default search action
14th ICDF2C 2023: New York City, NY, USA
- Sanjay Goel, Paulo Roberto Nunes de Souza:
Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 570, Springer 2024, ISBN 978-3-031-56579-3
Crime Profile analysis and Fact Checking
- Michael Madden, Dan Szafaran, Philomena Gray, Justin Pelletier, Ted Selker:
A Canary in the Voting Booth: Attacks on a Virtual Voting Machine. 3-18 - John Jankura, Hannah Catallo-Stooks, Ibrahim M. Baggili, Golden G. Richard III:
Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. 19-32 - Michael Mundt, Harald Baier:
Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review. 33-57 - Paul Stenzel, Nhien-An Le-Khac:
Identify Users on Dating Applications: A Forensic Perspective. 58-77 - Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam, Siu Ming Yiu:
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model. 78-95 - Joseph Brown, Ibrahim Baggili:
Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social. 96-113
Information Hiding
- Shuai Ren, Liming Ma, Qiuyu Feng:
A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis. 117-131 - Shuai Ren, Yuxiao Li, Bo Li, Hao Gong, Qiuyu Feng:
A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model. 132-145 - Shuai Ren, Hao Gong, Huirong Cheng, Zejing Cheng:
Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator. 146-161 - Shuai Ren, Bo Li, Shengxia Liu:
An Information Hiding Algorithm Based on Multi-carrier Fusion State Partitioning of 3D Models. 162-175
Machine Learning
- Xubo Yang, Linsen Li, Cunqing Hua, Changhao Yao:
CCBA: Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNs. 179-192 - Clinton Walker, Ibrahim Baggili, Hao Wang:
Decoding HDF5: Machine Learning File Forensics and Data Injection. 193-211 - Jia Hu, Weina Niu, Qingjun Yuan, Lingfeng Yao, Junpeng He, Yanfeng Zhang, Xiaosong Zhang:
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection. 212-226 - Bart Somers, Asanka P. Sayakkara, Darren R. Hayes, Nhien-An Le-Khac:
Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning. 227-248 - Yi Shen, Yuhan Zhang, Yuwei Li, Wanmeng Ding, Miao Hu, Yang Li, Cheng Huang, Jie Wang:
IoT Malicious Traffic Detection Based on Federated Learning. 249-263 - Xiao Yang, Gaolei Li, Meng Han:
Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection. 264-278 - Zeshan Pang, Yuyuan Sun, Shasha Guo, Yuliang Lu:
Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study. 279-292 - Xiaohong Fan, Ye Huang, Xue Wang, Ziran Nie, Zhenyang Yu, Xuhui Cheng, Xiaoyi Duan:
Research on Feature Selection Algorithm of Energy Curve. 293-307 - Xiaoyi Duan, Ye Huang, Yuting Wang, Yu Gu, Jianmin Tong, Zunyang Wang, Ronglei Hu:
Power Analysis Attack Based on GA-Based Ensemble Learning. 308-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.