Abstract is missing.
- Adversarial Risk AnalysisDavid Banks. 1 [doi]
- Continuous Group Key Agreement with Flexible Authorization and Its ApplicationsKaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake. 3-13 [doi]
- Disclosure of Multiple "Patient Characteristics" Format Statistics leaks Quasi-identifier LinkageKenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi. 15-25 [doi]
- Mitigating Social Media Privacy Concerns - A Comprehensive StudyJeremy McHatton, Kambiz Ghazinour. 27-32 [doi]
- FENet: Privacy-preserving Neural Network Training with Functional EncryptionPrajwal Panzade, Daniel Takabi. 33-43 [doi]
- Privacy-preserving Deep-learning Models for Fingerprint Data using Differential PrivacyMaryam Mohammadi, Farida Sabry, Wadha Labda, Qutaibah M. Malluhi. 45-53 [doi]
- Deepfake Detection: A TutorialMd. Shohel Rana, Andrew H. Sung. 55-56 [doi]
- Detecting Online Grooming By Simple Contrastive Chat EmbeddingsParisa Rezaee Borj, Kiran B. Raja, Patrick Bours. 57-65 [doi]
- Adversarial Robustness of Phishing Email Detection ModelsParisa Mehdi Gholampour, Rakesh M. Verma. 67-76 [doi]
- Curbing Ghost Worker Fraud In Developing Countries Using Consortium BlockchainMusa Ibrahim Bello, Daniel R. Thomas. 77-83 [doi]
- Ontology-based Evaluation of ABAC Policies for Inter-Organizational Resource SharingTushar Gupta, Shamik Sural. 85-94 [doi]
- Improving Application Artifact Inference Using Matched Sector Adjacency WeightingOluwaseun Adegbehingbe, James H. Jones. 95-100 [doi]