Abstract is missing.
- Assessing Differentially Private Variational Autoencoders Under Membership InferenceDaniel Bernau, Jonas Robl, Florian Kerschbaum. 3-14 [doi]
- Utility and Privacy Assessment of Synthetic Microbiome DataMarkus Hittmeir, Rudolf Mayer, Andreas Ekelhart. 15-27 [doi]
- Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural NetworksAndrea Milakovic, Rudolf Mayer. 28-47 [doi]
- MCoM: A Semi-Supervised Method for Imbalanced Tabular Security DataXiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham. 48-67 [doi]
- Mitigating Privacy Vulnerability Caused by Map AsymmetryRyota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao 0011, Sumio Fujita, Hidehito Gomi. 68-86 [doi]
- Liberate Your Servers: A Decentralized Content Compliance Validation ProtocolBowen Liu, Jianying Zhou 0001. 89-109 [doi]
- Knowledge Mining in Cybersecurity: From Attack to DefenseKhandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham. 110-122 [doi]
- Attack-Resilient Blockchain-Based Decentralized Timed Data ReleaseJingzhe Wang, Balaji Palanisamy. 123-140 [doi]
- Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion DetectionMatt Gorbett, Hossein Shirazi, Indrakshi Ray. 143-161 [doi]
- On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion AppsShradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray. 162-182 [doi]
- Verification and Validation Methods for a Trust-by-Design Framework for the IoTDavide Ferraris, M. Carmen Fernández Gago, Javier López 0001. 183-194 [doi]
- Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced DecryptionAnis Bkakria. 197-214 [doi]
- Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting WildcardsJeroen Weener, Florian Hahn 0004, Andreas Peter. 215-235 [doi]
- End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control PoliciesStefano Berlato, Umberto Morelli, Roberto Carbone, Silvio Ranise. 236-255 [doi]
- Integrating and Evaluating Quantum-safe TLS in Database ApplicationsAnselme Tueno, David Boehm, Shin Ho Choe. 259-278 [doi]
- Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with ErrorsAlexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabaninejad. 279-299 [doi]
- ReLOG: A Unified Framework for Relationship-Based Access Control over Graph DatabasesStanley Clark, Nikolay Yakovets, George Fletcher 0001, Nicola Zannone. 303-315 [doi]
- Security Operations Center Roles and Skills: A Comparison of Theory and PracticeAndreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul. 316-327 [doi]