IFS-5: Privacy and Information Security |
| Session Type: Poster |
| Time: Thursday, 10 June, 15:30 - 16:15 |
| Location: Gather.Town |
| Virtual Session: View on Virtual Platform |
| Session Chair: Victor Sanchez, University of Warwick |
| IFS-5.1: STEP-GAN: A ONE-CLASS ANOMALY DETECTION MODEL WITH APPLICATIONS TO POWER SYSTEM SECURITY |
| Mohammad Adiban; Norwegian University of Science and Technology |
| Arash Safari; University of Tehran |
| Giampiero Salvi; Norwegian University of Science and Technology |
| IFS-5.2: APPLICATION-LAYER DDOS ATTACKS WITH MULTIPLE EMULATION DICTIONARIES |
| Michele Cirillo; University of Salerno |
| Mario Di Mauro; University of Salerno |
| Vincenzo Matta; University of Salerno |
| Marco Tambasco; University of Salerno |
| IFS-5.3: SECRET KEY GENERATION OVER WIRELESS CHANNELS USING SHORT BLOCKLENGTH MULTILEVEL SOURCE POLAR CODING |
| Henri Hentilä; Aalto University |
| Yanina Shkel; Ecole Polytechnique Fédérale de Lausanne (EPFL) |
| Visa Koivunen; Aalto University |
| IFS-5.4: EFFICIENT NETWORK PROTECTION GAMES AGAINST MULTIPLE TYPES OF STRATEGIC ATTACKERS |
| Zhifan Xu; Rutgers University |
| Melike Baykal-Gursoy; Rutgers University |
| IFS-5.5: DETECTION OF MALICIOUS DNS AND WEB SERVERS USING GRAPH-BASED APPROACHES |
| Jinyuan Jia; Duke University |
| Zheng Dong; Microsoft Corporation |
| Jie Li; Microsoft Corporation |
| Jack W. Stokes; Microsoft Research |
| IFS-5.6: LOW COMPLEXITY SECURE P-TENSOR PRODUCT COMPRESSED SENSING RECONSTRUCTION OUTSOURCING AND IDENTITY AUTHENTICATION IN CLOUD |
| Mengdi Wang; Chongqing University |
| Di Xiao; Chongqing University |
| Jia Liang; Chongqing University |