Abstract is missing.
- Evaluating Rule-Based Global XAI Malware Detection MethodsRui Li, Olga Gadyatskaya. 3-22 [doi]
- Whitelisting for Characterizing and Monitoring Process Control CommunicationAndreas Paul 0003, Franka Schuster, Hartmut König. 23-45 [doi]
- Detection of Malware Using Self-Attention Mechanism and StringsSatoki Kanno, Mamoru Mimura. 46-60 [doi]
- KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation AttackHiroki Kuzuno, Toshihiro Yamauchi. 61-76 [doi]
- The Effectiveness of Transformer-Based Models for BEC Attack DetectionAmirah Almutairi, Boojoong Kang, Nawfal F. Fadhel. 77-90 [doi]
- Resilience of Blockchain Overlay NetworksAristodemos Paphitis, Nicolas Kourtellis, Michael Sirivianos. 93-113 [doi]
- Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-LearningXiangyu Su, Mario Larangeira, Keisuke Tanaka. 114-136 [doi]
- Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency SystemsMayank Raikwar, Shuang Wu, Kristian Gjøsteen. 137-152 [doi]
- Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing SchemeMaharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai. 155-176 [doi]
- New LDP Approach Using VAEAndres Hernandez-Matamoros, Hiroaki Kikuchi. 177-191 [doi]
- Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID DataSongwei Luo, Shaojing Fu, Yuchuan Luo, Lin Liu, Yanxiang Deng, Shixiong Wang. 195-216 [doi]
- RRML: Privacy Preserving Machine Learning Based on Random Response TechnologyJia Wang, Shiqing He, Qiuzhen Lin. 217-234 [doi]
- SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated LearningZhuotao Lian, Chen Zhang, Kaixi Nan, Chunhua Su. 235-248 [doi]
- Agnostic Label-Only Membership Inference AttackAnna Monreale, Francesca Naretto, Simone Rizzo. 249-264 [doi]
- ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall CurvesAli Burak Ünal, Nico Pfeifer, Mete Akgün. 265-280 [doi]
- Modular Polynomial Multiplication Using RSA/ECC CoprocessorAurélien Greuet, Simon Montoya, Clémence Vermeersch. 283-304 [doi]
- T3E: A Practical Solution to Trusted Time in Secure EnclavesGilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen. 305-326 [doi]
- Decentralized SGX-Based Cloud Key ManagementYunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou. 327-341 [doi]
- Spying on the Spy: Security Analysis of Hidden CamerasSamuel Herodotou, Feng Hao 0001. 345-362 [doi]
- Security Analysis of Mobile Point-of-Sale TerminalsMahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao. 363-384 [doi]
- On the Design of a Misinformation Widget (MsW) Against Cloaked ScienceDavid Arroyo, Sara Degli-Esposti, Alberto Gómez-Espés, Santiago Palmero Muñoz, Luis Pérez-Miguel. 385-396 [doi]