default search action
11th CNS 2023: Orlando, FL, USA
- IEEE Conference on Communications and Network Security, CNS 2023, Orlando, FL, USA, October 2-5, 2023. IEEE 2023, ISBN 979-8-3503-3945-1
- Nilesh Chakraborty, Youssef Yamout, Mohammad Zulkernine:
The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords. 1-5 - Bryan Martin, Chad A. Bollmann:
Self-similarity based network anomaly detection for industrial control systems. 1-6 - Subir Halder, Amrita Ghosal, Thomas Newe, Sajal K. Das:
SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT. 1-9 - Mohamed el Shehaby, Ashraf Matrawy:
The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster). 1-2 - Sean Dougherty, Abhinav Kumar, Jie Hou, Reza Tourani, Atena M. Tabakhi:
A Stealthy Inference Attack on Split Learning with a Split-Fuse Defensive Measure. 1-9 - Martin Husák, Michal Javorník:
Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. 1-6 - Akib Jawad Nafis, Omar Chowdhury, Md. Endadul Hoque:
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime. 1-9 - Radi Abubaker, Guang Gong:
High-speed OFDM Physical-Layer Key Exchange. 1-9 - Madeena Sultana, Adrian Taylor, Li Li, Suryadipta Majumdar:
Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation. 1-6 - Hassan El Alami, Danda B. Rawat:
Detection of Zero-Day Attacks using CNN and LSTM in Networked Autonomous Systems 'IEEE CNS 23 Poster'. 1-2 - Andrea Corsini, Shanchieh Jay Yang:
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? 1-9 - Shujun Zhao, Lesther Santana, Evans Owusu, Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 Poster. 1-2 - M. Mehdi Kholoosi, Muhammad Ali Babar, Cemal Yilmaz:
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. 1-9 - Byron Denham, Dale R. Thompson:
Analysis of Decoy Strategies for Detecting Ransomware. 1-6 - Aditya Pathak, Irfan S. Al-Anbagi, Howard J. Hamilton:
Early-stage Conflict Detection in HLF-based Delay-critical IoT Networks. 1-6 - Xiaokai Ye, Tao Lv, Xiaohan Sun:
A Key Generation Scheme from Sensing Data for IoT Security : IEEE CNS 23 Poster. 1-2 - Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Toward Adaptive DDoS-Filtering Rule Generation. 1-9 - Shashwat Kumar, Francis Hahn, Xinming Ou, Anoop Singhal:
Security Analysis of Trust on the Controller in the Matter Protocol Specification. 1-6 - Abdurrahman Elmaghbub, Bechir Hamdaoui:
A Needle in a Haystack: Distinguishable Deep Neural Network Features for Domain-Agnostic Device Fingerprinting. 1-9 - Trishna Chakraborty, Imranur Rahman, Hasan Murad, Md. Shohrab Hossain, Shagufta Mehnaz:
SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image Steganography. 1-9 - Yidan Hu, Yukun Dong, Wenxin Chen, Yingfei Dong, Rui Zhang:
Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance. 1-9 - Fahid Hassan, Zhambyl Shaikhanov, Hichem Guerboukha, Daniel M. Mittleman, Kaushik Sengupta, Edward W. Knightly:
RMDM: Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers. 1-9 - Lu Zhang, Nabil Moukafih, Hamad Alamri, Gregory Epiphaniou, Carsten Maple:
A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR. 1-6 - XiaMeng Feng, Xiaodong Li, SuYa Zhou, Xin Jin:
Homomorphic Comparison Method Based on Dynamically Polynomial Composite Approximating Sign Function. 1-9 - Mehzabien Iqbal, Ahmad Y. Javaid:
IEEE CNS 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-Security. 1-2 - Kexin Zhang, Shengjie Xu, Bongsik Shin:
Towards Adaptive Zero Trust Model for Secure AI. 1-2 - Venkat Sai Suman Lamba Karanam, Fahmida Afrin, Byrav Ramamurthy, Nirnimesh Ghose:
Cross-layer Device Identification for Smart Grid Substation Networks : IEEE CNS 23 Poster. 1-2 - Francesco Intoci, Julian Sturm, Daniel Fraunholz, Apostolos Pyrgelis, Colin Barschel:
P3LI5: Practical and confidEntial Lawful Interception on the 5G core. 1-9 - Jing Hou, Xuyu Wang, Amy Z. Zeng:
Inter-Temporal Reward Decisions with Strategic Ethical Hackers. 1-9 - Xingqi Wu, Junaid Farooq:
Attack Resilient Wireless Backhaul Connectivity with Optimized Fronthaul Coverage in UAV Networks. 1-6 - Jingwen Shi, Tian Xie, Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Andrew Z. Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min-Yue Chen, Li Xiao, Xiaoming Liu:
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities. 1-9 - Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Hisham A. Kholidy:
FAKEY: Fake Hashed Key Attack on Payment Channel Networks. 1-9 - Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee, Qi Duan:
Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks. 1-9 - Zikai Zhang, Rui Hu:
Byzantine-Robust Federated Learning with Variance Reduction and Differential Privacy. 1-9 - Nils Begou, Jeremy Vinoy, Andrzej Duda, Maciej Korczynski:
Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT. 1-6 - Son Tung Do, Gabrielle Ebbrecht, Juntao Chen:
Adversarial Manipulation of Learning in Linear-Quadratic Zero-Sum Differential Games via Cost Poisoning. 1-6 - Kylie McClanahan, Jingyao Fan, Qinghua Li, Guohong Cao:
Protecting Control Commands Using Low-Cost EM Sensors in the Smart Grid. 1-9 - Umair Ahmad Mughal, Samuel Chase Hassler, Muhammad Ismail:
Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles. 1-9 - Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis. 1-6 - Neji Mensi, Danda B. Rawat:
Enhancing Security in NOMA-Based Networks: An Effective Deceptive Approach to Thwart Multiple Eavesdroppers. 1-9 - Umair Ahmad Mughal, Muhammad Ismail, Syed Ali Asad Rizvi:
Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge. 1-9 - Afifa Ishtiaq, Arash Asadi, Ladan Khaloopour, Waqar Ahmed, Vahid Jamali, Matthias Hollick:
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries. 1-9 - Mohammed Mynuddin, Sultan Uddin Khan, Mahmoud Nabil Mahmoud, Ahmad Alsharif:
Adversarial Attacks on Deep Learning-Based UAV Navigation Systems. 1-6 - Qianqian Zhang, Chi-Jiun Su:
Application-layer Characterization and Traffic Analysis for Encrypted QUIC Transport Protocol. 1-9 - Shalini Saini, Nitesh Saxena:
Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis. 1-9 - Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
SHIP: Securing Hashed Timelock Contracts in Payment Channel Networks. 1-2 - Basel Abdeen, Ehab Al-Shaer, Waseem G. Shadid:
VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification. 1-9 - Ekzhin Ear, Jose L. C. Remy, Antonia Feffer, Shouhuai Xu:
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study. 1-9 - Benjamin Johnson, Bechir Hamdaoui:
On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension Representation. 1-9 - Heena Rathore, Henry Griffith:
Leveraging Neuro-Inspired Reinforcement Learning for Secure Reputation-based Communication in Connected Vehicles. 1-6 - Ken Yihang Bai, Tuba Yavuz:
MMIO Access-Based Coverage for Firmware Analysis. 1-9 - Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, Tao Wang:
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity. 1-9 - Utku Tefek, Ertem Esiner, Carmen Cheh, Daisuke Mashima:
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies. 1-6 - Noah T. Curran, Arun Ganesan, Mert D. Pesé, Kang G. Shin:
Using Phone Sensors to Augment Vehicle Reliability. 1-9 - Onur Barut, Lulin Deng, David Lu:
Universal Network Traffic Analysis for Malicious Traffic Detection using RappNet: A Privacy-Preserving Approach : IEEE CNS 23 Poster. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.