Abstract is missing.
- Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet TransformAbdullah Ozkan, Banu Gunel Kilic, Cengiz Acarturk. 1-16 [doi]
- Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated AnswersAndrew Plapp, Jianzhang Wu, Lei Pan, Chao Chen, Caslon Chua, Jun Zhang. 17-27 [doi]
- PassFile: Graphical Password Authentication Based on File Browsing RecordsHo Chun Fu, Wenjuan Li, Yu Wang. 28-43 [doi]
- On the Role of Similarity in Detecting Masquerading FilesJonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula. 44-55 [doi]
- A Password-Based Mutual Authenticated Key Exchange Scheme by Blockchain for WBANPei Huang, Yaorui He, Ting Liang, Zhe Xia. 56-73 [doi]
- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road CollaborationPengna Liu, Ziyan Qiao, Yalun Wu, Kang Chen, Jiasong Hou, Yingqi Cai, Liqun Chu, Endong Tong, Wenjia Niu, Jiqiang Liu. 74-89 [doi]
- A Client-Side Watermarking with Private-Class in Federated LearningWeitong Chen, Wei Zhang, Jiale Zhang, Xiaobing Sun 0001, Xiang Cheng 0004, Chengcheng Zhu. 90-103 [doi]
- Research on Evasion and Detection of Malicious JavaScript CodeYujie Ma, Haokai Wu, Yu-an Tan, Yuanzhang Li. 104-130 [doi]
- Tackling Non-IID for Federated Learning with Components AlignmentBaolu Xue, Jiale Zhang, Bing Chen, Wenjuan Li. 131-144 [doi]
- Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means ClusteringMads Solberg Collingwood Pyke, Weizhi Meng 0001, Brooke Lampe. 145-162 [doi]
- Penetrating Machine Learning Servers via Exploiting BMC VulnerabilityYashi Liu, Kefan Qiu, Lu Liu, Quanxin Zhang. 163-172 [doi]