Abstract is missing.
- Encrypted Malicious Traffic Detection Based on Ensemble LearningFengrui Xiao, Feng Yang, Shuangwu Chen, Jian Yang 0014. 1-15 [doi]
- A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle NetworksZhe Xia, Yifeng Shu, Hua Shen, Mingwu Zhang. 16-35 [doi]
- Dissecting Membership Inference Risk in Machine LearningNavoda Senavirathne, Vicenç Torra. 36-54 [doi]
- Webshell Detection Based on Explicit Duration Recurrent NetworkBailin Xie, Qi Li. 55-65 [doi]
- A Practical Botnet Traffic Detection System Using GNNBonan Zhang, Jingjin Li, Chao Chen, Kyungmi Lee, Ickjai Lee. 66-78 [doi]
- Vulnerability and Transaction Behavior Based Detection of Malicious Smart ContractsRachit Agarwal 0004, Tanmay Thapliyal, Sandeep Kumar Shukla. 79-96 [doi]
- A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and PUFHui Zhang 0039, Weixin Bian, Biao Jie, Shuwan Sun. 97-106 [doi]
- Realizing Information Flow Control in ABAC MiningB. S. Radhika, R. K. Shyamasundar. 107-119 [doi]
- Weak Password Scanning System for Penetration TestingBailin Xie, Qi Li, Hao Qian. 120-130 [doi]
- Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious DiseasesPengfei Wang, Xiangyu Su, Maxim Jourenko, Zixian Jiang, Mario Larangeira, Keisuke Tanaka. 131-144 [doi]
- A Privacy-Preserving Logistics Information System with TraceabilityQuanru Chen, Jinguang Han, Jiguo Li 0001, Liquan Chen, Song Li. 145-163 [doi]
- Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium BlockchainXiaowen Cai, Wenjing Cheng, Minghui Zhang, Chen Qian, Zhengwei Ren, Shiwei Xu, Jianying Zhou. 164-181 [doi]
- Flexible and Survivable Single Sign-OnFederico Magnanini, Luca Ferretti, Michele Colajanni. 182-197 [doi]
- The Analysis and Implication of Data Deduplication in Digital ForensicsIzabela Savic, Xiaodong Lin. 198-215 [doi]