Event Category: In-house Presentation

A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums

To date, most analysis of collaboration between malware authors has been performed on meta-data and compiled binaries, while ignoring artifacts...

Read more arrow_right_alt

I love pinapple on pizza! = I hate pinapple on pizza: Stance-Aware Sentence Transformers for Opinion Mining

Sentence transformers’ job is to convert pieces of text into embedded vectors, where similar (dissimilar) pieces of text have spatially...

Read more arrow_right_alt

Characterizing, Modeling and Exploiting the Mobile Demand Footprint of Large Public Protests

Smartphones and mobile applications are staple tools in the operation of current-age public demonstrations, where they support organizers and participants...

Read more arrow_right_alt

FedQV: Leveraging Quadratic Voting in Federated Learning

Federated Learning (FL) permits different parties to collaboratively train a global model without disclosing their respective local labels. A crucial...

Read more arrow_right_alt

Sustainable Provision of URLLC Services for V2N: Analysis and Optimal Configuration

The rising popularity of Vehicle-to-Network (V2N) applications is driven by the Ultra-Reliable Low-Latency Communications (URLLC) service offered by 5G. The...

Read more arrow_right_alt

Reversing the Virtual Maze: An Overview of the Technical and Methodological Challenges for Metaverse App Analysis

The Metaverse is a virtual world that is becoming increasingly popular. Recent technological advances, such as head-mounted displays and novel...

Read more arrow_right_alt

Location Data: Friend or Foe? An Investigation into the Reliability of Location Signals in Mobile Advertising

This paper investigates the accuracy and integrity of location data within the realm of Location-Based Mobile Marketing (LBMM). By analyzing...

Read more arrow_right_alt

Metric meta-learning optimization towards Intent-Based Networking implementation

Zero-touch network management is essential for beyond 5G and 6G systems, requiring full automation through a closed loop of data...

Read more arrow_right_alt

DEEXP: Revealing Model Vulnerabilities for Spatio-Temporal Mobile Traffic Forecasting with Explainable AI

The ability to perform mobile traffic forecasting effectively with Deep Neural Networks (DNN) is instrumental to optimise resource management in...

Read more arrow_right_alt

Towards Ultra-Low Latency User-Plane Cyberattack Detection in SDN-based Smart Grids

Machine Learning (ML) models are widely used for cyberattack detection in Smart Grids (SG) based on Software-Defined Networks (SDN). However,...

Read more arrow_right_alt

Recent Comments

    Archives

    Categories