Crime profile analysis and Fact checking .- A Canary in the Voting Booth: Attacks on a Virtual Voting Machine.- Catch Me if You Can: Analysis of Digital Devices Artifacts Used in Murder Cases.- Enhancing Incident Management by an improved Understanding of Data Exfiltration: Definition, Evaluation, Review.- Identify Users on Dating Applications: A Forensic Perspective.- Removing Noise (Opinion Messages) For Fake News De-tection In Discussion Forum Using BERT Model.- Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social.- Information hiding .
- A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis.- A Multi-Carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model.- Point cloud model information hiding algorithm based on multi-scale transformation and composite operator.- An Information Hiding Algorithm Baed on Multi-Carrier Fusion State Partitioning of 3D Models.- Machine learning .- CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNs.- Decoding HDF5: Machine Learning File Forensics and Data Injection.- DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic Detection.
- Finding Forensic Artefacts in Long-term Frequency Band Occupancy Measurements using Statistics and Machine Learning.- IoT Malicious Traffic Detection based on Federated Learning.- Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime Detection.- Backdoor Learning on Siamese Networks using Physical Triggers: FaceNet as a Case Study.- Research on Feature Selection Algorithm of Energy Curve.- Power Analysis Attack Based on GA-based Ensemble Learning.