| 2021 | A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis. Yuan Tian, Nan Xu, Wenji Mao, Yin Luo |
| 2021 | A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations. Vishnuvardhan V. Iyer, Meizhi Wang, Jaydeep P. Kulkarni, Ali E. Yilmaz |
| 2021 | Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data. Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah |
| 2021 | Analysis and detection of application-independent slow Denial of Service cyber attacks. Marek Sikora, Radek Fujdiak, Jiri Misurec |
| 2021 | Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations. Xingwei Zhang, Xiaolong Zheng, Wenji Mao |
| 2021 | Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen |
| 2021 | Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication. Lina Zhou, Kanlun Wang, Jianwei Lai, Dongsong Zhang |
| 2021 | Boosting Hidden Graph Node Classification for Large Social Networks. Hanxuan Yang, Qingchao Kong, Wenji Mao, Lei Wang |
| 2021 | Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19. Abdulrahman Aldkheel, Lina Zhou, Kanlun Wang |
| 2021 | Credible Influence Analysis in Mass Media Using Causal Inference. Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai, Daniel Dajun Zeng |
| 2021 | Cyber Security Threat Intelligence Monitoring and Classification. Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu |
| 2021 | Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi |
| 2021 | Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations. Stefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang, D. Kim Rossmo |
| 2021 | Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. Benjamin Ampel, Hsinchun Chen |
| 2021 | Domain-oriented News Recommendation in Security Applications. Ying Sun, Qingchao Kong, Luwen Huangfu, Jin Pan |
| 2021 | Emotional Analysis of Learning Cybersecurity with Games. Maria Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang |
| 2021 | Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model. Tianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang |
| 2021 | Exploring Differences Among Darknet and Surface Internet Hacking Communities. Zhiyuan Ding, Victor A. Benjamin, Weifeng Li, Xueyan Yin |
| 2021 | Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen |
| 2021 | Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling Study. Yunrong Yang, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang, Yin Luo |
| 2021 | Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection. Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen |
| 2021 | Generating Optimal Attack Paths in Generative Adversarial Phishing. Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi |
| 2021 | IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021 |
| 2021 | Identifying Corporate Political Trends Online. Lauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels |
| 2021 | Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. Tala Vahedi, Benjamin Ampel, Sagar Samtani, Hsinchun Chen |
| 2021 | Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information. Moojan Pordelkhaki, Shereen Fouad, Mark B. Josephs |
| 2021 | Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study. Othmane Cherqi, Hicham Hammouchi, Mounir Ghogho, Houda Benbrahim |
| 2021 | Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model. Haoda Qian, Liping Chen, Qiwen Zha |
| 2021 | Quantifying Use and Abuse of Personal Information. Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels |
| 2021 | Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen |
| 2021 | The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique. Brett A. Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin |
| 2021 | Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. Martin Husák |
| 2021 | Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network. Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu |
| 2021 | User Role Identification in Software Vulnerability Discussions over Social Networks. Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn |
| 2021 | Verbal Deception Cue Training for the Detection of Phishing Emails. Jaewan Lim, Lina Zhou, Dongsong Zhang |