), Zifeng Xu (School of Cyberspace Security), Longjuan Wang (School of Cyberspace Security), Yuqing Zhang (Hainan University & National Computer Network Intrusion Prevention Center)
- A Chinese multi-modal relation extraction model for internet security of finance [teaser video] [full video]
Qinghan Lai (School of Computer Science and Technology. Qilu University of Technology (Shandong Academy of Sciences)), Shuai Ding (School of Computer Science and Technology. Qilu University of Technology (Shandong Academy of Sciences)), Jinghao Gong (School of Computer Science and Technology. Qilu University of Technology (Shandong Academy of Sciences)), Jin'An Cui (School of Computer Science and Technology. Qilu University of Technology (Shandong Academy of Sciences)), Song Liu (School of Computer Science and Technology. Qilu University of Technology (Shandong Academy of Sciences))
- SbrPBert: A BERT-Based Model for Accurate Security Bug Report Prediction [teaser video]
Xudong Cao (National Computer Network Intrusion Protection Center), Tianwei Liu (School of Cyber Engineering), Jiayuan Zhang (School of Computer and Communication), Mengyue Feng (National Computer Network Intrusion Protection Center), Xin Zhang (School of Cyberspace Security), Wanying Cao (National Computer Network Intrusion Protection Center), Hongyu Sun (School of Cyber Engineering), Yuqing Zhang (University of Chinese Academy of Sciences)
- SCUC-DSAC: A Data Sharing Access Control Model Based on Smart Contract and User Credit [teaser video]
Guangxia Xu (Guangzhou University), Li Wang (Chongqing University of Posts and Telecommunications)
- Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey [teaser video] [full video]
Yuhao Lin (Hainan University), Ying Li (Hainan University), Mianxue Gu (Hainan University), Hongyu Sun (Xidian University), Qiuling Yue (Hainan University), Jinglu Hu (Waseda University), Chunjie Cao (Hainan University), Yuqing Zhang (University of Chinese Academy of Sciences)
- Multi-authoritative Users Assured Data Deletion Scheme in Cloud Computing [teaser video] [full video]
Junfeng Tian (Hebei University), Ruxin Bai (Hebei University), Tianfeng Zhang (Hebei University)
- A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection [teaser video]
Wenbin Yao (School of Computer Science), Longcan Hu (Beijing University of Posts and Telecommunications), Xiaoyong Li (School of Cyberspace Security)
- Machine Learning Analysis of Memory Images for Process Characterization and Malware Detection
Seth Lyles (Lawrence Livermore National Laboratory), Kristine Monteith (Lawrence Livermore National Laboratory)
- Blockchain-Based Incentive and Arbitrable Data Auditing Scheme [teaser video] [full video]
Junfeng Tian (School of Cyberspace Security and Computer), Qianqian Song (School of Cyberspace Security and Computer), Haoning Wang (School of Cyberspace Security and Computer)
- A Comprehensive Dynamic Quality Assessment Method for Threat Intelligence
Menghan Wang (School of Cyberspace Security), Libin Yang (School of Cyberspace Security), Wei Lou (Department of Computing)
- DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing [teaser video] [full video]
Ruizhong Du (Hebei University), Yan Gao (Hebei University)
- VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning [teaser video] [full video]
Xin Zhang (School of Cyberspace Security), Hongyu Sun (School of Cyber Engineering), Zhipeng He (School of Cyberspace Security), Mianxue Gu (School of Cyberspace Security), Yuqing Zhang (National Computer Network Intrusion Protection Center)
- Dynamic Multipath Routing Mechanism for Multimedia Data Flow Scheduling Over Software Defined Networks
Wu Jiawei (College of Information Engineering), Qiao Xiuquan (Beijing University of Posts and Telecommunications), Lu Luhujuan (College of Information Engineering)