Abstract is missing.
- SDP Based Zero-Trust ArchitecturesSuku Nair. 1 [doi]
- Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial AuthenticationSander Joos, Tim Van hamme, Davy Preuveneers, Wouter Joosen. 2-12 [doi]
- Enhancing Boundary Attack in Adversarial Image Using Square Random ConstraintTran Van Sang, Tran Phuong Thao, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001. 13-23 [doi]
- Data Poisoning in Sequential and Parallel Federated LearningFlorian Nuding, Rudolf Mayer. 24-34 [doi]
- PriveTAB: Secure and Privacy-Preserving sharing of Tabular DataAnantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi. 35-45 [doi]
- The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video CallsHassan Wasswa, Abdul Serwadda. 46-54 [doi]
- How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic ProgrammingLouise Halvorsen, Siv L. Steffensen, Willard Rafnsson, Oksana Kulyk, Raúl Pardo. 55-65 [doi]
- Shadows Behind the Keyboard: Dark Personalities and Deception in CyberattacksDaniel N. Jones. 66-67 [doi]
- Chronos vs. Chaos: Timing Weak Memory Executions in the Linux KernelSam Dawson, Mark Batty. 68-77 [doi]
- No Features Needed: Using BPE Sequence Embeddings for Web Log Anomaly DetectionNitesh Suresh Sehwani. 78-85 [doi]
- An Empirical Evaluation of Adversarial Examples Defences, Combinations and Robustness ScoresAleksandar Jankovic, Rudolf Mayer. 86-92 [doi]
- On the Effectiveness of Dataset WatermarkingBuse Gul Atli Tekgul, N. Asokan. 93-99 [doi]
- A Dataset of Networks of Computing HostsOmid Madani, Sai Ankith Averineni, Shashidhar Gandham. 100-104 [doi]