​
Login / Signup
ICDF2C (1)
2024
2024
2024
Keyphrases
Publications
volume 570, 2024
Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I
ICDF2C (1)
570 (2024)
2023
Bart Somers
,
Asanka P. Sayakkara
,
Darren R. Hayes
,
Nhien-An Le-Khac
Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning.
ICDF2C (1)
(2023)
Jia Hu
,
Weina Niu
,
Qingjun Yuan
,
Lingfeng Yao
,
Junpeng He
,
Yanfeng Zhang
,
Xiaosong Zhang
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection.
ICDF2C (1)
(2023)
Xubo Yang
,
Linsen Li
,
Cunqing Hua
,
Changhao Yao
CCBA: Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNs.
ICDF2C (1)
(2023)
Zeshan Pang
,
Yuyuan Sun
,
Shasha Guo
,
Yuliang Lu
Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study.
ICDF2C (1)
(2023)
John Jankura
,
Hannah Catallo-Stooks
,
Ibrahim M. Baggili
,
Golden Richard
Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases.
ICDF2C (1)
(2023)
Cheuk Yu Ip
,
Fu Kay Frankie Li
,
Yi Anson Lam
,
Siu Ming Yiu
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model.
ICDF2C (1)
(2023)
Xiao Yang
,
Gaolei Li
,
Meng Han
Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection.
ICDF2C (1)
(2023)
Michael Mundt
,
Harald Baier
Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review.
ICDF2C (1)
(2023)
Joseph Brown
,
Ibrahim Baggili
Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social.
ICDF2C (1)
(2023)
Michael Madden
,
Dan Szafaran
,
Philomena Gray
,
Justin Pelletier
,
Ted Selker
A Canary in the Voting Booth: Attacks on a Virtual Voting Machine.
ICDF2C (1)
(2023)
Xiaohong Fan
,
Ye Huang
,
Xue Wang
,
Ziran Nie
,
Zhenyang Yu
,
Xuhui Cheng
,
Xiaoyi Duan
Research on Feature Selection Algorithm of Energy Curve.
ICDF2C (1)
(2023)
Shuai Ren
,
Yuxiao Li
,
Bo Li
,
Hao Gong
,
Qiuyu Feng
A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model.
ICDF2C (1)
(2023)
Shuai Ren
,
Liming Ma
,
Qiuyu Feng
A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis.
ICDF2C (1)
(2023)
Shuai Ren
,
Bo Li
,
Shengxia Liu
An Information Hiding Algorithm Based on Multi-carrier Fusion State Partitioning of 3D Models.
ICDF2C (1)
(2023)
Paul Stenzel
,
Nhien-An Le-Khac
Identify Users on Dating Applications: A Forensic Perspective.
ICDF2C (1)
(2023)
Yi Shen
,
Yuhan Zhang
,
Yuwei Li
,
Wanmeng Ding
,
Miao Hu
,
Yang Li
,
Cheng Huang
,
Jie Wang
IoT Malicious Traffic Detection Based on Federated Learning.
ICDF2C (1)
(2023)
Xiaoyi Duan
,
Ye Huang
,
Yuting Wang
,
Yu Gu
,
Jianmin Tong
,
Zunyang Wang
,
Ronglei Hu
Power Analysis Attack Based on GA-Based Ensemble Learning.
ICDF2C (1)
(2023)
Shuai Ren
,
Hao Gong
,
Huirong Cheng
,
Zejing Cheng
Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator.
ICDF2C (1)
(2023)
Clinton Walker
,
Ibrahim Baggili
,
Hao Wang
Decoding HDF5: Machine Learning File Forensics and Data Injection.
ICDF2C (1)
(2023)