| Authors | Paper (Accepted) |
|---|---|
| Rasika Bhalerao, Mohammad Al-Rubaie, Anand Bhaskar, Igor Markov | Data-Driven Mitigation of Adversarial Text Perturbation |
| Thomas Davies | A Review of Topological Data Analysis for Cybersecurity |
| Xiaolei Hua, Lin Zhu, Shenglin Zhang, Zeyan Li, Su Wang, Dong Zhou, Shuo Wang, Chao Deng | GenAD: General Representations of Multivariate Time Series for Anomaly Detection |
| Khouloud Abdelli, Joo Yeon Cho, Carsten Tropschug | ML-based Anomaly Detection in Optical Fiber Monitoring |
| Omid Madani, Thanh Ngo, Weifei Zeng, Sai Ankith Averineni, Sasidhar Evuru, Varun Malhotra, Shashidhar Gandham, Navindra Yadav | Binomial Tails for Community Analysis |
| Sujoy Sikdar, Sikai Ruan, Qishen Han, Paween Pitimanaaree, Jeremy Blackthorne, Bulent Yener, Lirong Xia | Anti-Malware Sandbox Games |
| Robert Joyce, Dev Amlani, Charles Nicholas, Edward Raff | MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels |
| Thanh Nguyen, Arunesh Sinha | The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Game |
| Andre Nguyen, Fred Lu, Gary Lopez, Edward Raff, Charles Nicholas, James Holt | Out of Distribution Data Detection Using Dropout Bayesian Neural Networks |
