Posters > 2024
Artificial Intelligence
- Achieving Algorithmic Fairness through Label Flipping [14E-738]
- An Interactive Framework for Profiling News Media Sources [EFY-SGM]
- Data Acquisition to Improve Machine Learning Fairness through Multi-Armed Bandit [CAA-624]
- Discovering Adversarial Driving Maneuvers against Autonomous Vehicles [X6J-YHB]
- Estimating Machine Learning Model Fairness through Data Characteristics [LSF-N5O]
- Eureka: A General Framework for Black-box Differential Privacy Estimators [9LE-08J]
- Generative AI and Open-Source Intelligence: Exploring Capabilities and Privacy Implications [R0O-I3A]
- LeMix: Rehosting Embedded Systems as Linux Application for Effective Vulnerability Detection [PZM-I5M]
- LOKI: Large-scale Data Reconstruction Attack against Federated Learning [Z7F-N6R]
- Malware Language Processing “MLP”: Developing a new paradigm for malware analysis and classification using Machine Learning and Artificial Intelligence [XTV-4KM]
- Mechanism Design for Control-theoretic Objectives [8CA-6F9]
- Modeling and Detecting Falsified Vehicle Trajectories Under Data Spoofing Attacks [TIB-PYD]
- Nanomanufactured connected wearable sensors for human body digital twins [L0C-NRF]
- Preserving Fairness Generalization in Deepfake Detection [1C1-7D5]
- Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments [77C-880]
- The Trustworthiness of Large Language Models in Long Context Recall [XZL-M8E]
- Valuation-based Data Acquisition to Improve Machine Learning Fairness [GRL-CXI]
- Vigilante Defender: A Vaccination-based Defense Against Backdoor Attacks on 3D Point Clouds Using Particle Swarm Optimization [XYD-0EF]
- XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving Systems [DB3-C57]
Assured Identity and Privacy
- A Policy-Agnostic Language for Oblivious Computation [FBV-QER]
- Directed Infusion of Data (DIOD) for Secure Data Transfer [F5R-CF6]
- More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR [4ZY-3EP]
- Semi Differential Privacy [167-LNV]
- zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure [77F-590]
End System Security
- Ransomware vs Malware Classification Using Subgraph Mining of Function Call Graph [QB4-6HO]
- Secure High-Performance Interrupts For Secure High-Performance Processors [QV3-8AJ]
- Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping [T2C-OHW]
- SoK: A Defense-Oriented Evaluation of Software Supply Chain Security [OEJ-TSQ]
Human Centric Security
- Digital Guardian: Harnessing AI to Devalue False Information and Protect Public Discourse on Social Media [EB1-AF4]
- Navigating Software Supply Chain Risks: Practitioner Perspectives on Software Signing [ARE-TRM]
- Perceptions of Cyber Security Student Preparedness [RMK-785]
- Personality Traits and Resistance to Online Trust Exploitation [UXZ-NOX]
Network Security
- ASMprofiler [857-6F2]
- Attacking and Improving the Tor Directory Protocol [1B0-635]
- Centralized Hierarchical Cybersecurity Monitoring Towards Securing the Defense Industrial Base Supply Chain [MQV-AWE]
- E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection [59A-0A5]
- Explainability of Machine Learning in Intrusion Detection Systems [9B9-D35]
- Global and Distributed Reproduction Numbers of a Multilayer SIR Model with an Infrastructure Network [7VJ-4XE]
- Leo: Online ML-based Anomaly Detection at Multi-Terabit Line Rate [V1F-KLD]
- Rationality of Learning Algorithms in Repeated Games [2LU-XO4]
- RiFT: Cyber Adversary Likelihood [F27-30F]
- Sharding SMR with Optimal-size Shards for Highly Scalable Blockchains [2A4-5C9]
- Snooping Pay-over-the-Phone Transactions over Encrypted 5G/4G Voice Calls [EA7-616]
Policy, Law and Management
- A Cybersecurity Testbed for Connected and Autonomous Vehicle Systems [AD7-GC9]
- Adversarial booking attack for autonomous on-demand mobility services [LQI-VOT]
- Securing the Future: A Strategic Framework for Cyber Liability Insurance [NRJ-B7U]
Prevention, Detection and Response
- Code Blue - Gamification of Incident Response [688-E2B]
- Forensics Analysis of Oura Ring Gen 3 on Android, iOS and Cloud [41F-7C7]
- Light Curve Shape Inversion [XCJ-LVO]
- MIXED-SENSE: A Mixed Reality Sensor Emulation Framework for Test and Evaluation of UAVs Against False Data Injection Attacks [LZ7-9ED]
- Risk Assessment of Multi-Agent System Under Denial-of-Service Cyberattacks Using Reachable Set Synthesis [LDV-GNJ]
- Safety-Critical Control for Nonlinear Affine Systems with Robustness and Attack Recovery [HLK-FC4]
- SiDG-ATRID: Simulator for Data Generation for Automatic Target Recognition, Identification and Detection [KUZ-WOU]
- The Power of Digital Forensics in Smart Device Investigations [157-4E6]
- USING A MIXED DELPHI METHOD: IDENTIFY CYBER SECURE COMPETENCIES FOR OLDER ADULTS [DDA-70C]
- Using Digital Twins as a Sandbox for the Evaluation of Cyber Attacks on Avionics Networks [GIJ-RAH]
- Zero Trust Chain (ZTC): Security Solutions for 5G Networks with an O-RAN-Centric and Device-Centric Approach [XEL-SRJ]