Posters

IEEE CNS 2016 Posters

Monday 17 October
17:40 – 18:20 Poster Presentation Highlights Roundtable
19:00 – 21:00 Poster Session in conjunction with the Welcome Reception

 

POSTER PREPARATION:

TEMPLATE: There is no predefined template for posters, you are free to use your own template.

 

SIZE: You should use the typical large poster size (24” x 36” = 61cm x 91cm). You can also opt for a slightly larger size (the foam core board will be 30” x 40”). We will provide push pins for mounting your poster to the board. 

 

POSTER SESSION (Monday, October 17th): 

For the first time this year, poster authors will have the opportunity to present the highlights of their work in a short 1 1/2 minute talk.

The poster presentation highlights roundtable will take place from 17:40 - 18:20. 
To minimize presenter transition delays, please email a 1-slide presentation to the poster chair Loukas Lazos (llazos@ece.arizona.edu) by Friday October 14th, 2016.

The poster session will be held in conjunction with the reception in Ben Franklin I-III, from 19:00 - 21:00.

 

ACCEPTED POSTERS

Optimized Aho-Corasick String Matching Algorithm for Smart Phones
Rui Lu and Derek Pao (City University of Hong Kong, Hong Kong)
 
WHAP: Web-Hacking Profiling Using Case-Based Reasoning
Mee Lan Han and Hee Chan Han (Korea University, Korea); Ah Reum Kang (University at Buffalo, USA); Byung Il Kwak (Korea University, Korea); Aziz Mohaisen (University at Buffalo, USA); Huy Kang Kim (Korea University, Korea)
 
The Performance of the MIMO Physical Layer Security System with Imperfect CSI
Luping Zhang (University of Electronic Science and Technology of China, China); Hong Wen (UESTC, China); Huan-huan Song (University of Electronic Science and Technology of China, China); Tang Jie (UESTC in China, China); Yixin Jiang (University of Waterloo, Canada); Xiping Zhu (University of Electronic Science and Technology of China, China)
 
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System
Jinling Zhang (University of Electronic Science and Technology of China, China); Hong Wen (UESTC, China); Huan-huan Song (University of Electronic Science and Technology of China, China); Yixin Jiang (University of Waterloo, Canada); ZhengGuang Zhang, Luping Zhang and Xiping Zhu (University of Electronic Science and Technology of China, China)
 
A MIMO Cross-layer Secure Communication Scheme Based on Spatial Modulation
ZhengGuang Zhang (University of Electronic Science and Technology of China, China); Hong Wen (UESTC, China); Huan-huan Song (University of Electronic Science and Technology of China, China); Yixin Jiang (University of Waterloo, Canada); Jinling Zhang and Xiping Zhu (University of Electronic Science and Technology of China, China)
 
A Study of HSM Based Key Protection in Encryption File System
Wenqian Yu (Intel Asia-Pacific Research & Development Ltd. & Intel, China); Weigang Li (Intel, China); Junyuan Wang and Changzheng Wei (Intel Asia-Pacific Research & Development Ltd., China)
 
Transparency of the new gTLD's Centralized Zone Data Service: A Measurement Study
Ah Reum Kang and Aziz Mohaisen (University at Buffalo, USA)
 
IDSaaS in SDN: Intrusion Detection System as a Service in Software Defined Networks
Julian Chukwu (University of Ottawa, Canada); Ose Osamudiamen and Ashraf Matrawy (Carleton University, Canada)
 
Assessing DNS Privacy under Partial Deployment of Special-Use Domain Names
Ah Reum Kang and Aziz Mohaisen (University at Buffalo, USA)
 
A User Study of the Effectiveness of Typosquatting Techniques
Jeffrey Spaulding, Ah Reum Kang and Aziz Mohaisen (University at Buffalo, USA)
 
Automatic Alerts Annotation for Improving DDoS Mitigation Systems
Ah Reum Kang and Aziz Mohaisen (University at Buffalo, USA)
 
Encryption-based Privacy Protection for Police Body-worn Cameras
Daniel Martinez (University of Maryland, Baltimore County, USA); Claire Cochrane and Chiu C. Tan (Temple University, USA)
 
SBPA: Social Behavior Based Cross Social Network Phishing Attacks
Yifan Tian and Jiawei Yuan (Embry-Riddle Aeronautical University, USA); Shucheng Yu (University of Arkansas at Little Rock, USA)
 
Joint Beamforming and Antenna Subarray Formation for Secrecy Capacity Maximization in MIMO Wiretap Channels
Jianli Huang (Electric Power Research Institute, CSG, China); Yixin Jiang (University of Waterloo, Canada); Aidong Xu (Electric Power Research Institute China Southern Power Grid, China); Hong Wen (UESTC, China); Huajun Chen and Xiaobin Guo (Electric Power Research Institute China Southern Power Grid, China); Zewu Guan (Electric Power Research Institute, CSG, China); Zhiming Wang (Southern Electric Power Research Institute, China)
 
Firewall for Brain: Towards a Privacy Preserving Ecosystem for BCI Applications
Hassan Takabi (University of North Texas, USA)
 
Comparison between Fingerprint and Behavioral Biometric Authentication using 2D and 3D Gestures
Diana Anguiano, Ghouri Mohammad Saaduddin, Yanyan Li and Mengjun Xie (University of Arkansas at Little Rock, USA)
 
Remote Live Forensics for Android Devices
Jonathan Ming (Azusa Pacific University, USA); Mengjun Xie (University of Arkansas at Little Rock, USA)
 
Towards Sequencing Malicious System Calls
Pooria Madani and Natalija Vlajic (York University, Canada)
 
Analyzing Deviant behaviors on Social Media using Cyber Forensics-based Methodologies
Brandon Dalton (Northeastern University, USA); Nitin Agarwal (University of Arkansas at Little Rock, USA)
 
Real Time Motion-Based Authentication for Smartwatch
Antwane Lewis (Philander Smith College &; University of Arkansas at Little Rock, USA)  Yanyan Li ; Mengjun Xie (University of Arkansas at Little Rock, USA)
 
A Framework for Counterfeit Smart Grid Device Detection
Leonardo Babun, Hidayet Aksu and Selcuk Uluagac (Florida International University, USA)
 
Pairing of Most Relevant Variables and Bootstrap Samples with Ridge Regression for Data Sharing
Shan Suthaharan (University of North Carolina at Greensboro, USA); Weining Shen (University of California at Irvine, USA)