Security and Communication Networks

Multimodality Data Analysis in Information Security


Publishing date
01 Aug 2021
Status
Published
Submission deadline
26 Mar 2021

Lead Editor
Guest Editors

1Harbin Engineering University, Harbin, China

2Carnegie Mellon University, Pittsburgh, USA

3Nanjing University of Science and Technology, Nanjing, China


Multimodality Data Analysis in Information Security

Description

As modern embedded devices, communication manufacture, and Internet technology have been significantly developed in the last decade, massive amounts of multimodality data can be easily acquired from electronic sensors, computers, mobile terminals, and various networks made up by them (e.g. the Internet, IoT, etc). Correspondingly, issues of information security in data exploitation and analysis inevitably arise.

Generally, multimodality data contains much more potential information available and is capable of providing an enhanced analytical result compared to mono-source data. The way to combine the data acquired from diverse sources suitably plays a crucial role in multimodality data analysis and is worth investigating. In addition, considering that multimodality data usually belongs to big data in practice, researchers have developed some technologies based on multimodal learning to enhance human analysis effectively and quickly at a low cost. The study of multimodal learning in information security has been attracting increasing numbers of researchers and practitioners in both academia and industry.

Original research contributions and review articles on multimodality data analysis and derivative issues of information security are solicited for the Special Issue. Research devoted to the improvement and optimization of the existing multimodality data analysis methods in information security, as well as work on new models, theories, and approaches for multimodality data, are encouraged.

Potential topics include but are not limited to the following:

  • Multimodal source or sensor data fusion theory and application in information security
  • Multimodal learning in cyber security, e.g. threat detection, malicious attack detection and identification, malware detection and classification, network analysis, endpoint protection, and vulnerability assessment, etc.
  • Multimodality data representation, alignment, fusion, and co-learning
  • Multimodality machine learning and data analysis
  • Multimodal adversarial training for attacks and defence

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6699974
  • - Research Article

Distributed Functional Signature with Function Privacy and Its Application

Muhua Liu | Lin Wang | ... | Jianqiang Song
  • Special Issue
  • - Volume 2021
  • - Article ID 6621760
  • - Research Article

Genetic Feature Fusion for Object Skeleton Detection

Yang Qiao | Yunjie Tian | ... | Jianbin Jiao
  • Special Issue
  • - Volume 2021
  • - Article ID 6633250
  • - Research Article

ETCC: Encrypted Two-Label Classification Using CNN

Yan Li | Yifei Lu
  • Special Issue
  • - Volume 2021
  • - Article ID 6614702
  • - Research Article

Side-Channel Leakage Detection with One-Way Analysis of Variance

Wei Yang | Anni Jia
  • Special Issue
  • - Volume 2021
  • - Article ID 6695858
  • - Research Article

Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection

Songjie Wei | Zedong Zhang | ... | Pengfei Jiang
  • Special Issue
  • - Volume 2021
  • - Article ID 6671132
  • - Research Article

A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks

Daoqi Han | Songqi Wu | ... | Yueming Lu
  • Special Issue
  • - Volume 2021
  • - Article ID 6643034
  • - Research Article

Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events

Xinzhi Feng | Yang Yang | ... | Ze Ji
  • Special Issue
  • - Volume 2021
  • - Article ID 6662989
  • - Research Article

Weighted Nuclear Norm Minimization on Multimodality Clustering

Lei Du | Songsong Dai | ... | Yingying Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 6684179
  • - Research Article

PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation

Zixuan Shen | Zhihua Xia | Peipeng Yu
  • Special Issue
  • - Volume 2020
  • - Article ID 6662166
  • - Research Article

Detecting Web Spam Based on Novel Features from Web Page Source Code

Jiayong Liu | Yu Su | ... | Cheng Huang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.