default search action
ISI 2023: Charlotte, NC, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2023, Charlotte, NC, USA, October 2-3, 2023. IEEE 2023, ISBN 979-8-3503-3773-0
- Joshua Bolton, Lavanya Elluri, Karuna Pande Joshi:
An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains. 1-6 - Yilin Wu, Minjie Yuan, Yuxuan Song, Liping Chen, Chenyu Yuan, Qiudan Li:
A Two-Stage Prompt Learning Method for Jointly Predicting Topic and Personality. 1-3 - Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari:
An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation. 1-6 - Hanyi Zou, Nan Xu, Qingchao Kong, Wenji Mao:
Controllable News Comment Generation based on Attribute Level Contrastive Learning. 1-6 - Fan Yang, Jie Bai, Linjing Li, Daniel Zeng:
A Continual Learning Framework for Event Prediction with Temporal Knowledge Graphs. 1-6 - Wingyan Chung:
Building Human Digital Twins: Cases for Intelligence and Security Informatics. 1-3 - Chunmiao Yu, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Tianyi Luo, Jiaojiao Wang:
Named Entity Recognition for Epidemiological Investigation in COVID-19. 1-6 - Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi:
Change Management using Generative Modeling on Digital Twins. 1-6 - Lina Zhou, Dongsong Zhang, Zhihui Liu:
A Stage Model for Understanding Phishing Victimization Behavior in Embedded Training. 1-6 - Moumita Das Purba, Bill Chu:
Extracting Actionable Cyber Threat Intelligence from Twitter Stream. 1-6 - Colman McGuan, Chansu Yu, Qin Lin:
Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems. 1-6 - Wei Tang, Qingchao Kong, Yin Luo, Wenji Mao:
Neuro-Logic Learning for Relation Reasoning over Event Knowledge Graph. 1-6 - Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas:
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. 1-3 - Kanlun Wang, Lina Zhou, Dongsong Zhang, Jianwei Lai:
Shoulder Surfing on Mobile Authentication: Perception vis-a-vis Performance from the Attacker's Perspective. 1-6 - Alexander I-Chi Lai, Hung-Chih Yang:
Deep Learning Based Behavior Anomaly Detection within the Context of Electronic Commerce. 1-6 - Abdullah Bani Melhem, Ahmed Aleroud, Zain A. Halloush:
AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on Twitter. 1-6 - Jiakai Geng, Chenyang Zhang, Linjing Li, Qing Yang, Daniel Dajun Zeng:
PCEN: Potential Correlation-Enhanced Network for Multimodal Named Entity Recognition. 1-6 - Maria Patrizia Carello, Alberto Marchetti-Spaccamela, Leonardo Querzoni, Marco Angelini:
SoK: Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector. 1-6 - Sherief Hashima, Mohamed H. Saad, Kohei Hatano, Hamada Rizk:
Vehicle Classification in Intelligent Transportation Systems Using Deep Learning and Seismic Data. 1-6 - Weiguang Zhang, Saike He, Peijie Zhang, Daniel Dajun Zeng:
Dynamic Causal Modelling and Predictive Analysis for the COVID-19 Pandemic. 1-6 - Minzheng Wang, Jia Cao, Qingchao Kong, Yin Luo:
Boosting Domain-Specific Question Answering Through Weakly Supervised Self-Training. 1-6 - Zahra Khanjani, Lavon Davis, Anna Tuz, Kifekachukwu Nwosu, Christine Mallinson, Vandana P. Janeja:
Learning to Listen and Listening to Learn: Spoofed Audio Detection Through Linguistic Data Augmentation. 1-6 - Linzi Wang, Haoda Qian, Qiudan Li, David Jingjun Xu, Daniel Dajun Zeng:
Style-Driven Multi-Perspective Relevance Mining Model for Hotspot Reprint Paragraph Prediction. 1-6 - Adhishree Kathikar, Aishwarya Nair, Ben Lazarine, Agrim Sachdeva, Sagar Samtani:
Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform. 1-6 - Benjamin Ampel, Tala Vahedi, Sagar Samtani, Hsinchun Chen:
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach. 1-6 - Avishek Bose, Huichen Yang, Marissa Shivers, Ahat Orazgeldiyev, William H. Hsu:
Context-Augmented Key Phrase Extraction from Short Texts for Cyber Threat Intelligence Tasks. 1-6 - Justin M. Nelson, Timothy L. Heggedahl, Mary E. Frame, Anna M. Maresca, Bradley R. Schlessman:
Building the Future of Intelligence, Surveillance, and Reconnaissance (ISR) Collections: The Development and Evaluation of a Collaborative ISR Tool to Support Intel Analysts. 1-6 - Ruike Zhang, Nan Xu, Wenji Mao, Daniel Zeng:
Adversarial Topic-Aware Memory Network for Cross-Lingual Stance Detection. 1-6 - Benjamin Ampel, Kaeli Otto, Sagar Samtani, Hsinchun Chen:
Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.