bandeauDSN_2021.jpg

AITS Workshop

        Title Author

Authenticating Mobile Wireless Device Through Per-packet Channel State Information Bing Chen (Southeast University)
Yubo Song (Southeast University)
Zhenchao Zhu (Southeast University)
Shang Gao (Southeast University)
Junbo Wang (Southeast University)
Aiqun Hu (Southeast University)

Insight into traffic security: A correlation discovery of urban spatial features and traffic flow patterns Juhua Pu (Research Institute of Beihang University in Shenzhen.)
Zhuang Liu (Engineering Research Center of ACAT, Ministry of Education.)
Yue Wang (Engineering Research Center of ACAT, Ministry of Education.)
Xingwu Liu (SKL Computer Architecture, ICT, CAS; University of Chinese Academy of Sciences; School of Mathematical Sciences, Dalian University of Technology.)

BBregLocator: A Vulnerability Detection System Based on Bounding Box Regression Junfeng Tian (School of Cyberspace Security and Computer Institute Hebei University)
Junkun Zhang (School of Cyberspace Security and Computer Institute Hebei University)
Fanming Liu (School of Cyberspace Security and Computer Institute Hebei University)

Automatically Constructing Peer Slices via Semantic- and Context-Aware Security Checks in the Linux Kernel Yongzhi Liu (School of Software and Microelectronics, Peking University, Beijing, China)

Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder Qunke Wang (Southeast University)
Lanting Fang (Southeast University, Purple Mountain Laboratory)
Zhenchao Zhu (Southeast University, Purple Mountain Laboratory, Jiangsu Provincial Key Laboratory of Network and Information Security)
Jie Huang (Southeast University, Purple Mountain Laboratory)

Network Intrusion Detection Based on Active Semi-supervised Learning Yong Zhang (School of Electronic Engineering, Beijing University of Posts and Telecommunication)
Jie Niu (School of Electronic Engineering, Beijing University of Posts and Telecommunication)
Guojian He (Physical Education Department, Hebei University of Economics and Business)
Lin Zhu (China Mobile Research Institute)
Da Guo (School of Electronic Engineering, Beijing University of Posts and Telecommunication)

A Statistical Learning Model with Deep Learning Characteristics Lei Liao (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences)
Zhiqiu Huang (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences)
Wenjie Wang (National Computer Network Instrusion Protection Center, University of Chinese Academy of Sciences)

Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior Xiao Yu (Xidian University)
Yiyu Yang (University of Chinese of Academy of Sciences)
Wenjie Wang (University of Chinese of Academy of Sciences)
Yuqing Zhang (University of Chinese of Academy of Sciences)

Sensitive Instruction Detection Based on the Context of IoT Sensors Yucheng Wang (Xidian University)
Xuejun Li (Xidian University)
Peiyang Jia (Xidian University)
Yiyu Yang (University of Chinese Academy of Sciences)
He Wang (Xidian University)

Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster Yuqing Zhang (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China. School of Computer Science and Cyberspace Security, Hainan University, Haikou, China .College of Information Science and Engineering, Yanshan University, Qinhuangdao , China)
Wenjie Wang (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China)
Haitao He (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China †School of CompCollege of Information Science and Engineering, Yanshan University, Qinhuangdao , China)