Workshops
The 6th IEEE International Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec 2022)
Keynote
Internet of Things (IoT) Security and Forensics: Challenges and Opportunities
Kim-Kwang Raymond Choo (The University of Texas at San Antonio, USA)
In this presentation, we will explore the challenges from technical, legal and policy perspectives. For example, how do we use machine/deep learning to facilitate detection of real-time attacks against IoT devices and systems, and how can we automatically identify and collect digital evidence in a forensically sound manner which can be subsequently used for cyber threat intelligence? In the event that the attackers use sophisticated tools to obfuscate their trails, can we design machine/deep learning techniques to unobfuscate and/or identify and exploit vulnerabilities to get access to digital evidence? What are the potential legal implications and challenges? Can we also design explainable AI techniques to facilitate the explanation and inclusion of such digital evidence and cyber threat intelligence in court proceedings or presentations to C-level or boards in organizations? Based on these discussed challenges, we will identify potential opportunities for stakeholders in academia (e.g., students and researchers), industry and government.
Session Chair
Wenjia Li (New York Institute of Technology, United States); Yun Lin (Harbin Engineering University, P.R. China)
Network Securtiy
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing
Ming Zhang (University of Xidian, China); Zhe Sun (Guangzhou University, China); Hui Li (Xidian University, China); Ben Niu (Institute of Information Engineering, Chinese Academy of Sciences, China); Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China); Yuhang Xie and Chunhao Zheng (Xidian University, China)
Evaluation of deep learning model in the field of electromagnetic signal recognition
Jiabao Wang (Harbin Engineering University, China); Haoran Zha (HEU, China); Jiangzhi Fu (Harbin Engineering University, China)
Minimum-SNR Maximization for Robust IRS-assisted Legitimate Monitoring System
Meng Wang and Qinghe Du (Xi'an Jiaotong University, China); Likang Zhang (Xi'an Jiao Tong University, China)
Session Chair
Lei Chen (Georgia Southern University, United States); Yun Lin (Harbin Engineering University, P.R. China)
Mobile Systems Security
Deep CAPTCHA Recognition Using Encapsulated Preprocessing and Heterogeneous Datasets
Turhan Kimbrough, Pu Tian and Weixian Liao (Towson University, USA); Erik Blasch (Air Force Research Lab, USA); Wei Yu (Towson University, USA)
Radio Frequency Fingerprint Identification Method Based on Ensemble Learning
Yu Huang, Jie Yang and Pengfei Liu (Nanjing University of Posts and Telecommunications, China)
Considering that the traditional convolutional neural network (CNN) is applied to RF fingerprint, the classification performance is poor in the low signal to noise ratio (SRN) scenario, we propose an RF fingerprint classification method based on ensemble learning, which improves the classification accuracy on the basis of traditional CNN. Firstly, the RF signals of four power amplifiers are collected by acquisition equipment. These signals are composed of in-phase and quadrature signals, the sampling points are 200,000. After slicing the data samples and artificially introducing different SRN noises, it is then input into an improved CNN for training. Bagging and Boosting algorithms in ensemble learning are combined with the improved CNN to integrate multiple base classifiers and output the final classification results. Finally, the simulation results prove the proposed method. Its classification accuracy is better than traditional CNN in low SNR environment.
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection
Husnain Rafiq, Nauman Aslam, Biju Issac and Rizwan Randhawa (Northumbria University, United Kingdom (Great Britain))
Smartphone-Aided Human Activity Recognition Method using Residual Multi-Layer Perceptron
Shang Shi, Yu Wang, Heng Dong and Guan Gui (Nanjing University of Posts and Telecommunications, China); Tomoaki Ohtsuki (Keio University, Japan)
Session Chair
Lei Chen (Georgia Southern University, United States); Wenjia Li (New York Institute of Technology, United States)
Panel
Session Chair
Lei Chen (Georgia Southern University, United States); Wenjia Li (New York Institute of Technology, United States); Yun Lin (Harbin Engineering University, P.R. China)
Made with in Toronto · Privacy Policy · INFOCOM 2020 · INFOCOM 2021 · © 2022 Duetone Corp.