AITS Workshop
Authenticating Mobile Wireless Device Through Per-packet Channel State Information |
|
Bing Chen (Southeast University)
Yubo Song (Southeast University)
Zhenchao
Zhu (Southeast University)
Shang Gao (Southeast University)
Junbo Wang (Southeast University)
Aiqun Hu (Southeast University) |
Insight into traffic security: A correlation discovery of urban spatial features and traffic flow patterns |
|
Juhua Pu (Research Institute of Beihang University in Shenzhen.)
Zhuang Liu (Engineering Research Center of ACAT, Ministry of Education.)
Yue Wang (Engineering Research Center of ACAT, Ministry of Education.)
Xingwu Liu (SKL
Computer Architecture, ICT, CAS; University of Chinese Academy of Sciences;
School of Mathematical Sciences, Dalian University of Technology.) |
BBregLocator: A Vulnerability Detection System Based on Bounding Box Regression |
|
Junfeng Tian (School of Cyberspace Security and Computer Institute Hebei
University)
Junkun Zhang (School of Cyberspace Security and Computer Institute
Hebei University)
Fanming Liu (School of Cyberspace Security and Computer
Institute Hebei University) |
Automatically Constructing Peer Slices via Semantic- and Context-Aware Security Checks in the Linux Kernel |
|
Yongzhi Liu (School of Software and Microelectronics, Peking University, Beijing,
China) |
Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder |
|
Qunke Wang (Southeast University)
Lanting Fang (Southeast University, Purple
Mountain Laboratory)
Zhenchao Zhu (Southeast University, Purple Mountain
Laboratory, Jiangsu Provincial Key Laboratory of Network and Information
Security)
Jie Huang (Southeast University, Purple Mountain Laboratory) |
Network Intrusion Detection Based on Active Semi-supervised Learning |
|
Yong Zhang (School of Electronic Engineering, Beijing University of Posts and
Telecommunication)
Jie Niu (School of Electronic Engineering, Beijing University
of Posts and Telecommunication)
Guojian He (Physical Education Department,
Hebei University of Economics and Business)
Lin Zhu (China Mobile Research
Institute)
Da Guo (School of Electronic Engineering, Beijing University of Posts
and Telecommunication) |
A Statistical Learning Model with Deep Learning Characteristics |
|
Lei Liao (National Computer Network Intrusion Protection Center, University of
Chinese Academy of Sciences)
Zhiqiu Huang (National Computer Network
Intrusion Protection Center, University of Chinese Academy of Sciences)
Wenjie
Wang (National Computer Network Instrusion Protection Center, University of
Chinese Academy of Sciences) |
Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior |
|
Xiao Yu (Xidian University)
Yiyu Yang (University of Chinese of Academy of
Sciences)
Wenjie Wang (University of Chinese of Academy of Sciences)
Yuqing
Zhang (University of Chinese of Academy of Sciences) |
Sensitive Instruction Detection Based on the Context of IoT Sensors |
|
Yucheng Wang (Xidian University)
Xuejun Li (Xidian University)
Peiyang Jia (Xidian University)
Yiyu Yang (University of Chinese Academy of Sciences)
He
Wang (Xidian University) |
Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster |
|
Yuqing Zhang (National Computer Network Intrusion Protection Center,
University of Chinese Academy of Sciences, Beijing, China. School of Computer
Science and Cyberspace Security, Hainan University, Haikou, China .College of
Information Science and Engineering, Yanshan University, Qinhuangdao , China)
Wenjie Wang (National Computer Network Intrusion Protection Center,
University of Chinese Academy of Sciences, Beijing, China)
Haitao He (National
Computer Network Intrusion Protection Center, University of Chinese Academy of
Sciences, Beijing, China †School of CompCollege of Information Science and
Engineering, Yanshan University, Qinhuangdao , China) |
|