ISI C

35 papers

YearTitle / Authors
2021A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis.
Yuan Tian, Nan Xu, Wenji Mao, Yin Luo
2021A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations.
Vishnuvardhan V. Iyer, Meizhi Wang, Jaydeep P. Kulkarni, Ali E. Yilmaz
2021Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data.
Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah
2021Analysis and detection of application-independent slow Denial of Service cyber attacks.
Marek Sikora, Radek Fujdiak, Jiri Misurec
2021Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations.
Xingwei Zhang, Xiaolong Zheng, Wenji Mao
2021Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach.
Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen
2021Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication.
Lina Zhou, Kanlun Wang, Jianwei Lai, Dongsong Zhang
2021Boosting Hidden Graph Node Classification for Large Social Networks.
Hanxuan Yang, Qingchao Kong, Wenji Mao, Lei Wang
2021Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19.
Abdulrahman Aldkheel, Lina Zhou, Kanlun Wang
2021Credible Influence Analysis in Mass Media Using Causal Inference.
Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai, Daniel Dajun Zeng
2021Cyber Security Threat Intelligence Monitoring and Classification.
Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu
2021Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase.
Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi
2021Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations.
Stefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang, D. Kim Rossmo
2021Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics.
Benjamin Ampel, Hsinchun Chen
2021Domain-oriented News Recommendation in Security Applications.
Ying Sun, Qingchao Kong, Luwen Huangfu, Jin Pan
2021Emotional Analysis of Learning Cybersecurity with Games.
Maria Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang
2021Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model.
Tianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang
2021Exploring Differences Among Darknet and Surface Internet Hacking Communities.
Zhiyuan Ding, Victor A. Benjamin, Weifeng Li, Xueyan Yin
2021Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen
2021Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling Study.
Yunrong Yang, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang, Yin Luo
2021Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection.
Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen
2021Generating Optimal Attack Paths in Generative Adversarial Phishing.
Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi
2021IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021
2021Identifying Corporate Political Trends Online.
Lauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels
2021Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach.
Tala Vahedi, Benjamin Ampel, Sagar Samtani, Hsinchun Chen
2021Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information.
Moojan Pordelkhaki, Shereen Fouad, Mark B. Josephs
2021Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study.
Othmane Cherqi, Hicham Hammouchi, Mounir Ghogho, Houda Benbrahim
2021Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model.
Haoda Qian, Liping Chen, Qiwen Zha
2021Quantifying Use and Abuse of Personal Information.
Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels
2021Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach.
James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen
2021The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique.
Brett A. Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin
2021Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents.
Martin Husák
2021Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network.
Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu
2021User Role Identification in Software Vulnerability Discussions over Social Networks.
Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn
2021Verbal Deception Cue Training for the Detection of Phishing Emails.
Jaewan Lim, Lina Zhou, Dongsong Zhang