Copyright 2021 IEEE International Conference on Intelligence and Security Informatics. All rights reserved.

Proceedings from previous years are available through the IEEE Xplore Digital Library.

IEEE ISI 2021 Program Schedule

All times are in US central daylight time.

 

Day 1, Tuesday, November 2

 

Time (CDT/GMT-5)

Events

9:00 AM – 10:20 AM

Opening and Keynote

 

Opening Remarks: ISI 2021 Honorary Chair: Dr. Nicole Beebe, Department of ISCS, UTSA

 

Keynote Speaker: Dr. Vyas Sekar, Tan Family Professor of ECE, CMU

Title: (How) Can Programmable Networks Help Reverse Attacker-Defender Asymmetry?

 

10:20 AM – 10:30 AM

Session Break

10:30 AM – 11:50 AM

Cyber Threat Intelligence [Session Chair: Elias Bou-Harb]

 

Paper: Cyber Security Threat Intelligence Monitoring and Classification

Authors: Bo-Xiang Wang, Jiann-Liang Chen and Chiao-Lin Yu

 

Paper: Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study

Authors: Othmane Cherqi, Hicham Hammouchi, Mounir Ghogho and Houda Benbrahim

 

Paper: Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network

Authors: Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan and William H. Hsu

 

11:50 AM – 12:20 PM

Lunch Break

12:20 PM – 1:50 PM

Socio-technical Perspectives (1) [Session Chair: Victor Benjamin]

 

Paper: A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis *

Authors: Yuan Tian, Nan Xu and Wenji Mao

 

Paper: The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique

Authors: Brett Jefferson, Natalie Heller, Joseph Cottam, Nhuy Van and George Chin Jr

 

Paper: Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations

Authors: Stefano Stamato, Andrew Park, Brian Eng, Valerie Spicer, Herbert H. Tsang and D. Kim Rossmo

 

1:50 PM – 2:00 PM

Session Break

2:00 PM – 3:15 PM

Dark Web Analytics [Session Chair: Anthony Rios]

 

Paper: Exploring the Evolution of Exploit-Sharing Hackers:  An Unsupervised Graph Embedding Approach

Authors: Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu and Hsinchun Chen

 

Paper: Exploring Differences Among Darknet and Surface Internet Hacking Communities

Authors: Zhiyuan Ding, Victor Benjamin, Weifeng Li and Xueyan Yin

 

Paper: Distilling Contextual Embeddings Into A Static Word Embedding for Improving Hacker Forum Analytics

Authors: Benjamin Ampel and Hsinchun Chen

 

3:15 PM – 3:25 PM

Session Break

3:25 PM – 4:25 PM

Adversarial Machine Learning (1) [Session Chair: Hongyi Zhu]

 

Paper: Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations

Authors: Xingwei Zhang, Xiaolong Zheng and Wenji Mao

 

Paper: Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Authors: James Hu, Mohammadreza Ebrahimi and Hsinchun Chen

 

Cybersecurity Education & Incident Provisioning (1) [Session Chair: Elias Bou-Harb]

 

Paper: Emotional Analysis of Learning Cybersecurity with Games

Authors: Maria Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Handlin and Jinghua Zhang

 

Paper: Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents

Authors: Martin Husák

 

4:25 PM – 4:35 PM

Session Break

4:35 PM – 5:35 PM

Adversarial Machine Learning (2) [Session Chair: Hongyi Zhu]

 

Paper: Generating Optimal Attack Paths in Generative Adversarial Phishing

Authors: Rayah Alqurashi, Ahmed Aleroud, Ahmad Saifan, Mohammad Alsmadi and Izzat Alsmadi

 

Paper: Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data

Authors: Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma and Ankit Shah

Cybersecurity Education & Incident Provisioning (2) [Session Chair: Elias Bou-Harb]

 

Paper: Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection

Authors: Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin and Alejandro Correa-Bahnsen

 

Paper: Verbal Deception Cues Training for the Detection of Phishing Emails

Authors: Jaewan Lim, Lina Zhou and Dongsong Zhang

 

5:35 PM – 5:45 PM

Day 1 Closing Remarks

 

Day 2, Wednesday, November 3

 

Time (CDT/GMT-5)

Events

9:00 AM – 10:00 AM

Socio-technical Perspectives (2) [Session Chair: Lina Zhou]

 

Paper: Credible Influence Analysis in Mass Media Using Causal Inference

Authors: Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai and Daniel Dajun Zeng

 

Paper: Domain-oriented News Recommendation in Security Applications *

Authors: Ying Sun, Qingchao Kong, Luwen Huangfu and Jin Pan

 

Deep Learning for Cyber Forensics (1) [Session Chair: Hongyi Zhu]

 

Paper: Boosting Hidden Graph Node Classification for Large Social Networks

Authors: Hanxuan Yang, Qingchao Kong, Wenji Mao and Lei Wang

 

Paper: Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach

Authors: Tala Vahedi, Benjamin Ampel, Sagar Samtani and Hsinchun Chen

 

10:00 AM – 10:10 AM

Session Break

10:10 AM – 11:10 AM

Keynote

 

Keynote Speaker: Dr. James Joshi, University of Pittsburgh and NSF SaTC Program Director, CISE/CNS

Title: SaTC Program Overview & Privacy - Challenges and Directions

 

11:10 AM – 11:20 AM

Session Break

11:20 AM – 12:20 PM

Socio-technical Perspectives (3) [Session Chair: Lina Zhou]

 

Paper: Identifying Corporate Political Trends Online

Authors: Alan Michaels, Lauren Maunder, Joshua Lyons, Lauren Anderson, Joseph Harrison, Brian Timana-Gomez, Kiernan George and Paul O'Donnell

 

Paper: Quantifying Use and Abuse of Personal Information

Authors: Alan Michaels, Joshua Lyons, Joseph Harrison, Lauren Maunder, Lauren Anderson, Kiernan George and Paul O'Donnell

 

Deep Learning for Cyber Forensics (2) [Session Chair: Anthony Rios]

 

Paper: Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach *

Authors: Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li and Hsinchun Chen

 

Paper: Mining User’s Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model

Authors: Haoda Qian, Liping Chen, Qiwen Zha and Qiudan Li

 

 

12:20 PM – 12:50 PM

Lunch Break

12:50 PM – 1:00 PM

Award Announcement

1:00 PM – 2:20 PM

Attack Detection and Analysis (1) [Session Chair: Victor Benjamin]

 

Paper: Analysis and Detection of Application-independent Slow Denial of Service Cyber Attacks

Authors: Marek Sikora, Radek Fujdiak and Jiri Misurec

 

Paper: Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information

Authors: Moojan Pordelkhaki, Shereen Fouad and Mark Josephs

 

Paper: User Role Identification in Software Vulnerability Discussions over Social Networks

Authors: Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis Thomas and Lisa Newburn

 

2:20 PM – 2:30 PM

Session Break

2:30 PM – 3:50 PM

Attack Detection and Analysis (2) [Session Chair: Victor Benjamin]

 

Paper: Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase

Authors: Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal and Anupam Joshi

 

Paper: A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations

Authors: Vishnuvardhan Iyer, Meizhi Wang, Jaydeep Kulkarni and Ali Yilmaz

 

Paper: Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication

Authors: Lina Zhou, Kanlun Wang, Jianwei Lai and Dongsong Zhang

 

3:50 PM – 4:00 PM

Session Break

4:00 PM – 5:20 PM

COVID-19 Intervention for Cybersecurity [Session Chair: Anthony Rios]

 

Paper: Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling Study

Authors: Yunrong Yang, Zhidong Cao, Pengfei Zhao, Dajun Daniel Zeng, Qingpeng Zhang and Yin Luo

 

Paper: Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model

Authors: Tianyi Luo, Zhidong Cao, Pengfei Zhao, Dajun Daniel Zeng and Qingpeng Zhang

 

Paper: Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19

Authors: Abdulrahman Aldkheel, Lina Zhou and Kanlun Wang

 

5:20 PM – 5:30 PM

Conference Closing Remarks: Dr. Elias Bou-Harb, UTSA