Abstract is missing.
- DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial NetworksLiyue Fan, Akarsh Pokkunuru. 3-21 [doi]
- Comparing Local and Central Differential Privacy Using Membership Inference AttacksDaniel Bernau, Jonas Robl, Philip-William Grassal, Steffen Schneider, Florian Kerschbaum. 22-42 [doi]
- Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization MechanismFumiyuki Kato, Yang Cao 0011, Masatoshi Yoshikawa. 43-60 [doi]
- Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed)Jiafan Wang 0001, Sherman S. M. Chow. 63-83 [doi]
- Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption SchemeAlexandros Bakas, Antonis Michalas. 84-95 [doi]
- Distributed Query Evaluation over Encrypted DataSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati. 96-114 [doi]
- Multi-party Private Set Operations with an External DeciderSara Ramezanian, Tommi Meskanen, Valtteri Niemi. 117-135 [doi]
- Encrypted-Input Obfuscation of Image ClassifiersGiovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, David Bruce Cousins, Yuriy Polyakov. 136-156 [doi]
- Preserving Privacy of Co-occurring Keywords over Encrypted DataD. V. N. Siva Kumar, P. Santhi Thilagam. 157-168 [doi]
- Access Control Policy Generation from User Stories Using Machine LearningJohn Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu 0001, Ravi S. Sandhu. 171-188 [doi]
- Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration SupportWojciech Ozga, Do Le Quoc, Christof Fetzer. 189-208 [doi]
- PDF Malware Detection Using Visualization and Machine LearningChing-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang, Hung-Min Sun. 209-220 [doi]
- Deep Learning for Detecting Network Attacks: An End-to-End ApproachQingtian Zou, Anoop Singhal, Xiaoyan Sun 0003, Peng Liu. 221-234 [doi]
- Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized DatasetsMina Alishahi, Nicola Zannone. 237-258 [doi]
- A Rewarding Framework for Crowdsourcing to Increase Privacy AwarenessIoannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsampanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou, Ruben Verborgh. 259-277 [doi]
- DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of ThingsNa Shi, Bo Tang, Ravi S. Sandhu, Qi Li. 278-290 [doi]
- A Digital Twin-Based Cyber Range for SOC AnalystsManfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, Günther Pernul. 293-311 [doi]
- The ${tkl}\hbox {-}\mathrm {Score}$ for Data-Sharing MisuseabilityKalvin Eng, Eleni Stroulia. 312-324 [doi]
- Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 DeploymentsSalimeh Dashti, Amir Sharif, Roberto Carbone, Silvio Ranise. 325-337 [doi]
- Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social NetworksSanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch. 338-354 [doi]
- Verifiable Hierarchical Key Assignment SchemesAnna Lisa Ferrara, Federica Paci, Chiara Ricciardi. 357-376 [doi]
- An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social NetworksAdi Swissa, Ehud Gudes. 377-392 [doi]
- On Feasibility of Attribute-Aware Relationship-Based Access Control Policy MiningShuvra Chakraborty, Ravi S. Sandhu. 393-405 [doi]