Abstract is missing.
- A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G SystemXiaodong Qu, Qinglei Kong, Feng Yin, Leixi Xu. 1-7 [doi]
- Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future TrajectoriesXichen Zhang, Songnian Zhang, Suprio Ray, Ali A. Ghorbani 0001. 1-8 [doi]
- Designing In-Air Hand Gesture-based User Authentication System via Convex HullYiming Sun, Weizhi Meng, Wenjuan Li 0001. 1-5 [doi]
- Careful What You Wish For: on the Extraction of Adversarially Trained ModelsKacem Khaled, Gabriela Nicolescu, Felipe Göhring de Magalhães. 1-10 [doi]
- A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated videoHiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros. 1-10 [doi]
- Security Analysis in Satellite Communication based on Geostationary OrbitJacob Krabbe Pedersen, Mikkel Bøchman, Weizhi Meng 0001. 1-10 [doi]
- Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated LearningEuclides Carlos Pinto Neto, Sajjad Dadkhah, Ali A. Ghorbani 0001. 1-10 [doi]
- Content Analysis of Privacy Policies Before and After GDPRNastaran Bateni, Jasmin Kaur, Rozita Dara 0001, Fei Song. 1-9 [doi]
- An Efficient and Privacy-Preserving Range Query over Encrypted Cloud DataWentao Wang, Yuxuan Jin, Bin Cao. 1-10 [doi]
- Faceless: A Cross-Platform Private Payment scheme for Human-Readable IdentifiersHuang Lin. 1-10 [doi]
- SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA CablesMordechai Guri. 1-10 [doi]
- Usability of Paper Audit Trails in Electronic Voting MachinesSaul Hughes, Sana Maqsood. 1-10 [doi]
- Privacy-Preserving Detection of Poisoning Attacks in Federated LearningTrent Muhr, Wensheng Zhang 0001. 1-10 [doi]
- Garage Door Openers: A Rolling Code Protocol Case StudyAhmed Ghanem, Riham AlTawy. 1-6 [doi]
- Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge GraphsWeifeng Xu, Dianxiang Xu. 1-10 [doi]
- A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network TracesShaveta Dandyan, Habib Louafi, Samira Sadaoui. 1-11 [doi]
- Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation SusceptibilityCagri Arisoy, Anuradha Mandal, Nitesh Saxena. 1-12 [doi]
- Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC ApplicationKun Peng. 1-8 [doi]
- Privacy Policy Analysis with Sentence ClassificationAndrick Adhikari, Sanchari Das, Rinku Dewri. 1-10 [doi]
- LOG-OFF: A Novel Behavior Based Authentication Compromise Detection ApproachMingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy. 1-10 [doi]
- Mobile Mental Health Apps: Alternative Intervention or Intrusion?Shalini Saini, Dhiral Panjwani, Nitesh Saxena. 1-11 [doi]
- Solving the Kidney Exchange Problem Using Privacy-Preserving Integer ProgrammingMalte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel. 1-10 [doi]
- Balancing privacy and accountability in digital payment methods using zk-SNARKsTariq Bontekoe, Maarten H. Everts, Andreas Peter. 1-10 [doi]
- An Analytical Study of Selfish Mining Attacks on Chainweb BlockchainSuyang Wang, Bo Yin 0001, Shuai Zhang 0013, Yu Cheng 0003. 1-10 [doi]
- Achieving Efficient and Secure Query in Blockchain-based Traceability SystemsChengzhe Lai, Yinzhen Wang. 1-5 [doi]
- Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure TreeXueqin Gao, Tao Shang, Da Li, Jianwei Liu 0001. 1-5 [doi]
- User Behavior Simulation in ICS Cyber RangesChuhan Liu, Wei Yan, Fengkai Xu, Wenlong Yang, Beibei Li. 1-5 [doi]
- Towards the Development of a Realistic Multidimensional IoT Profiling DatasetSajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani 0001. 1-11 [doi]
- An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward PrivacyKhosro Salmani. 1-10 [doi]
- A Semantic-based Approach to Reduce the Reading Time of Privacy PoliciesJasmin Kaur, Rozita Dara 0001, Ritu Chaturvedi. 1-10 [doi]
- Discovering Non-Metadata Contaminant Features in Intrusion Detection DatasetsLaurens D'hooge, Miel Verkerken, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-11 [doi]