Login / Signup
CNS
2013
2017
2019
2023
2013
2023
Keyphrases
Publications
2023
Jing Hou
,
Xuyu Wang
,
Amy Z. Zeng
Inter-Temporal Reward Decisions with Strategic Ethical Hackers.
CNS
(2023)
Alvi Ataur Khalil
,
Mohammad Ashiqur Rahman
,
Hisham A. Kholidy
FAKEY: Fake Hashed Key Attack on Payment Channel Networks.
CNS
(2023)
Shujun Zhao
,
Lesther Santana
,
Evans Owusu
,
Mohamed Rahouti
,
Kaiqi Xiong
,
Yufeng Xin
Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 Poster.
CNS
(2023)
Ken Yihang Bai
,
Tuba Yavuz
MMIO Access-Based Coverage for Firmware Analysis.
CNS
(2023)
Radi Abubaker
,
Guang Gong
High-speed OFDM Physical-Layer Key Exchange.
CNS
(2023)
Mohammed Mynuddin
,
Sultan Uddin Khan
,
Mahmoud Nabil Mahmoud
,
Ahmad Alsharif
Adversarial Attacks on Deep Learning-Based UAV Navigation Systems.
CNS
(2023)
Mohamed el Shehaby
,
Ashraf Matrawy
The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster).
CNS
(2023)
Dakun Shen
,
Tao Hou
,
Zhuo Lu
,
Yao Liu
,
Tao Wang
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.
CNS
(2023)
Mehzabien Iqbal
,
Ahmad Y. Javaid
IEEE CNS 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-Security.
CNS
(2023)
Evans Owusu
,
Mohamed Rahouti
,
D. Frank Hsu
,
Kaiqi Xiong
,
Yufeng Xin
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis.
CNS
(2023)
Martin Husák
,
Michal Javorník
Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection.
CNS
(2023)
Jun Li
,
Devkishen Sisodia
,
Yebo Feng
,
Lumin Shi
,
Mingwei Zhang
,
Christopher Early
,
Peter L. Reiher
Toward Adaptive DDoS-Filtering Rule Generation.
CNS
(2023)
Yidan Hu
,
Yukun Dong
,
Wenxin Chen
,
Yingfei Dong
,
Rui Zhang
Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance.
CNS
(2023)
IEEE Conference on Communications and Network Security, CNS 2023, Orlando, FL, USA, October 2-5, 2023
CNS
(2023)
Madeena Sultana
,
Adrian Taylor
,
Li Li
,
Suryadipta Majumdar
Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation.
CNS
(2023)
Xingqi Wu
,
Junaid Farooq
Attack Resilient Wireless Backhaul Connectivity with Optimized Fronthaul Coverage in UAV Networks.
CNS
(2023)
Zikai Zhang
,
Rui Hu
Byzantine-Robust Federated Learning with Variance Reduction and Differential Privacy.
CNS
(2023)
Neji Mensi
,
Danda B. Rawat
Enhancing Security in NOMA-Based Networks: An Effective Deceptive Approach to Thwart Multiple Eavesdroppers.
CNS
(2023)
Venkat Sai Suman Lamba Karanam
,
Fahmida Afrin
,
Byrav Ramamurthy
,
Nirnimesh Ghose
Cross-layer Device Identification for Smart Grid Substation Networks : IEEE CNS 23 Poster.
CNS
(2023)
Ashutosh Dutta
,
Ehab Al-Shaer
,
Samrat Chatterjee
,
Qi Duan
Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks.
CNS
(2023)
Nilesh Chakraborty
,
Youssef Yamout
,
Mohammad Zulkernine
The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords.
CNS
(2023)
Son Tung Do
,
Gabrielle Ebbrecht
,
Juntao Chen
Adversarial Manipulation of Learning in Linear-Quadratic Zero-Sum Differential Games via Cost Poisoning.
CNS
(2023)
Umair Ahmad Mughal
,
Samuel Chase Hassler
,
Muhammad Ismail
Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles.
CNS
(2023)
Hassan El Alami
,
Danda B. Rawat
Detection of Zero-Day Attacks using CNN and LSTM in Networked Autonomous Systems 'IEEE CNS 23 Poster'.
CNS
(2023)
Trishna Chakraborty
,
Imranur Rahman
,
Hasan Murad
,
Md Shohrab Hossain
,
Shagufta Mehnaz
SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image Steganography.
CNS
(2023)
Heena Rathore
,
Henry Griffith
Leveraging Neuro-Inspired Reinforcement Learning for Secure Reputation-based Communication in Connected Vehicles.
CNS
(2023)
Utku Tefek
,
Ertem Esiner
,
Carmen Cheh
,
Daisuke Mashima
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies.
CNS
(2023)
Shashwat Kumar
,
Francis Hahn
,
Xinming Ou
,
Anoop Singhal
Security Analysis of Trust on the Controller in the Matter Protocol Specification.
CNS
(2023)
Akib Jawad Nafis
,
Omar Chowdhury
,
Md. Endadul Hoque
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime.
CNS
(2023)
Fahid Hassan
,
Zhambyl Shaikhanov
,
Hichem Guerboukha
,
Daniel M. Mittleman
,
Kaushik Sengupta
,
Edward W. Knightly
RMDM: Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers.
CNS
(2023)
Alvi Ataur Khalil
,
Mohammad Ashiqur Rahman
SHIP: Securing Hashed Timelock Contracts in Payment Channel Networks.
CNS
(2023)
Onur Barut
,
Lulin Deng
,
David Lu
Universal Network Traffic Analysis for Malicious Traffic Detection using RappNet: A Privacy-Preserving Approach : IEEE CNS 23 Poster.
CNS
(2023)
Abdurrahman Elmaghbub
,
Bechir Hamdaoui
A Needle in a Haystack: Distinguishable Deep Neural Network Features for Domain-Agnostic Device Fingerprinting.
CNS
(2023)
Nils Begou
,
Jeremy Vinoy
,
Andrzej Duda
,
Maciej Korczynski
Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT.
CNS
(2023)
Ekzhin Ear
,
Jose L. C. Remy
,
Antonia Feffer
,
Shouhuai Xu
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study.
CNS
(2023)
Andrea Corsini
,
Shanchieh Jay Yang
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
CNS
(2023)
Umair Ahmad Mughal
,
Muhammad Ismail
,
Syed Ali Asad Rizvi
Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge.
CNS
(2023)
Byron Denham
,
Dale R. Thompson
Analysis of Decoy Strategies for Detecting Ransomware.
CNS
(2023)
Francesco Intoci
,
Julian Sturm
,
Daniel Fraunholz
,
Apostolos Pyrgelis
,
Colin Barschel
P3LI5: Practical and confidEntial Lawful Interception on the 5G core.
CNS
(2023)
Noah T. Curran
,
Arun Ganesan
,
Mert D. Pesé
,
Kang G. Shin
Using Phone Sensors to Augment Vehicle Reliability.
CNS
(2023)
Subir Halder
,
Amrita Ghosal
,
Thomas Newe
,
Sajal K. Das
SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT.
CNS
(2023)
M. Mehdi Kholoosi
,
Muhammad Ali Babar
,
Cemal Yilmaz
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels.
CNS
(2023)
Xiaokai Ye
,
Tao Lv
,
Xiaohan Sun
A Key Generation Scheme from Sensing Data for IoT Security : IEEE CNS 23 Poster.
CNS
(2023)
Bryan Martin
,
Chad A. Bollmann
Self-similarity based network anomaly detection for industrial control systems.
CNS
(2023)
Qianqian Zhang
,
Chi-Jiun Su
Application-layer Characterization and Traffic Analysis for Encrypted QUIC Transport Protocol.
CNS
(2023)
Kylie McClanahan
,
Jingyao Fan
,
Qinghua Li
,
Guohong Cao
Protecting Control Commands Using Low-Cost EM Sensors in the Smart Grid.
CNS
(2023)
Benjamin Johnson
,
Bechir Hamdaoui
On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension Representation.
CNS
(2023)
Jingwen Shi
,
Tian Xie
,
Guan-Hua Tu
,
Chunyi Peng
,
Chi-Yu Li
,
Andrew Z. Hou
,
Sihan Wang
,
Yiwen Hu
,
Xinyu Lei
,
Min-Yue Chen
,
Li Xiao
,
Xiaoming Liu
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
CNS
(2023)
Aditya Pathak
,
Irfan S. Al-Anbagi
,
Howard J. Hamilton
Early-stage Conflict Detection in HLF-based Delay-critical IoT Networks.
CNS
(2023)
Shalini Saini
,
Nitesh Saxena
Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis.
CNS
(2023)