137 | -- | 150 | Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers |
151 | -- | 169 | Jingcheng Gao, Yang Xiao, Sneha Rao, Fnu Shalini. Security tests and attack experimentations of ProtoGENI |
170 | -- | 182 | Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath. Accurate geolocation using network coordinates |
183 | -- | 190 | Mohammed Amin Benamara, Huixian Li. Secure of personal health records shared in cloud computing using cipher-text attribute based encryption |
191 | -- | 206 | Mohamed Sarrab. Bytecode instrumentation mechanism for monitoring mobile application information flow |