Abstract is missing.
- (Local) Differential Privacy has NO Disparate Impact on FairnessHéber Hwang Arcolezi, Karima Makhlouf, Catuscia Palamidessi. 3-21 [doi]
- Building Quadtrees for Spatial Data Under Local Differential PrivacyEce Alptekin, Mehmet Emre Gursoy. 22-39 [doi]
- Privacy-Preserving Genomic Statistical Analysis Under Local Differential PrivacyAkito Yamamoto, Tetsuo Shibuya. 40-48 [doi]
- New Results on Distributed Secret Sharing ProtocolsAlfredo De Santis, Barbara Masucci. 51-68 [doi]
- Probabilistic Fingerprinting Scheme for Correlated DataEmre Yilmaz, Erman Ayday. 69-90 [doi]
- Optimized Stream-Cipher-Based Transciphering by Means of Functional-BootstrappingAdda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey. 91-109 [doi]
- Control is Nothing Without Trust a First Look into Digital Identity Wallet TrendsZahra Ebadi Ansaroudi, Roberto Carbone, Giada Sciarretta, Silvio Ranise. 113-132 [doi]
- 2 PredictionMarlon P. da Silva, Henry C. Nunes, Charles V. Neu, Luana T. Thomas, Avelino F. Zorzo, Charles Morisset. 133-140 [doi]
- Digital Twins for IoT Security ManagementPhilip Empl, Henric Hager, Günther Pernul. 141-149 [doi]
- Data Distribution Impact on Preserving Privacy in Centralized and Decentralized LearningBakary Dolo, Faiza Loukil, Khouloud Boukadi. 153-164 [doi]
- On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private MechanismsHéber Hwang Arcolezi, Selene Cerna, Catuscia Palamidessi. 165-183 [doi]
- Differentially Private Streaming Data Release Under Temporal Correlations via Post-processingXuyang Cao, Yang Cao 0011, Primal Pappachan, Atsuyoshi Nakamura, Masatoshi Yoshikawa. 184-200 [doi]
- Assurance, Consent and Access Control for Privacy-Aware OIDC DeploymentsGianluca Sassetti, Amir Sharif, Giada Sciarretta, Roberto Carbone, Silvio Ranise. 203-222 [doi]
- Maintain High-Quality Access Control Policies: An Academic and Practice-Driven ApproachSascha Kern, Thomas Baumer, Ludwig Fuchs, Günther Pernul. 223-242 [doi]
- SMET: Semantic Mapping of CVE to ATT&CK and Its Application to CybersecurityBasel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, Kevin W. Hamlen. 243-260 [doi]
- Classification Auto-Encoder Based Detector Against Diverse Data Poisoning AttacksFereshteh Razmi, Li Xiong 0001. 263-281 [doi]
- CodeGraphSMOTE - Data Augmentation for Vulnerability DiscoveryTom Ganz, Erik Imgrund, Martin Härterich, Konrad Rieck. 282-301 [doi]
- An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep LearningDavid Rodriguez, Ram Krishnan. 302-316 [doi]
- Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile ApplicationsAishwarya Surani, Amani Bawaked, Matthew Wheeler, Braden Kelsey, Nikki Roberts, David Vincent, Sanchari Das. 319-338 [doi]
- Android Code Vulnerabilities Early Detection Using AI-Powered ACVED PluginJanaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski 0001, Luca Piras. 339-357 [doi]
- A Dynamic Approach to Defuse Logic Bombs in Android ApplicationsFausto Fasano, Michele Guerra, Roberto Milanese, Rocco Oliveto. 358-365 [doi]
- AMOE: A Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud AuditFranz Deimling, Michela Fazzolari. 369-385 [doi]
- VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS EvaluationSiqi Zhang, Mengyuan Zhang, Lianying Zhao. 386-403 [doi]
- An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and ProgressSangita Roy, Rudrapatna K. Shyamasundar. 404-412 [doi]