Abstract is missing.
- AI vs. AI: Exploring the Intersections of AI and CybersecurityIan Molloy, Josyula R. Rao, Marc Ph. Stoecklin. 1 [doi]
- Large Feature Mining and Deep Learning in Multimedia ForensicsQingzhong Liu, Naciye Celebi. 3-4 [doi]
- WeStat: a Privacy-Preserving Mobile Data Usage Statistics SystemSébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello. 5-14 [doi]
- EMPAware: Analyzing Changes in User Perceptions of Mobile Privacy on iOS with Enhanced AwarenessBrian Krupp, Emily Timko, Kyle Cox, William Hicks, Malik Bursey, Christopher Banfield. 15-24 [doi]
- PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party SettingIsmat Jarin, Birhanu Eshete. 25-35 [doi]
- SDGchain: When Service Dependency Graph Meets Blockchain to Enhance PrivacyRofaida Khemaissia, Makhlouf Derdour, Ala Djeddai, Mohamed Amine Ferrag. 37-43 [doi]
- A Scalable Role Mining Approach for Large OrganizationsMasoumeh Abolfathi, Zohreh Raghebi, Jafar Haadi Jafarian, Farnoush Banaei Kashani. 45-54 [doi]
- TrollHunter2020: Real-time Detection of Trolling Narratives on Twitter During the 2020 U.S. ElectionsPeter Jachim, Filipo Sharevski, Emma Pieroni. 55-65 [doi]
- Detecting Telephone-based Social Engineering Attacks using Scam SignaturesAli Derakhshan, Ian G. Harris, Mitra Behzadi. 67-73 [doi]
- An Empirical Evaluation of Automated Machine Learning Techniques for Malware DetectionPartha Pratim Kundu, Lux Anatharaman, Tram Truong Huu. 75-81 [doi]