Title Authors
Evaluation of Secure Remote Offering Service for Information Bank Keita Kayaba (FUJITSU LABORATORIES LTD.); Hidenobu Oguri (FUJITSU LABORATORIES LTD.); Yuji Yamaoka (FUJITSU LABORATORIES LTD.)
A Score Fusion Method by Neural Network in Multi-Factor Authentication Katsuya Matsuoka (The University of Tokyo); Mhd Irvan (The University of Tokyo); Ryosuke Kobayashi (The University of Tokyo); Rie Shigetomi Yamaguchi (The University of Tokyo)
Service-Oriented Modeling for Cyber Threat Analysis Kees Leune (Adelphi University); Sung Kim (Adelphi University)
DRAT: A Drone Attack Tool for Vulnerability Assessment Mohammad Shameel Bin Mohammad Fadilah (University of Glasgow); Vivek Balachandran (Singapore Institute of Technology); Peter Loh (Singapore Institute of Technology); Melissa Chua (Defence Science and Technology Agency)
GRAMAC: A Graph Based Android Malware Classification Mechanism Devyani Vij (Indian Institute of Information Technology and Management - Kerala); Vivek Balachandran (Singapore Institute of Technology); Tony Thomas (Indian Institute of Information Technology and Management - Kerala); Roopak Surendran (Indian Institute of Information Technology and Management - Kerala)
A Performance Study on Cryptographic Algorithms for IoT Devices Eduardo Anaya (California State University, Sacramento); Jimil Patel (California State University, Sacramento); Prerak Shah (California State University, Sacramento); Vrushank Shah (California State University, Sacramento); Yuan Cheng (California State University, Sacramento)
A Performance Comparison of WireGuard and OpenVPN Steven Mackey (California State University, Sacramento); Ivan Mihov (California State University, Sacramento); Alex Nosenko (California State University, Sacramento); Francisco Vega (California State University, Sacramento); Yuan Cheng (California State University, Sacramento)
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries Peeyush Gupta (University of California, Irvine); Yin Li (Xinyang Normal University); Sharad Mehrotra (University of California, Irvine); Nisha Panwar (University of California, Irvine); Shantanu Sharma (University of California, Irvine)
Poisoning Attacks in Federated Learning - an Evaluation on Traffic Sign Datasets Florian Nuding (Vienna University of Technology); Rudolf Mayer (SBA Research gGmbH & Vienna University of Technology)
On the Impact of Word Representation in Hate Speech and Offensive Language Detection and Explanation Ruijia Hu (Clemson University); Wyatt Dorris (Clemson University); Nishant Vishwamitra (Clemson University); Feng Luo (Clemson University); Matthew Costello (Clemson University)
Deployment-quality and Accessible Solutions for Cryptography Code Development Sazzadur Rahaman (Virginia Tech); Ya Xiao (Virginia Tech); Sharmin Afrose (Virginia Tech); Ke Tian (Virginia Tech); Miles Frantz (Virginia Tech); Na Meng (Virginia Tech); Barton Miller (University of WIsconsin-Madison); Fahad Shaon (UT Dallas); Murat Kantarcioglu (UT Dallas); Danfeng Yao (Virginia Tech)
A Comprehensive Benchmark on Java Cryptographic API Misuses Sharmin Afrose (Virginia Tech); Sazzadur Rahaman (Virginia Tech); Danfeng Yao (Virginia Tech)