


default search action
ACSAC 2024: Honolulu, HI, USA - Workshops
- Annual Computer Security Applications Conference, ACSAC 2024 - Workshops, Honolulu, HI, USA, December 9-10, 2024. IEEE 2024, ISBN 979-8-3315-3281-9
- Benjamin Kolicic, Alberto Caron, Vasilios Mavroudis, Chris Hicks:
Inherently Interpretable and Uncertainty-Aware Models for Online Learning in Cyber-Security Problems. 1-10 - Shing-Li Hung, Chung-Kuan Chen, Keisuke Furumoto, Takeshi Takahashi, Hung-Min Sun:
Dark Watchdog: A Novel RAG-Driven System for Real-Time Detection and Analysis of Data Leaks on Dark Web Forums. 11-19 - Kohei Miyamoto, Chansu Han, Tao Ban, Takeshi Takahashi, Jun'ichi Takeuchi:
Intrusion Detection Simplified: A Feature-free Approach to Traffic Classification Using Transformers. 20-29 - Afshin Hasani, Mehran Alidoost Nia, Reza Ebrahimi Atani:
Balancing Safety and Security in Autonomous Driving Systems: A Machine Learning Approach with Safety-First Prioritization. 30-41 - Nami Ashizawa, Toshiki Shibahara, Naoto Kiribuchi, Osamu Saisho, Naoto Yanai
:
Restoring Unintended Model Learning by Error Correcting Code. 42-50 - Muhammad Fakhrur Rozi, Takeshi Takahashi:
Learning to Unfix: Towards ML Robustness in Vulnerability Detection via Structure-Aware Code Generation. 51-58 - Tsunato Nakai, Kento Oonishi, Takuya Higashi:
Does Prompt-tuning Enhance Privacy in Large Language Models? 59-72 - Shae McFadden
, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi
:
The Impact of Active Learning on Availability Data Poisoning for Android Malware Classifiers. 73-84 - Avilash Rath, Youpeng Li, Troy Davis, Braden Bronaugh, Darsh Poddar, Sophia Li, Xinda Wang:
When AI Meets Code Analysis: A Study of Adversarial Attacks on Deep Learning-based Code Models via Program Transformation. 85-96 - Marina Katoh, Weiping Pei, Youye Xie:
AdVul: Adversarial Attack against ML-based Vulnerability Detection. 97-107 - Yannick Landeck, Dian Balta, Martin Wimmer, Christian Knierim:
Assurance of Application Security on IIoT Platforms with Knowledge Augmentation. 108-119 - Arthur Amorim, Trevor Kann, Max Taylor, Lance Joneckis:
Towards Provable Security in Industrial Control Systems Via Dynamic Protocol Attestation. 120-132 - Eyasu Getahun Chekole, Jianying Zhou:
MFAA: Historical Hash Based Multi-Factor Authentication and Authorization in IIoT. 133-144 - Alexander Gebhard, Debbie Perouli:
Attacks on EtherNet/IP and Migrations through CIP Security. 145-154 - Chris Churilla:
Conducting Attack Scenarios and Forensic Techniques in a Virtual ICS Test Bed. 155-162 - Kwabena Aboagye-Otchere, Jorge Castillo:
MIND-IoT: Machine Intelligence and Data-Mining for IoT Threats. 163-170 - Marco Arazzi, Dincy R. Arikkat, Mert Cihangiroglu
, K. M. Sameera:
A Privacy-Preserving Byzantine-Aware Swarm Learning Framework for CTI. 171-177 - Johannes Ludwig, Veelasha Moonsamy, Matteo Große-Kampmann:
The Rings of Tracking: Evaluating Security and Privacy in the Smart Ring Ecosystem. 186-193 - Liyakathunisa, Zoya Riyaz Syeda, Riyaz Sohale Syed:
Cyber Attack Detection for Internet of Health Things through Federated Deep Learning Technique. 194-200 - Bikash Saha, Nanda Rani, Sandeep Kumar Shukla:
MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT. 201-207 - Carmen Cheh, Nan Shing Kham Shing, Reuben Lim, Binbin Chen:
Generating Abuse Stories and Misuse Cases using Large Language Models. 208-215 - Samiha Shimmi, Yash Saini, Mark Schaefer, Hamed Okhravi, Mona Rahimi:
Software Vulnerability Detection Using LLM: Does Additional Information Help? 216-223 - Ofir Manor, Ortal Lavi, Tomer Schwartz, Motoyoshi Sekiya, Junichi Suga, Kenji Hikichi, Yuki Unno, Andrés F. Murillo:
Retrieval of Network Packets Information Using a Generated Latent Space Representation for Network Analysis in Cyber Security. 224-231 - Zhihao Yao
:
Formal Trust and Threat Modeling Using Large Language Models. 232-239 - Md. Abu Sayed, Asif Rahman, Christopher Kiekintveld, Sebastian Garcia:
Fine-tuning Large Language Models for DGA and DNS Exfiltration Detection. 240-247 - Brandon J. Walton, Mst. Eshita Khatun, James M. Ghawaly, Aisha I. Ali-Gombe:
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware. 248-254 - Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang:
Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation. 255-261 - Charles Lohest, Samy Bettaieb, Axel Legay:
Automated Vulnerability Detection in Smart Contracts using Control Flow Graphs and Machine Learning. 262-269 - Sunpreet S. Arora, Andrew Beams, Panagiotis Chatzigiannis, Sebastian Meiser, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Harshal Shah, Yizhen Wang, Yuhang Wu, Hao Yang, Mahdi Zamani:
Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation. 270-279 - Shinsaku Naito, Kanta Matsuura:
Fast and Secure Consensus Protocol for Ethereum 2.0. 280-287 - Sultan Alshehhi, Ahmad Musamih, Khaled Salah, Ahmad Mayyas, Raja Jayaraman:
Blockchain-based Sustainability, Traceability, and Certification of Hydrogen Production. 288-298

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.