Abstract is missing.
- An Efficient Edge-Based Privacy-Preserving Range Aggregation Scheme for Aging in Place SystemZhuliang Jia, Jinkun Gui, Rongxing Lu, Mohammad Mamun 0001. 1-21 [doi]
- An Empirical DNN Pruning Approach Against Membership Inference AttacksMatthew Chan, Aolin Ding, Amin Hass, Saman A. Zonouz. 22-32 [doi]
- A Conflict-Aware Active Automata Learning Approach for BLE Device Status Machine ConstructionJian Xu 0004, Long Yin, Heqiu Chai, Zhongsheng Wang, Chunyu Liu. 33-52 [doi]
- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location-Based ServicesXiaomin Yu, Xiaokun Yu. 53-75 [doi]
- An Efficient Lattice-Based Authentication Protocol for the Vehicular Ad Hoc NetworkXinyong Chen, Jiageng Chen, Jinquan Luo, Hongwei Liu. 76-89 [doi]
- A Privacy-Preserving Computer-Aided Diagnosis Framework for Medical Applications Using Federated Learning and Homomorphic EncryptionJichao Xiong, Jiageng Chen, Hui Liu, Guangyou Zhou, Jianqun Cui, Junyu Lin, Dian Jiao. 90-106 [doi]
- GCFuzz: An Intelligent Method for Generating IoT Protocols Test Cases Using GAN with CVAEMing Zhong 0009, Zisheng Zeng, Yijia Guo, Dandan Zhao, Bo Zhang 0063, Shenghong Li, Hao Peng 0002, Zhiguo Ding. 107-125 [doi]
- VRMDA: Verifiable and Robust Multi-subset Data Aggregation Scheme in IoTJianying Li, Shuo Zhou, Yining Liu. 126-138 [doi]
- Assessing the Effectiveness of LLMs in Android Application Vulnerability AnalysisVasileios Kouliaridis, Georgios Karopoulos, Georgios Kambourakis. 139-154 [doi]
- Singularization: A New Approach to Designing Block Ciphers for Resource-Constrained DevicesGilles Macario-Rat, Mihail-Iulian Plesa. 155-167 [doi]