.- Security Analytics, Threat Intelligence, Multimedia Forensics.
.- Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse.
.- EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency.
.- Auto-TFCE: Automatic Tra?ic Feature Code Extraction Method and Its Application in Cyber Security.
.- Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators.
.- ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats.
.- Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data.
.- A Comprehensive Survey on Basic Safety Message Attacks and Their Detection.
.- BGETC: An Encrypted Tra?ic Classification Method Based on BERT and GRU.
.- AnGSL: Graph-Based Android Malware Detection Method.
.- Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching.
.- MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network.
.- An IP Anti-Geolocation Method Based on Constructed Landmarks.
.- Burst Sequence Based Graph Neural Network for Video Tra?ic Identification.
.- KP-WF: Cross-domain Few-shot Website Fingerprinting.
.- Generative AI, Emerging Threats.
.- Pixel-level Face Correction Task for More Generalized Deepfake Detection.
.- Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data.
.- Driven to Evidence: The Digital Forensic Trail of Vehicles.
.- Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing.
.- Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack.
.- Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals.