Abstract is missing.
- Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation FrameworkRandolph Loh, Vrizlynn L. L. Thing. 1-5 [doi]
- Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity ProblemsEhsan Nazari, Paula Branco, Guy-Vincent Jourdan. 1-10 [doi]
- An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention MechanismXubin Jiao, Jinguo Li. 1-6 [doi]
- Towards Privacy-Preserving Classification-as-a-Service for DGA DetectionArthur Drichel, Mehdi Akbari Gurabi, Tim Amelung, Ulrike Meyer. 1-10 [doi]
- Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in PracticeMalte Breuer, Ulrike Meyer, Susanne Wetzel. 1-7 [doi]
- Unmasking Privacy Leakage through Android Apps Obscured with Hidden PermissionsPranav Kotak, Shweta Bhandari, Akka Zemmari, Jaykrishna Joshi. 1-5 [doi]
- A Practical Oblivious Cloud Storage System based on TEE and Client GatewayWensheng Zhang. 1-6 [doi]
- Intrusion Detection in Internet of Things using Convolutional Neural NetworksMartin Kodys, Zhi Lu, Fok Kar Wai, Vrizlynn L. L. Thing. 1-10 [doi]
- Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning AttackYiran Li, Guiqiang Hu, Xiaoyuan Liu, Zuobin Ying. 1-5 [doi]
- Light-Weight Active Security for Detecting DDoS Attacks in Containerised ICPSFarzana Zahid, Matthew M. Y. Kuo, Roopak Sinha. 1-5 [doi]
- Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control SystemsAmir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha. 1-6 [doi]
- A Hybrid Secure Computation Framework for Graph Neural NetworksYixuan Ren, Yixin Jie, Qingtao Wang, Bingbing Zhang, Chi Zhang, Lingbo Wei. 1-6 [doi]
- Clustering based opcode graph generation for malware variant detectionFok Kar Wai, Vrizlynn L. L. Thing. 1-11 [doi]
- A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPIJukka Ruohonen, Kalle Hjerppe, Kalle Rindell. 1-10 [doi]
- FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social MediaNoreddine Belhadj Cheikh, Abdessamad Imine, Michaël Rusinowitch. 1-10 [doi]
- Fool Me Once: A Study of Password Selection Evolution over the Past DecadeRahul Dubey, Miguel Vargas Martin. 1-7 [doi]
- Designing Personalized OS Update Message based on Security Behavior Stage ModelAyane Sano, Yukiko Sawaya, Akira Yamada 0001, Ayumu Kubota, Takamasa Isohara. 1-9 [doi]
- Deletion-Compliance in the Absence of PrivacyJonathan G. Goldin, Philippe Lamontagne. 1-10 [doi]
- Practical Protection of Binary Applications via Transparent ImmunizationXinyuan Wang. 1-7 [doi]
- GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro CommunicationMordechai Guri. 1-10 [doi]
- Epistemic Analysis of a Key-Management Vulnerability in LoRaWANMartha N. Kamkuemah. 1-7 [doi]
- The Race-Timing PrototypeAndrés Rainiero Hernández Coronado, Wonjun Lee, Wei-Ming Lin. 1-10 [doi]
- Measurement of Local Differential Privacy Techniques for IoT-based Streaming DataSharmin Afrose, Danfeng Daphne Yao, Olivera Kotevska. 1-10 [doi]
- FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security SensorKathrin Garb, Johannes Obermaier, Elischa Ferres, Martin Künig. 1-12 [doi]
- Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic ApproachShu Hong, Lingjie Duan, Jianwei Huang. 1-10 [doi]
- Dazed and Confused: What's Wrong with Crypto Libraries?Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari. 1-6 [doi]
- Detection of Induced False Negatives in Malware SamplesAdrian Wood, Michael N. Johnstone. 1-6 [doi]
- LibBlock - Towards Decentralized Library System based on Blockchain and IPFSWei-Yang Chiu, Weizhi Meng 0001, Wenjuan Li 0001. 1-9 [doi]
- Preparing for National Cyber Crises Using Non-linear Cyber ExercisesFlorian Skopik, Maria Leitner. 1-5 [doi]
- API-Based Ransomware Detection Using Machine Learning-Based Threat Detection ModelsMay Almousa, Sai Basavaraju, Mohd Anwar. 1-7 [doi]
- Towards Change Detection in Privacy Policies with Natural Language ProcessingAndrick Adhikari, Rinku Dewri. 1-10 [doi]
- Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated NetworksMiao He, Xiangman Li, Jianbing Ni, Haomiao Yang. 1-10 [doi]
- Detection of Demand Manipulation Attacks on a Power GridSrinidhi Madabhushi, Rinku Dewri. 1-7 [doi]
- EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic SequencesJiacheng Jin, Yandong Zheng, Pulei Xiong. 1-10 [doi]
- TEE-based Selective Testing of Local Workers in Federated Learning SystemsWensheng Zhang 0001, Trent Muhr. 1-6 [doi]
- Updatable Linear Map Commitments and Their Applications in Elementary DatabasesGuiwen Luo, Shihui Fu, Guang Gong. 1-6 [doi]
- PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler IdiomsSteffen Enders, Mariia Rybalka, Elmar Padilla. 1-7 [doi]
- A new approach for cross-silo federated learning and its privacy risksMichele Fontana, Francesca Naretto, Anna Monreale. 1-10 [doi]
- Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile CrowdsensingFuyuan Song, Zheng Qin, Jinwen Liang, Pulei Xiong, Xiaodong Lin 0001. 1-9 [doi]
- A Wearables-Driven Attack on Examination ProctoringTasnia Heya Ashrafi, Abdul Serwadda, Isaac Griswold-Steiner, Richard Matovu. 1-7 [doi]
- PUPy: A Generalized, Optimistic Context Detection Framework for Implicit AuthenticationMatthew Rafuse, Urs Hengartner. 1-10 [doi]
- Towards Query-efficient Black-box Adversarial Attack on Text Classification ModelsMohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani 0001. 1-7 [doi]
- Searching on Non-Systematic Erasure CodesAtthapan Daramas, Vimal Kumar. 1-8 [doi]
- Long Passphrases: Potentials and LimitsChristopher Bonk, Zach Parish, Julie Thorpe, Amirali Salehi-Abari. 1-7 [doi]
- SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep LearningSanaz Nakhodchi, Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha. 1-8 [doi]
- Impact Of Environmental Conditions On Fingerprint Systems PerformanceAbdarahmane Wone, Joël Di Manno, Christophe Charrier, Christophe Rosenberger. 1-5 [doi]
- DaRoute: Inferring trajectories from zero-permission smartphone sensorsChristian Roth, Ngoc-Thanh Dinh, Marc Roßberger, Dogan Kesdogan. 1-10 [doi]
- IoT Malware Detection Using Function-Call-Graph EmbeddingChia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi 0001. 1-9 [doi]
- Deterministic and Statistical Strategies to Protect ANNs against Fault Injection AttacksTroya Çagil Köylü, Cezar Rodolfo Wedig Reinbrecht, Said Hamdioui, Mottaqiallah Taouil. 1-10 [doi]
- EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing FrameworkRené Helmke, Eugen Winter, Michael Rademacher. 1-7 [doi]
- A Novel Trust Model In Detecting Final-Phase Attacks in SubstationsKwasi Boakye-Boateng, Ali A. Ghorbani 0001, Arash Habibi Lashkari. 1-11 [doi]
- SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective DeletionGanyu Wang, Miguel Vargas Martin. 1-12 [doi]
- Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem MembersKaja Schmidt, Alexander Mühle, Andreas Grüner, Christoph Meinel. 1-7 [doi]
- User Identification in Online Social Networks using Graph Transformer NetworksK. N. Pavan Kumar, Marina L. Gavrilova. 1-10 [doi]
- Evaluating the Current State of Application Programming Interfaces for Verifiable CredentialsNikesh Lalchandani, Frank Jiang 0002, Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss. 1-7 [doi]
- Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural NetworksLav Gupta. 1-8 [doi]
- Trust Quantification for Autonomous Medical Advisory SystemsMini Thomas, Reza Samavi, Thomas E. Doyle. 1-7 [doi]
- User Profiling on Universal Data Insights tool on IBM Cloud Pak for SecurityFarzaneh Shoeleh, Masoud Erfani, Saeed Shafiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani 0001. 1-10 [doi]
- Towards Privacy-Friendly Smart ProductsKimberly García, Zaira Zihlmann, Simon Mayer, Aurelia Tamò-Larrieux, Johannes Hooss. 1-7 [doi]
- Secure Allocation for Graph-Based Virtual Machines in Cloud EnvironmentsMansour Aldawood, Arshad Jhumka. 1-7 [doi]