UbiSec 2022 Accepted Papers

Sabrina Friedl, Ludwig Englbrecht, Fabian Boehm and Günther Pernul. Support Tool Selection in Digital Forensics Training
Michael Tsai and Vimal Kumar. Listen to the Music: Evaluating the use of music in audio based authentication
Wenti Yang, Zhaoyang He, Yalei Li, Haiyan Zhang and Zhitao Guan. A Hybrid Secure Two-party Protocol for Vertical Federated Learning
Wanyi Gu, Guojun Wang, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li and Mingfei Chen. Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model using CNN-BiLSTM
Haiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu and Yuezhong Wu. Garbage recognition algorithm based on self-attention mechanism and deep sorting
Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, Tiago Gasiba and Ece Ata. CATS: A serious game in industry towards stronger cloud security
Muntaha Alawneh and Imad Abbadi. Approaches for Zero Trust Adoption Based Upon Organization Security Level
Guanghui Feng, Wenyin Yang, Tao Peng, Xiaofei Xing, Shuhong Chen and Yuting Li. An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis
Mst Shapna Akter, Hossain Shahriar, Maria Valero, Nazmus Sakib and Zakirul Alam Bhuiyan. Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing
John Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber and Kapil Dandekar. System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection
Xiangyong Liu, Pengfei Yin, Pin Liu and Shuhong Chen. Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing
Zhiqiang Wang, Sulong Meng and Ying Chen. VDDRL: A Vulnerability Detection Method Based On Deep Representation Learning In Python Source Code
Songlv Feng, Cuina Cheng and Liping Mo. An Improved Cuckoo Search Algorithm and Its Application in Functions Optimization
Saad Khan, Tariq Alsboui, Richard Hill and Hussain Al-Aqrabi. Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network
Zijing Zhang, Vimal Kumar, Michael Mayo and Albert Bifet. USE-CVSS: Assessing CVSS from Descriptions
Yun Duan, Laifu Wang, Dongxin Liu, Boren Deng and Yunfan Tian. Malware traffic classification based on GAN and BP neural network
Mohamad Jamil Al Bouhairi, Mostakim Mullick, Marvin Wolf, Ivan Gudymenko and Sebastian Clauß. Encryption Proxies in a Confidential Computing Environment
Akram Louati and Tiago Gasiba. Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications
Xiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li and Xiangyong Liu. Using Opcode Sequences to Detect Unknown Vulnerability in Smart Contracts Based on Machine Learning
Nuno Torres, Ana Chaves, César Toscano and Pedro Pinto. Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study
Irfan Ali, M Naeem Shehzad, Qaisar Bashir, Haroon Elahi, M Naeem Awais, Oana Geman and Pin Liu. A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems
Omar Alshaikh, Simon Parkinson and Saad Khan. On The Variability in The Application and Measurement of Supervised Machine Learning in Cyber Security
Shitao Wang, Wenjun Jiang and Shuhong Chen. An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection
Yuting Li, Guojun Wang and Guanghui Feng. Privacy-Preserving Federated Learning with 1-Bit Compression and Adaptive Optimizer
Fumin Yu, Feng Gao, Yao Yuan, Xiaofei Xing and Yinglong Dai. Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning
Yanbin Weng, Zuochuang Li, Xiaobin Huang and Xiahu Chen. Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety
Khalid Hamid, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Xiangyong Liu and Muhammad Arif. Zero-Day Attacks (ZDA): Detection and Removal Techniques
Huifeng Yang, Liandong Chen, Kai Cheng, Dan Luo, Shuai Yuan and Zhitao Guan. Differentially Private Clustering Algorithm for Mixed Data
Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Guojun Wang and Muhammad Arif. Impact Of Reenactment Programs on Young Generation
Ahmed Sabbah, and Adel Taweel. Android Malware Detection And Analysis - Literature Review
Mohammed Kharma, and Adel Taweel. Threat Modeling in Cloud Computing - A literature review
Xin Qi, Hongling Chen, and Qin Liu. Empirical Likelihood for Partially Linear Single-Index Models with Missing Response Variables and Error-prone Covariates
Li Duan and Yong Li. High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things
Bo Zheng and Yong Xie. A New Signal Packing Algorithm for CAN-FD with Security Consideration
Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen and Wuxiong Zhang. A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud
Luo Jie and Li Zhong. Behavior Feature and Multi-Scenerio-Based Sybil Attack Detection Method in Vehicular Networks
Shuqi Liu, Yufeng Zhuang and Ying Zhao. An Adversarial Sample Defense Method based on Saliency Information
Yufeng Zhuang and Xiaoqian Ran. Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning
Henrique Dias and Nirvana Meratnia. BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning