Journal Papers
2024
- F. Lin, S. Samtani, H. Zhu, L. Brandimarte, and H. Chen, “Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach” Forthcoming at MIS Quarterly (MISQ).
- S. Yu, Y. Chai, S. Samtani, H. Liu, and H. Chen, “Motion Sensor-Based Fall Prediction: A Hidden Markov Model and Generative Adversarial Network (HMM-GAN) Approach” Forthcoming at Information Systems Research (ISR). https://doi.org/10.1287/isre.2023.1203
- S. Samtani, E. Raff, and H. Anderson, “Applied Machine Learning for Information Security” Forthcoming at ACM Digital Threats: Research and Practice (DTRAP). https://doi.org/10.1145/3652029
- Y. Gao, B. Ampel, and S. Samtani, “Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022” Forthcoming at ACM Digital Threats: Research and Practice (DTRAP). https://doi.org/10.1145/3603507
- B. Ampel, S. Samtani, H. Zhu, H. Chen, and J.F. Nunamaker, Jr., “Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach” Journal of Management Information Systems (JMIS), Volume 41, Issue 1, Pages 236-265, 2024. https://doi.org/10.1080/07421222.2023.2301178
- B. Ampel, S. Samtani, H. Zhu, and H. Chen, “Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach” MIS Quarterly (MISQ), Volume 48, Issue 1, Pages 137-166, 2024.
- J. Hughes, S. Pastrana, A. Hutchings, S. Afroz, S. Samtani, W. Li, and E. Marin, “SoK: The Art of Cybercrime Community Research” ACM Computing Surveys (CSUR), Volume 56, Issue 6, Pages 1-26, 2024. https://doi.org/10.1145/3639362
2023
- E. Jing, Y. Liu, Y. Chai, J. Sun, S. Samtani, Y. Jiang, and Y. Qian, “A Deep Explainable Representation Learning Method for Speech Emotion Recognition” Information Processing and Management (IP&M), Volume 60, Issue 6, 103501, 2023.
- Y. Liang, L. Liu, L. Huangfu, S. Samtani, Z. Yu, and D. Zeng, “Learning Entangled Interactions of Complex Causality via Self-Paced Contrastive Learning” ACM Transactions on Knowledge and Data Discovery (TKDD), Volume 18, Issue 3, Pages 1-24, 2023. https://doi.org/10.1145/3632406
- Y. Chai, R. Liang, S. Samtani, H. Zhu, M. Wang, Y. Liu, and Y. Jiang, “Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression” IEEE Transactions on Knowledge and Data Engineering (TKDE), Volume 35, Issue 12, Pages 12400-12414, 2023. https://doi.org/10.1109/TKDE.2023.3270581
- S. Samtani, H. Zhu, B. Padmanabhan, Y. Chai, H. Chen, and J.F. Nunamaker, Jr., “Deep Learning for Information Systems Research” Journal of Management Information Systems (JMIS), Volume 40, Issue 1, Pages 271-301, 2023. https://doi.org/10.1080/07421222.2023.2172772
- Y. Liang, Y. Qin, Q. Li, X. Yan, L. Huangfu, S. Samtani, B. Guo, and Z. Yu, “An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals” IEEE Transactions on Dependable and Secure Computing (TDSC). Volume 20, Number 4, pp. 3037-3050, 2023. https://doi.org/10.1109/TDSC.2022.3198934
- S. Samtani, Z. Zhao, and R. Krishnan, “Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence” Information Systems Frontiers (ISF), Volume 25, Issue 2, Pages 425-430, 2023. https://doi.org/10.1007/s10796-023-10372-y
- Y. Chai, H. Liu, J. Xu, S. Samtani, Y. Jiang, and H. Liu, “A Multi-Label Classification with Adversarial-based Denoising Autoencoder Approach for Medical Image Annotation” ACM Transactions on MIS (TMIS), Volume 14, Issue 2, Pages 1-21, 2023. https://doi.org/10.1145/3561653
2022
- Y. Liang, Y. Qin, Q. Li, X. Yan, Z. Yu, B. Guo, S. Samtani, and Y. Zhang, “AccMyrinx: Speech Synthesis with Non-Acoustic Sensor” Proceedings of the ACM on Interactive, Mobile, Wearable, and Ubiquitous Technologies (IMWUT), Volume 6, Issue 3, Pages 1-24, 2022. https://dl.acm.org/doi/10.1145/3550338
- S. Samtani, H. Chen, M. Kantarcioglu, and B. Thuraisingham, “Explainable Artificial Intelligence for Cyber Threat Intelligence” IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 19, Issue 4, Pages 2149-2150, 2022. https://doi.org/10.1007/s10796-023-10372-y
- M. Ebrahimi, Y. Chai, S. Samtani, and H. Chen, “Cross-Lingual Security Analytics: Cyber Threat Detection in the International Dark Web with Adversarial Deep Representation Learning” MIS Quarterly (MISQ), Volume 46, Issue 2, Pages 1209-1226, 2022. https://doi.org/10.25300/MISQ/2022/16618
- S. Samtani, Y. Chai, and H. Chen, “Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model Approach” MIS Quarterly (MISQ), Volume 46, Issue 2, Pages 909-946, 2022. https://doi.org/10.25300/MISQ/2022/15392
2021
- H. Zhu, S. Samtani, R. Brown, and H. Chen, “A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns” MIS Quarterly (MISQ), Volume 45, Issue 2, Pages 859-896, 2021. https://doi.org/10.25300/MISQ/2021/15574
- S. Chakraborty, A. Onuchowska, S. Samtani, W. Jank, and B. Wolfram, “Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency – Complexity Tradeoff” ACM Transactions on MIS(TMIS), Volume 12, Issue 4, Pages 1-28, 2021. https://doi.org/10.1145/3460822
- S. Samtani, W. Li, V. Benjamin, and H. Chen, “Developing Situational Awareness from the Dark Web: The AZSecure Hacker Assets Portal” ACM Digital Threats Research and Practice (DTRAP), Volume 2, Issue 4, Pages 1-10, 2021. https://doi.org/10.1145/3450972
- Y. Liang, X. Wang, Z. Yu, B. Guo, X. Zheng, and S. Samtani, “Energy-Efficient Collaborative Sensing: Learning the Latent Correlations of Heterogeneous Sensors” ACM Transactions on Sensor Networks (TOSN), Volume 17, Issue 3, Pages 1-29, 2021. https://doi.org/10.1145/3448416
- S. Samtani, M. Kantarcioglu, and H. Chen, “A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems” ACM Transactions on MIS (TMIS), Volume 12, Issue 1, Pages 1-18, 2021. https://doi.org/10.1145/3447507
- Y. Liang, H. Li, B. Guo, Z. Yu, X. Zheng, S. Samtani, and D. Zeng, “Fusion of Heterogeneous Attention Mechanisms in Multi-View Convolutional Neural Networks for Text Classification” Information Sciences, Volume 548, Pages 295-312, 2021. https://doi.org/10.1016/j.ins.2020.10.021
2020
- S. Samtani, M. Kantarcioglu, and H. Chen, “Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap” ACM Transactions on MIS (TMIS), Volume 11, Issue 4, Pages 1-18, 2020. https://doi.org/10.1145/3430360
- Y. Liang, S. Samtani, B. Guo, and Z. Yu, “Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective” IEEE Internet of Things Journal (IoTJ), Volume 7, Issue 9, Pages 9128 – 9143, 2020. https://doi.org/10.1109/JIOT.2020.3004077
- S. Samtani, H. Zhu, and H. Chen, “Proactively Identifying Emerging Hacker Threats on the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)” ACM Transactions on Privacy and Security, Volume 23, Issue 4, Pages 1-33, 2020. https://doi.org/10.1145/3409289
- H. Zhu, S. Samtani, H. Chen, and J.F. Nunamaker, Jr., “Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach” Journal of Management Information Systems, Volume 37, Issue 2, Pages 457 – 483, 2020. https://doi.org/10.1080/07421222.2020.1759961
- M. Safaei Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, S. Samtani, J. Crichigno, and N. Ghani, “On Data-driven Curation, Learning, and Analysis for Inferring Evolving Internet-of-Things (IoT) Botnets in the Wild” Computers and Security, Volume 91, 101707, 2020. https://doi.org/10.1016/j.cose.2019.101707
2019
- S. Samtani, S. Yu, and H. Zhu, “Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk” AIS Transactions on Replication Research, Volume 5, Number 5, Pages 1-22, 2019. https://doi.org/10.17705/1atrr.00037
2018
- S. Samtani, S. Yu, H. Zhu, M. Patton, J. Matherly, and H. Chen, “Identifying SCADA Systems and their Vulnerabilities on the Internet of Things: A Text Mining Approach” IEEE Intelligent Systems, Volume 33, Issue 2, Pages 63-73, 2018. https://doi.org/10.1109/MIS.2018.111145022
2017
- S. Samtani, R. Chinn, H. Chen, and J. F. Nunamaker, Jr., “Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence” Journal of Management Information Systems, Volume 34, Number 3, Pages 1023-1053, 2017. https://doi.org/10.1080/07421222.2017.1394049
Conference Papers
2024
- B. Lazarine, S. Samtani, H. Zhu, and R. Venkataraman, “Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach” Hawaii International Conference on Systems Sciences (HICSS). Waikiki, Hawaii, January 3 – 6, 2024.
- M. Patton, S. Samtani, H. Chen, and H. Zhu, “Minitrack Introduction: Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI” Hawaii International Conference on Systems Sciences (HICSS). Waikiki, Hawaii, January 3 – 6, 2024.
2023
- A. Kathikar, A. Nair, B. Lazarine, A. Sachdeva, and S. Samtani, “Assessing the Vulnerabilities of the Open-Source Artificial Intelligence Landscape: A Large Scale Analysis of the Hugging Face Platform” IEEE Intelligence and Security Informatics. Charlotte, North Carolina, October 2-3, 2023. https://doi.org/10.1109/ISI58743.2023.10297271
- B. Ampel, T. Vahedi, S. Samtani, and H. Chen, “Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach” IEEE Intelligence and Security Informatics. Charlotte, North Carolina, October 2-3, 2023. https://doi.org/10.1109/ISI58743.2023.10297272
- B. Ampel, K. Otto, S. Samtani, and H. Chen, “Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach” IEEE Intelligence and Security Informatics. Charlotte, North Carolina, October 2-3, 2023. https://doi.org/10.1109/ISI58743.2023.10297290
- S. Samtani, S. Yang, and H. Chen, “The 3rd Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics” 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Washington, DC, August 6-10, 2023. https://doi.org/10.1145/3580305.3599229
- A. Sachdeva, B. Lazarine, H. Zhu, S. Samtani, “User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach” 16th USENIX Cyber Security Experimentation and Test (CSET) Workshop. Marina del Rey, CA. August 7, 2023. https://doi.org/10.1145/3607505.3607512
- A. Yuan, M. Xu, H. Zhu, E. Garcia, and S. Samtani, “Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data” IEEE International Conference on Digital Health (ICDH). Chicago, IL. July 2-8, 2023. https://doi.org/10.1109/ICDH60066.2023.00025
- A. Yuan, H. Zhu, E. Garcia, and S. Samtani, “Detecting the Human Behaviors Associated with Depression via Sensor Signal Analysis: A Multiview-based Self-Attention Approach” Conference on Health Information Technology and Analytics (CHITA). Baltimore, Maryland. May 4-6, 2023. (Best Student Paper Award).
- B. Ampel, Y. Gao, J. Hu, S. Samtani, and H. Chen, “Benchmarking the Robustness of Phishing Email Detection Systems” Americas Conference on Information Systems (AMCIS). Panama City, Panama. August 10-12, 2023.
2022
- D. Manatova, D. Sharman, S. Samtani, and L. Camp, “Building and Testing a network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains” APWG Symposium on Electronic Crime Research. Virtual. November 30, 2022. https://doi.org/10.1109/eCrime57793.2022.10142120
- A. Sachdeva, B. Lazarine, R. Dama, S. Samtani, and H. Zhu, “Identifying the Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach” IEEE International Conference on Data Mining Workshop on Machine Learning for Cybersecurity (MLC). Orlando, FL. November 28, 2022. https://doi.org/10.1109/ICDMW58026.2022.00084
- B. Lazarine, Z. Zhong, A. Sachdeva, S. Samtani and H. Zhu, “Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations” 15th USENIX Cyber Security Experimentation and Test (CSET) Workshop. Los Angeles, CA. August 8, 2022. https://doi.org/10.1145/3546096.3546114
- S. Samtani, G. Wang, A. Ahmadzadeh, S. Yang, A. Ciptadi, and H. Chen, “ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense” 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Washington, DC, August 14-18, 2022. https://doi.org/10.1145/3534678.3542894
- D. Manatova, I. Kouper, and S. Samtani, “Designing a Vulnerability Management Dashboard to Enhance Security Analysts’ Decision Making Processes,” ACM Practice & Experience in Advanced Research Computing. Boston, MA, July 10-14, 2022. https://doi.org/10.1145/3491418.3535176
- M. Kantarcioglu, B. Carminati, S. Samtani, S. Mittal, and M. Gupta, “Enforcement of Laws and Privacy Preferences in Modern Computing Systems,” ACM Conference on Data and Application Security and Privacy. Baltimore, MD. April 24-27, 2022. https://doi.org/10.1145/3508398.3519315
2021
- T. Vahedi, B. Ampel, S. Samtani, and H. Chen, “Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach,” IEEE Intelligence and Security Informatics. San Antonio, TX. November 2-3, 2021. https://doi.org/10.1109/ISI53945.2021.9624765
- K. Otto, B. Ampel, S. Samtani, H. Zhu, and H. Chen, “Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach,” IEEE Intelligence and Security Informatics. San Antonio, TX. November 2-3, 2021. https://doi.org/10.1109/ISI53945.2021.9624846
- S. Samtani, S. Yang, and H. Chen, “ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics,” 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Virtual, August 2021. https://doi.org/10.1145/3447548.3469450
- E. Bertino, M. Kantarcioglu, C. Akcora, S. Samtani, S. Mittal, and M. Gupta “AI for Security and Security for AI” ACM Conference on Data and Application Security and Privacy. Baltimore, MD. April 26 – 28, 2021. https://doi.org/10.1145/3422337.3450357
2020
- B. Lazarine, S. Samtani, M. Patton, H. Zhu, S. Ullman, B. Ampel, and H. Chen, “Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” IEEE Intelligence and Security Informatics. Rosslyn, VA. November 9-10, 2020. https://doi.org/10.1109/ISI49825.2020.9280544
- S. Ullman, S. Samtani, B. Lazarine, H. Zhu, B. Ampel, M. Patton, and H. Chen, “Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” IEEE Intelligence and Security Informatics. Rosslyn, VA. November 9-10, 2020. https://doi.org/10.1109/ISI49825.2020.9280545
- B. Ampel, S. Samtani, H. Zhu, S. Ullman, and H. Chen, “Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach” IEEE Intelligence and Security Informatics. Rosslyn, VA. November 9-10, 2020. (Best Paper Award). https://doi.org/10.1109/ISI49825.2020.9280548
- F. Lin, Y. Liu, M. Ebrahimi, Z. Ahmad-Post, J. Hu, J. Xin, S. Samtani, W. Li, and H. Chen, “Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach” IEEE International Conference on Data Mining (ICDM), Deep Learning for Cyber Threat Intelligence (DL-CTI) Workshop. Sorrento, Italy. November 17 – 20, 2020. https://doi.org/10.1109/ICDMW51313.2020.00072
- M. Ebrahimi, S. Samtani, Y. Chai, and H. Chen, “Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach” 41st IEEE Symposium on S&P, 3rd Deep Learning for Security Workshop. San Francisco, CA. May 21, 2020. https://doi.org/10.1109/SPW50608.2020.00021
2019
- P. Du, M. Ebrahimi, N. Zhang, H. Chen, R. Brown, and S. Samtani, “Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach” ISI 2019, Proceedings of 2019 IEEE Conference on Intelligence and Security Informatics. Shenzhen, CHN. July 1 – 3, 2019. https://doi.org/10.1109/ISI.2019.8823196
- N. Arnold, M. Ebrahimi, N. Zhang, B. Lazarine, S. Samtani, M. Patton, and H. Chen, “Dark-Net Ecosystem Cyber Threat Intelligence Tool,” ISI 2019, Proceedings of 2019 IEEE Conference on Intelligence and Security Informatics. Shenzhen, CHN. July 1 – 3, 2019. https://doi.org/10.1109/ISI.2019.8823501
- A. Onuchowska, D. Berndt, and S. Samtani, “Rocket Ship or Blimp? – Implication of Malicious Accounts Removal on Twitter,” European Conference on Information Systems. Stockholm and Uppsala, Sweden. June 8 – 14, 2019.
2018
- R. Williams, S. Samtani, M. Patton, and H. Chen, “Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018. https://doi.org/10.1109/ISI.2018.8587336
- P. Du, N. Zhang, M. Ebrahimi, S. Samtani, B. Lazarine, N. Arnold, R. Dunn, S. Suntwal, G. Angeles, R. Schweitzer, and H. Chen, “Identifying, Collecting and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018. https://doi.org/10.1109/ISI.2018.8587327
- M. Ebrahimi, M. Surdeanu, S. Samtani, and H. Chen, “Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018. (Runner-Up for Best Paper Award). https://doi.org/10.1109/ISI.2018.8587404
- C. Harrell, S. Samtani, M. Patton, and H. Chen, “Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018. https://doi.org/10.1109/ISI.2018.8587380
- E. McMahon, M. Patton, S. Samtani, and H. Chen, “Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System Resiliency,” ISI 2018, Proceedings of 2018 IEEE Conference on Intelligence and Security Informatics. Miami, FL. November 8 – 10, 2018. https://doi.org/10.1109/ISI.2018.8587353
2017
- M. El, E. McMahon, S.Samtani, M. Patton, and H. Chen, “Benchmarking Vulnerability Scanners: An Experiment on SCADA Devices and Scientific Instruments,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017. (Runner-Up for Best Paper Award). https://doi.org/10.1109/ISI.2017.8004879
- E. McMahon, R. Williams, M. El, S. Samtani, M. Patton, and H. Chen, “Assessing Medical Device Vulnerabilities on the Internet of Things,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017. https://doi.org/10.1109/ISI.2017.8004903
- J. Grisham, S. Samtani, M. Patton, and H. Chen, “Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017. https://doi.org/10.1109/ISI.2017.8004867
- R. Williams, E. McMahon, S. Samtani, M. Patton, and H. Chen, “Identifying Vulnerabilities of Consumer Internet of Things Devices: A Scalable Approach,” ISI 2017, Proceedings of 2017 IEEE Conference on Intelligence and Security Informatics. Beijing, China. July, 2017. https://doi.org/10.1109/ISI.2017.8004904
2016
- S. Samtani, K. Chinn, C. Larson, and H. Chen, “AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis,” ISI 2016, Proceedings of 2016 IEEE Conference on Intelligence and Security Informatics. Tucson, Arizona. September, 2016. https://doi.org/10.1109/ISI.2016.7745437
- S. Samtani, S. Yu, H. Zhu, M. Patton, and H. Chen, “Identifying SCADA Vulnerabilities using Passive and Active Vulnerability Assessment Techniques,” ISI 2016, Proceedings of 2016 IEEE Conference on Intelligence and Security Informatics. Tucson, Arizona. September, 2016. https://doi.org/10.1109/ISI.2016.7745438
- S. Samtani and H. Chen, “Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums,” ISI 2016, Proceedings of 2016 IEEE Conference on Intelligence and Security Informatics. Tucson, Arizona. September, 2016. https://doi.org/10.1109/ISI.2016.7745500
2015
- S. Samtani, R. Chinn, and H. Chen, “Exploring Hacker Assets in Underground Forums,” ISI 2015, Proceedings of 2015 IEEE Conference on Intelligence and Security Informatics. Baltimore, Maryland. May, 2015. https://doi.org/10.1109/ISI.2015.7165935
Workshop Papers
2023
- Y. Gao, S. Samtani, H. Zhu, B. Ampel, and Y. Chai, “Generating Adversarial Phishing Websites to Evade Machine Learning-based Anti-Phishing Detectors: A Reinforcement Learning Approach” INFORMS Workshop on Data Science (WDS). Phoenix, Arizona. October 14, 2023.
- N. Luo, A. Zheng, S. Samtani, and E. Zheng, “SmartRD: Leveraging GPT Prompting Strategies for Reasoning and Decision – The Case of Smart Contract Vulnerability Assessment” INFORMS Workshop on Data Science (WDS). Phoenix, Arizona. October 14, 2023.
2022
- A. Yuan, H. Zhu, E. Garcia, and S. Samtani, “Detecting the Human Behaviors Associated with Depression via Sensor Signal Analysis: An Agreement-based Self-Attention Deep Learning Approach” INFORMS Workshop on Data Science (WDS). Indianapolis, Indiana. October 15, 2022. (Nominated for Best Student Paper Award).
- A. Sachdeva, B. Lazarine, S. Samtani, and H. Zhu, “User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach” INFORMS Workshop on Data Science (WDS). Indianapolis, Indiana. October 15, 2022.
- B. Lazarine, A. Sachdeva, S. Samtani, and H. Zhu, “Identifying Linked Repositories on GitHub: A Self-Supervised Graph Embedding Approach” INFORMS Workshop on Data Science (WDS). Indianapolis, Indiana. October 15, 2022.
2021
- S. Samtani, “An AI Perspective for Dark Web Analytics” RENCI Workshop on AI for Networking. Virtual Event. October 21, 2021.
- Z. Ahmad-Post, S. Samtani, H. Zhu, and S. Brown, “Political News Propagation Headline Matching: A Deep Learning-Based Short Text Matching Approach” ACM KDD Workshop on AI-enabled Cybersecurity Analytics. Virtual Event. August 14 – 18, 2021.
- B. Ampel, S. Samtani, S. Ullman, and H. Chen, “Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach” ACM KDD Workshop on AI-enabled Cybersecurity Analytics. Virtual Event. August 14 – 18, 2021.
2018
- R. Shenandoah, S. Samtani, M. Patton, and H. Chen, “Fostering Cybersecurity Big Data Research: A Case Study of the AZSecure Data System,” Hawaii International Conference on System Sciences Cybersecurity Big Data Symposium. Hawaii. January 2018.
Book Chapters
2020
- S. Samtani, M. Abate, V. Benjamin, and W. Li “Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective” Palgrave Handbook of International Cybercrime and Cyberdeviance, Springer, 2020.
2016
- Benjamin, S. Samtani, and H. Chen, “Conducting Large-Scale Analyses of Underground Hacker Communities” Cybercrime Through an Interdisciplinary Lens, Routledge, 2016.