Rumor Detection with a novel graph neural network approach

T Liu, Q Cai, C Xu, B Hong, F Ni, Y Qiao… - arxiv preprint arxiv …, 2024 - arxiv.org
The wide spread of rumors on social media has caused a negative impact on people's daily
life, leading to potential panic, fear, and mental health problems for the public. How to …

Image Captioning in news report scenario

T Liu, Q Cai, C Xu, B Hong, J **ong, Y Qiao… - arxiv preprint arxiv …, 2024 - arxiv.org
Image captioning strives to generate pertinent captions for specified images, situating itself
at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This …

Feature manipulation for ddpm based change detection

Z Li, Y Huang, M Zhu, J Zhang, JH Chang… - arxiv preprint arxiv …, 2024 - arxiv.org
Change Detection is a classic task of computer vision that receives a bi-temporal image pair
as input and separates the semantically changed and unchanged regions of it. The diffusion …

Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection

Z Li, H Zhu, H Liu, J Song, Q Cheng - arxiv preprint arxiv:2403.02232, 2024 - arxiv.org
This study conducts a thorough examination of malware detection using machine learning
techniques, focusing on the evaluation of various classification models using the Mal-API …

Adaptive ensembles of fine-tuned transformers for llm-generated text detection

Z Lai, X Zhang, S Chen - arxiv preprint arxiv:2403.13335, 2024 - arxiv.org
Large language models (LLMs) have reached human-like proficiency in generating diverse
textual content, underscoring the necessity for effective fake text detection to avoid potential …

[HTML][HTML] IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks

R Kalaria, ASM Kayes, W Rahayu, E Pardede… - Computers & …, 2024 - Elsevier
Abstract Securing Internet of Things (IoT) devices is paramount to mitigate unauthorised
access and potential cyber threats, safeguarding the integrity of transmitted and processed …

Securing the grid: A comprehensive analysis of cybersecurity challenges in PMU-based cyber-physical power networks

B Jimada-Ojuolape, J Teh, CM Lai - Electric Power Systems Research, 2024 - Elsevier
The threat of cyber-attacks poses a considerable risk to Phasor Measurement Unit (PMU)
applications within Cyber-Physical Power Networks (CPPNs), leaving them susceptible to …

Precision strike: Precise backdoor attack with dynamic trigger

Q Li, W Chen, X Xu, Y Zhang, L Wu - Computers & Security, 2025 - Elsevier
Deep neural networks have advanced significantly in the last several years and are now
widely employed in numerous significant real-world applications. However, recent research …

[HTML][HTML] Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection

Y Yuan, G Apruzzese, M Conti - Computers & Security, 2025 - Elsevier
Phishing attacks are on the rise, and phishing websites are everywhere, denoting the
brittleness of security mechanisms reliant on blocklists. To cope with this threat, many works …

Adversarial examples in the physical world: A survey

J Wang, X Liu, J Hu, D Wang, S Wu, T Jiang… - arxiv preprint arxiv …, 2023 - arxiv.org
Deep neural networks (DNNs) have demonstrated high vulnerability to adversarial
examples, raising broad security concerns about their applications. Besides the attacks in …