skip to main content
10.1145/3660512acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
SCID '24: Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder
ACM2024 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '24: ACM Asia Conference on Computer and Communications Security Singapore Singapore July 1 - 5, 2024
ISBN:
979-8-4007-0650-9
Published:
01 July 2024
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Free
TripletViNet: Mitigating Misinformation Video Spread Across Platforms
Article No.: 1, Pages 1–12https://doi.org/10.1145/3660512.3665519

There has been rampant propagation of fake news and misinformation videos on many platforms lately, and moderation of such content faces many challenges that must be overcome. Recent research has shown the feasibility of identifying video titles from ...

research-article
Free
An Empirical Study of Photo Naming Conventions across Popular Social Media Platforms
Article No.: 2, Pages 1–8https://doi.org/10.1145/3660512.3665520

Metadata analysis is a crucial aspect of image forensics, but what happens when all information about an image, including its metadata, is lost? In such situations, it is important to explore alternative methods for image analysis. Our research has ...

research-article
Free
A Hybrid Approach for Cheapfake Detection Using Reputation Checking and End-To-End Network
Article No.: 3, Pages 1–12https://doi.org/10.1145/3660512.3665521

In today’s era dominated by digital manipulations, the identification of Cheapfakes, especially those involving out-of-context visuals, is imperative for upholding the integrity of information dissemination and fostering trust in multimedia content. ...

research-article
Open Access
Digital Signatures for Authenticating Compressed JPEG Images
Article No.: 4, Pages 1–12https://doi.org/10.1145/3660512.3665522

We construct a digital signature scheme for images that allows the image to be compressed without invalidating the signature. More specifically, given a JPEG image signed with our signature scheme, a third party can compress the image using JPEG ...

research-article
Free
Combating Phishing in the Age of Fake News: A Novel Approach with Text-to-Text Transfer Transformer
Article No.: 5, Pages 1–7https://doi.org/10.1145/3660512.3665523

In the digital landscape, where fake news proliferates across online platforms, it not only distorts public discourse but also paves the way for sophisticated cyber threats, particularly phishing attacks. These attacks often exploit the credibility ...

research-article
Free
Vietnamese User Awareness Against Scams in Cyberspace: An Empirical Survey
Article No.: 6, Pages 1–6https://doi.org/10.1145/3660512.3665525

While technological advancement brings undeniable benefits in improving the quality of daily life, it also poses some risks, such as increasing users’ exposure to scams and cyber fraud. In the realm of cyber scam prevention, enhancing user awareness is ...

research-article
Free
Interactive Assistance in Malware Dissemination Detection and Analysis
Article No.: 7, Pages 1–6https://doi.org/10.1145/3660512.3665526

Analysis of a complex cyber-security attack often involves a variety of tools, for each specific payload used in the attack. The information supplied by these tools must be soundly correlated to obtain a correct verdict. We propose a tool, GView, that is ...

Contributors
  • University of Bergen
  • KU Leuven
  • Viet Nam National University Ho Chi Minh City

Recommendations