Accepted papers

BITS-HAR: Human Activity Recognition using Explainable Deep Learning ModelsJhala, Devrajsinh (BITS Pilani, India); Kurian, Gladwin (BITS Pilani, India); Agrawal, Yogesh Kumar (BITS Pilani, India); Jat, Ishan (BITS Pilani, India); Rathore, Hemant (BITS Pilani)
PhishBuster: Phishing Detection based on URL Embeddings and Deep Learning Models with ExplainabilityPavan, T.M.V.S.G (BITS Pilani, India); Charan, Tanikella Sai (BITS Pilani, India); Agarwal, Ayush (BITS Pilani, India); Vivekanandan, Ajith (BITS Pilani, India); Rathore, Hemant (BITS Pilani, India)
Phenotypic Analysis of Sorghum Canopies via UAV Multispectral Data and Machine LearningDeng, Linqiang (College of Software, Shanxi Agricultural University)
Privacy enhancing Healthcare Data Analysis using BNNDing, Yongjian (University of Electronic Science and Technology of China); li, hongping (UESTC)
Pixel-level privacy preserving in DICOM anonymisationDai, Jinxiang (University of Electronic Science and Technology of China); Li, Hongping (UESTC)
Poster: An Anomaly Causal Analysis Method in Complex 5G Network EnvironmentsZhijian, Xu (XIdian University); Zhiwei, Zhang (Xidian University)
Probabilistic packet scheduler for multipath data transfer in highly variable delay conditionsMorawski, Michal (Lodz University of Technology, Lodz, Poland); Ignaciuk, Przemyslaw (Lodz University of Technology, Lodz, Poland)
Atomic Operation Classification for Effective Legal Supervision Model ConstructionQin, Tao (Xi’an Jiaotong University); Liu, Yunzhe (Xi’an Jiaotong University); Gao, Ya (Xi’an Jiaotong University); Li, Yizhen (Xi’an Jiaotong University); Wang, Pinghui (Xi’an Jiaotong University)
A Novel GAN-based DDoS Attack Detection Method for Smart Home NetworksAhmed, Ismeil (Coventry University); Rakib, Abdur (Coventry University); Aydin, Mehmet Emin (University of the West of England)
Performance evaluation of SARQ in LLNsChahed, Manel (University of Sousse); Meddeb, Aref (University of Sherbrooke); Boufaied, Amine (University of Sousse)
A NOVEL ENCRYPTED DATA HIDING AND IMAGE ENCRYPTION FOR AUTHENTICATION BASED COMMUNICATION FRAMEWORKP, Siva Priyanga (Anna University); C, RAMASAMY SANKAR RAM (ANNA UNIVERSITY, BIT CAMPUS, TRICHY)
OST: An AI enabled One-Stop Station Platform for Cyber Security Incident ReportingLi, Shancang (Cardiff University); Al Rashdi, Alwaleed (Cardiff University)
A Hierarchical Lattice-Based Distributed Identity Authentication SchemeXinqi, Dong (Qufu normal university); Yijia, Wang (Qufu normal university); Xu, Zhang (Qufu normal university); Yilei, Wang (Qufu normal university)
A Fake News Detection Model based on Expert Knowledge IntegrationXu, Hui (Xi’an Jiaotong University); Fang, Haowen (Xi’an Jiaotong university); Qin, Tao (Xi’an Jiaotong University)
Optimization of Image Binarization Threshold Based on Gaussian Weighted Averaging and Machine LearningLu, Kui (qufu normal university); li, tao (qufu normal university); fan, Shuyu (qufu normal university); Ye, Baopeng (qufu normal university)
Network-orchestrated security protocol for the Internet of Drones in O-RANDonaghy, Nathan (Queen’s University Belfast); Olukoya, Oluwafemi (Queen’s University Belfast); Rafferty, Karen (Queen’s University Belfast); Duong, Trung Q. (Queen’s University Belfast); Sharma, Vishal (Queen’s University Belfast)