Previous Workshops
BDA4CID 2017 at Big Data 2017
The 2017 International Workshop on Big Data Analytics for Cyber Intelligence and Defense (BDA4CID 2017) at the IEEE Big Data 2017 Conference in Boston, USA, was a great success and had attracted very positive responses from the authors and the audience. We believe the BDA4CID 2018 will continue and gain even greater success.
BDA4CID 2018 at Big Data 2018
The 2018 International Workshop on Big Data Analytics for Cyber Intelligence and Defence (BDA4CID 2018) at the IEEE Big Data 2018 Conference in Seattle, USA, continued the success of the workshop with great papers and positive feedback from the audience.
BDA4CID 2019 at Big Data 2019
The 2019 International Workshop on Big Data Analytics for Cyber Intelligence and Defence (BDA4CID 2019) at the IEEE Big Data 2019 Conference in Los Angeles, CA, USA, continued the success of the workshop with great papers and positive feedback from the audience.
Time | Title | Presenter/Author |
---|---|---|
1:30 – 1:40 pm | Arrivals and welcome | Stephen McGough |
1:40 – 2:10pm | A Location Independent Machine Learning Approach for Early Fake News Detection | Haohui Liu |
2:10 – 2:40pm | IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter | Amirreza Niakanlahiji, Lida Safarnejad, Reginald Harper and Bei-Tseng Chu |
2:40 – 3:10 pm | Online Hate: A Study on the Feasibility to Detect Hate Speech in Swedish | Johan Fernquist, Oskar Lindholm, Lisa Kaati and Nazar Akrami |
3:10 – 3:40pm | PRAT - a Tool for Assessing Risk in Written Communication | Amendra Shrestha, Lisa Kaati and Nazar Akrami |
3:40 – 4:00 pm | Coffee Break | |
4:00 – 4:30pm | Modeling and Forecasting Armed Conflict: AutoML with Human-Guided Machine Learning | Vito D’Orazio, James Honaker, Raman Prasad, Michael Shoemate |
4:30 – 5:00pm | Class Balancing for Fraud Detection in Point of Sale Systems | Christine Hines and Abdou Youssef |
5:00 – 5:30pm | Identifying Android Malware Families Using Android-Oriented Metrics | William Blanc, Lina G. Hashem, Karim O. Elish, and Hussain M. J. Almohri |
5:30 – 6:00pm | Volenti non fit injuria: Ransomware and its Victims | Amir Atapour-Abarghouei, Stephen Bonner and Andrew Stephen McGough |
6:00 – 6:00pm | BigData Cup Challenge Papers | |
6:00 – 6:30pm | Anuj@IEEE BigData2019: A Novel Code-Switching Behavior Analysis in Social Media Discussions Natural Language Processing | Anuj/Anuj Saini, Publicis Sapient |
6:30 - 7:00pm | Language Identification and Context-based Analysis of Code-switching Behaviors in Social Media Discussions | Yashvardhan/Akankshya Mishra & Yashvardhan Sharma |
7:00 - 7:00pm | Closing Remarks |
BDA4CID 2020 at Big Data 2020
The 2020 International Workshop on Big Data Analytics for Cyber Intelligence and Defence (BDA4CID 2020) at the IEEE Big Data 2020 Conference held virtually, continued the success of the workshop with great papers and positive feedback from the audience.
Time | Title | Presenter/Author |
---|---|---|
10:45 – 10:50am | Arrivals and welcome | Stephen McGough |
10:50 – 11:20am | S34201: FlightSense: A Spoofer Detection and Aircraft Identification System using Raw ADS-B Data | Nikita Joseph, Chaity Banerjee, Eduardo Pasiliao, and Tathagata Mukherjee |
11:20 – 11:50am | S34202: Rumor Detection on Social Networks: A Sociological Approach | Neelam Jogalekar, Vahida Attar, and Girish Palshikar |
11:50 – 12:20pm | S34203: Resolving the cybersecurity Data Sharing Paradox to scale up cybersecurity via a co-production approach towards data sharing | Amir Atapour-Abarghouei, Stephen McGough, and David Wall |
12:20 – 12:35pm | BDA4CID Workshop Closing Remarks | Stephen McGough |
BDA4CID 2021 at Big Data 2021
The 2021 International Workshop on Big Data Analytics for Cyber Intelligence and Defence (BDA4CID 2021) at the IEEE Big Data 2021 Conference held virtually, continued the success of the workshop with great papers and positive feedback from the audience.
Time | Title | Presenter / Authors |
---|---|---|
14:35 – 14:45 | Introduction to Workshop | Stephen McGough, Amir Atapour-Abarghouei, David Wall |
14:45 – 15:10 | A review of recent advances in machine learning approaches for cyber defense (BigD525) | Ricardo Buettner, Daniel Sauter, Jonas Klopfer, Johannes Breitenbach, and Hermann Baumgartl |
15:10 – 15:35 | Transforming Fake News: Robust Generalisable News Classification Using Transformers (BigD422) | Ciara Blackledge and Amir Atapour-Abarghouei |
15:35 – 15:55 | Coffee Break | |
15:55 – 16:20 | Rank over Class: The Untapped Potential of Ranking in Natural | |
Language Processing (BigD278) | Amir Atapour-Abarghouei, Stephen Bonner, and Andrew Stephen McGough | |
16:20 – 16:45 | “Just Drive”: Colour Bias Mitigation for Semantic Segmentation in the Context of Urban Driving (S35201) | Jack Stelling and Amir Atapour-Abarghouei |
16:45 – 17:10 | Round Table: What is the future of Big Data and Cyber Intelligence and Defence? | All |
17:10 – 17:30 | Closing Remarks |
BDA4CID 2022 at Big Data 2022
The 2022 International Workshop on Big Data Analytics for Cyber Intelligence and Defence (BDA4CID 2022) at the IEEE Big Data 2022 Conference held virtually, continued the success of the workshop with great papers and positive feedback from the audience.
Day 1:
Time | Title | Presenter / Authors |
---|---|---|
08:00 – 08:20 | Introduction to Physical workshop | Stephen McGough |
08:20 – 08:45 | A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing | Max Landauer, Florian Skopik, Georg Hoeld, and Markus Wurzenberger |
08:45 – 09:10 | Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques | Chiao-Cheng Huang, Pei-Yu Huang, Ying-Ren Kuo, Guo-Wei Wong, Yi-Ting Huang, Yeali S. Sun, and Meng Chang Chen |
09:10 – 09:35 | Simple and Efficient Identification of Personally Identifiable Information on Public Website | Caitlin Brown and Charles Morisset |
09:35 – 10:00 | Factor Detection Task of Cyberbullying Using the Deep Learning Model | Yu-Hsuan Wu, Sheng-Wei Huang, Wei-Yi Chung, Chen-Chia Yu, and Jheng-Long Wu |
10:00 – 10:30 | Coffee Break |
Day 2:
Time | Title | Presenter / Authors |
---|---|---|
10:30 – 10:55 | Fraud Detection Using Optimized Machine Learning Tools Under Imbalance Classes | Mary Isangediok and Kelum Gajamannage |
11:20 – 11:45 | MATE: Summarizing Alerts to Interpretable Outcomes with MITRE ATT&CK | Derek Lin |
11:45 – 12:10 | Cross-Lingual Propaganda Detection | Wenshan Zhang and Xi Zhang |
12:10 – 12:35 | Federated Learning Attacks and Defenses: A Survey | Yao Chen, Yijie Gui, Hong Lin, Wensheng Gan, and Yongdong Wu |
12:35 – 14:00 | Lunch Break | |
14:00 – 14:25 | Fast Illegal Webpage Detection Algorithm Based on Massive Domain Name Resolution Records | Yue Su, Botao Peng, and Xiaodong Li |
14:50 – 15:15 | Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector | Kshitiz Aryal, Maanak Gupta, and Mahmoud Abdelsalam |
17:20 – 17:45 | Improving conversational recommender systems via knowledge graph-based semantic fusion with historical interaction data | Thamizhiniyan Pugazhenthi and Huizhi Liang |
17:45 – 18:10 | Threat Modeling for Machine Learning-Based Network Intrusion Detection Systems | Huda Ali Alatwi and Charles Morisset |
BDA4CID 2023 at Big Data 2023
The 2023 International Workshop on Big Data Analytics for Cyber Intelligence and Defence (BDA4CID 2023) at the IEEE Big Data 2023 Conference Sorrento, Italy, continued the success of the workshop with great papers and positive feedback from the audience.
Time | Title | Authors |
---|---|---|
8:00 - 8:20 | Welcome | Chairs |
8:20 - 8:45 | Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users | Hina Qayyum, Muhammad Ikram, Benjamin Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users Zi Hao Zhao, Ian Wood, Nicolas Kourtellis, and Mohamed Ali Kaafar |
8:45 - 9:10 | On mission Twitter Profiles: A Study of Selective Toxic Behavior | Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian Wood, Nicolas Kourtellis, and Mohamed Ali Kaafar |
9:10 - 9:35 | Improving Cybersecurity Awareness: Tweet Classification using Multilingual Sentence Embeddings and Contextual Features | Anastasia Cotov, Carlo Bono, Cinzia Cappiello, and Barbara Pernici |
9:35 - 10:00 | Clean-label Poisoning Attack against Fake News Detection Models | Jiayi Liang, Xi Zhang, Yuming Shang, Sanchuan Guo, and Chaozhuo Li |
10:00 - 10:20 | Coffee Break | |
10:20 - 10:45 | Defending Federated Learning Against Model Poisoning Attacks | Ibraheem Aloran and Saeed Samet |
10:45 - 11:10 | A Cascade CNN Model based on Adaptive Learning Rate Thresholding for Reliable Face Recognition | Imen Labiadh, Larbi Boubchir, and Hassene Seddik |
11:10 - 11:35 | Transformer-based LLMs in Cybersecurity: An in-depth Study on Log Anomaly Detection and Conversational Defense Mechanisms | Prasasthy Balasubramanian, Justin Seby, and Panos Kostakos |
11:35 - 12:00 | Complementary Attention-Based Deep Learning Detection of Fake Faces | Supriyo Sadhya and Xiaojun Qi |
12:00 - 12:15 | Closing Remarks |