Copyright 2021 IEEE International Conference on Intelligence and Security Informatics. All rights reserved.
Proceedings from previous years are available through the IEEE Xplore Digital Library.
IEEE ISI 2021 Program Schedule
All times are in US central daylight time.
Day 1, Tuesday, November 2
Time (CDT/GMT-5) |
Events |
|
9:00 AM – 10:20
AM |
Opening and Keynote Opening Remarks: ISI 2021
Honorary Chair: Dr. Nicole Beebe, Department
of ISCS, UTSA Keynote Speaker: Dr. Vyas Sekar, Tan Family Professor of ECE, CMU Title: (How) Can
Programmable Networks Help Reverse Attacker-Defender Asymmetry? |
|
10:20 AM – 10:30
AM |
Session Break |
|
10:30 AM – 11:50
AM |
Cyber Threat Intelligence [Session Chair: Elias
Bou-Harb] Paper: Cyber Security Threat Intelligence Monitoring and
Classification Authors: Bo-Xiang Wang, Jiann-Liang Chen and Chiao-Lin
Yu Paper: Leveraging
Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber
Threats: Covid-19 Case Study Authors: Othmane Cherqi, Hicham
Hammouchi, Mounir Ghogho and Houda Benbrahim Paper: Tracing Relevant Twitter Accounts Active in
Cyber Threat Intelligence Domain by Exploiting Content and Structure of
Twitter Network Authors: Avishek Bose,
Shreya Gopal Sundari, Vahid Behzadan and William H. Hsu |
|
11:50 AM – 12:20
PM |
Lunch Break |
|
12:20 PM – 1:50
PM |
Socio-technical Perspectives (1) [Session Chair:
Victor Benjamin] Paper: A Central Opinion
Extraction Framework for Boosting Performance on Sentiment Analysis * Authors: Yuan Tian, Nan Xu and Wenji Mao Paper: The
Utility in Conjoint Analysis as a Fast Expert Elicitation Technique Authors: Brett
Jefferson, Natalie Heller,
Joseph Cottam, Nhuy Van and George Chin Jr Paper: Differences in Geographic Profiles When
Using Street Routing Versus Manhattan Distances in Buffer Zone Radii
Calculations Authors: Stefano Stamato, Andrew Park, Brian
Eng, Valerie Spicer, Herbert H. Tsang and D. Kim Rossmo |
|
1:50 PM – 2:00
PM |
Session Break |
|
2:00 PM – 3:15
PM |
Dark Web Analytics [Session Chair: Anthony Rios] Paper: Exploring
the Evolution of Exploit-Sharing Hackers:
An Unsupervised Graph Embedding Approach Authors: Kaeli
Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu and Hsinchun Chen Paper: Exploring
Differences Among Darknet and Surface Internet Hacking Communities Authors: Zhiyuan
Ding, Victor Benjamin, Weifeng Li and Xueyan Yin Paper: Distilling
Contextual Embeddings Into A Static Word Embedding for Improving Hacker Forum
Analytics Authors: Benjamin
Ampel and Hsinchun Chen |
|
3:15 PM – 3:25
PM |
Session Break |
|
3:25 PM – 4:25
PM |
Adversarial Machine Learning (1) [Session Chair:
Hongyi Zhu] Paper: Attacking
DNN-based Cross-modal Retrieval Hashing Framework with Adversarial
Perturbations Authors: Xingwei
Zhang, Xiaolong Zheng and Wenji Mao Paper: Single-Shot
Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language
Model Approach Authors: James
Hu, Mohammadreza Ebrahimi and Hsinchun Chen |
Cybersecurity Education & Incident Provisioning
(1) [Session Chair: Elias Bou-Harb] Paper: Emotional
Analysis of Learning Cybersecurity with Games Authors: Maria
Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Handlin and
Jinghua Zhang Paper: Towards a Data-Driven Recommender
System for Handling Ransomware and Similar Incidents Authors: Martin Husák |
4:25 PM – 4:35
PM |
Session Break |
|
4:35 PM – 5:35
PM |
Adversarial Machine Learning (2) [Session Chair:
Hongyi Zhu] Paper: Generating
Optimal Attack Paths in Generative Adversarial Phishing Authors:
Rayah Alqurashi, Ahmed Aleroud, Ahmad Saifan, Mohammad Alsmadi and
Izzat Alsmadi Paper: Adversarial
Deep Reinforcement Learning Enabled Threat Analytics Framework for
Constrained Spatio-Temporal Movement Intelligence Data Authors:
Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma and Ankit Shah |
Cybersecurity Education & Incident Provisioning
(2) [Session Chair: Elias Bou-Harb] Paper: Feature-Level
Fusion of Super-App and Telecommunication Alternative Data Sources for Credit
Card Fraud Detection Authors: Jaime D. Acevedo-Viloria, Sebastián Soriano
Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin and
Alejandro Correa-Bahnsen Paper: Verbal
Deception Cues Training for the Detection of Phishing Emails Authors: Jaewan
Lim, Lina Zhou and Dongsong Zhang |
5:35 PM – 5:45
PM |
Day 1 Closing Remarks |
Day 2, Wednesday, November 3
Time (CDT/GMT-5) |
Events |
||
9:00 AM – 10:00
AM |
Socio-technical Perspectives (2) [Session Chair:
Lina Zhou] Paper: Credible
Influence Analysis in Mass Media Using Causal Inference Authors: Zizhen
Deng, Xiaolong Zheng, Zifan
Ye, Zhen Cai and Daniel Dajun Zeng Paper: Domain-oriented News
Recommendation in Security Applications * Authors: Ying Sun, Qingchao Kong, Luwen Huangfu and Jin Pan |
Deep Learning for Cyber Forensics (1) [Session
Chair: Hongyi Zhu] Paper: Boosting
Hidden Graph Node Classification for Large Social Networks Authors: Hanxuan Yang, Qingchao Kong, Wenji Mao and Lei Wang Paper: Identifying and
Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling
Approach Authors: Tala Vahedi, Benjamin
Ampel, Sagar Samtani and Hsinchun Chen |
|
10:00 AM – 10:10
AM |
Session Break |
||
10:10 AM – 11:10
AM |
Keynote Keynote Speaker: Dr. James Joshi, University of Pittsburgh and NSF SaTC Program Director, CISE/CNS Title: SaTC Program
Overview & Privacy - Challenges and Directions |
||
11:10 AM – 11:20
AM |
Session Break |
||
11:20 AM –
12:20 PM |
Socio-technical Perspectives (3) [Session Chair:
Lina Zhou] Paper: Identifying
Corporate Political Trends Online Authors: Alan
Michaels, Lauren Maunder, Joshua Lyons, Lauren Anderson, Joseph
Harrison, Brian Timana-Gomez, Kiernan George and Paul O'Donnell Paper: Quantifying
Use and Abuse of Personal Information Authors: Alan
Michaels, Joshua Lyons, Joseph Harrison, Lauren Maunder, Lauren
Anderson, Kiernan George and Paul O'Donnell |
Deep Learning for Cyber Forensics (2) [Session
Chair: Anthony Rios] Paper: Automated PII
Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer
Learning Approach * Authors: Yizhi Liu, Fang
Yu Lin, Mohammadreza Ebrahimi, Weifeng Li and Hsinchun Chen Paper: Mining User’s Opinion
Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model Authors: Haoda Qian, Liping Chen, Qiwen Zha and Qiudan Li |
|
12:20 PM – 12:50
PM |
Lunch Break |
||
12:50 PM – 1:00
PM |
Award Announcement |
||
1:00 PM – 2:20
PM |
Attack Detection and Analysis (1) [Session Chair:
Victor Benjamin] Paper: Analysis
and Detection of Application-independent Slow Denial of Service Cyber Attacks Authors:
Marek Sikora, Radek Fujdiak and Jiri Misurec Paper: Intrusion
Detection for Industrial Control Systems by Machine Learning using Privileged
Information Authors: Moojan
Pordelkhaki, Shereen Fouad and Mark Josephs Paper: User Role Identification in Software
Vulnerability Discussions over Social Networks Authors: Rebecca Jones, Daniel Fortin, Samrat
Chatterjee, Dennis Thomas and Lisa Newburn |
||
2:20 PM – 2:30
PM |
Session Break |
||
2:30 PM – 3:50
PM |
Attack Detection and Analysis (2) [Session Chair:
Victor Benjamin] Paper: Cyber-Physical System Security
Surveillance using Knowledge Graph based Digital Twins - A Smart Farming
Usecase Authors:
Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal and Anupam Joshi Paper: A
Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES
Implementations Authors: Vishnuvardhan
Iyer, Meizhi Wang, Jaydeep Kulkarni and Ali Yilmaz Paper: Behaviors
of Unwarranted Password Identification via Shoulder-Surfing during Mobile
Authentication Authors:
Lina Zhou, Kanlun Wang, Jianwei Lai and Dongsong Zhang |
||
3:50 PM – 4:00
PM |
Session Break |
||
4:00 PM – 5:20
PM |
COVID-19 Intervention for Cybersecurity [Session
Chair: Anthony Rios] Paper: Extracting Impacts of
Non-pharmacological Interventions for COVID-19 From Modelling Study Authors: Yunrong Yang, Zhidong Cao, Pengfei Zhao, Dajun Daniel Zeng,
Qingpeng Zhang and Yin Luo Paper: Evaluating the Impact
of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact
Network Model Authors: Tianyi Luo, Zhidong Cao, Pengfei Zhao, Dajun Daniel Zeng and
Qingpeng Zhang Paper: Characterization of
Domestic Violence through Self-disclosure in Social Media: A Case Study of
the Time of COVID-19 Authors: Abdulrahman Aldkheel,
Lina Zhou and Kanlun Wang |
||
5:20 PM – 5:30
PM |
Conference Closing Remarks: Dr. Elias Bou-Harb, UTSA |
||