Abstract is missing.
- Risk Oriented Resource Allocation in Robotic SwarmYakov Mallah, Yuval Elovici, Asaf Shabtai. 1-7 [doi]
- Privacy-Preserving Publication of GWAS Statistics using Smooth SensitivityAkito Yamamoto, Tetsuo Shibuya. 1-12 [doi]
- Security and Privacy Perceptions of Mental Health ChatbotsPaulina Chametka, Sana Maqsood, Sonia Chiasson. 1-7 [doi]
- Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment ScanningShafayat H. Majumder, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab Hossain. 1-10 [doi]
- AMF: Efficient Browser Interprocess Communication FuzzingGaoning Pan, Tianxiang Luo, Yiming Tao, Xiao Lei, Shuangxi Chen, Hui Liu, Chunming Wu 0001. 1-6 [doi]
- RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage CorrelationAyush Kumar, Vrizlynn L. L. Thing. 1-12 [doi]
- Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk AssessmentLeila Rashidi, Windhya Hansinie Rankothge, Hesamodin Mohammadian, Rashid Hussain Khokhar, Brian Frei, Shawn Ellis, Lago Freitas, Ali Akbar Ghorbani. 1-10 [doi]
- UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factorRashid Hussain Khokhar, Sajjad Dadkhah, Tianhao Zhao, Xichen Zhang, Ali A. Ghorbani 0001. 1-11 [doi]
- Course-Correct to DeFi Lacking Default DeficiencyDavid W. Kravitz, Mollie Z. Halverson. 1-12 [doi]
- An Instance-based Transfer Learning Approach, Applied to Intrusion DetectionSonia Kawish, Habib Louafi, Yiyu Yao. 1-7 [doi]
- Write Blocker for Internet of Things Flash TechnologiesMatthew Roffel, Xiaodong Lin. 1-10 [doi]
- Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic EncryptionTanveer Khan, Khoa Nguyen 0005, Antonis Michalas, Alexandros Bakas. 1-7 [doi]
- A Trust-Based Approach for Data Sharing in the MQTT EnvironmentLiang Chen, Stilianos Vidalis, Su Yang. 1-5 [doi]
- PET-Exchange: A Privacy Enhanced Trading Exchange using Homomorphic EncryptionDavid Hasselquist, Jacob Wahlman, Niklas Carlsson. 1-12 [doi]
- Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture ModelsSimon Bertrand, Josée Desharnais, Nadia Tawbi. 1-10 [doi]
- Saudi Arabian Perspective of Security, Privacy, and Attitude of Using Facial Recognition TechnologyAmani Mohammed Alqarni, Daniel Timko, Muhammad Lutfor Rahman. 1-12 [doi]
- Securing Multi-Environment Networks using Versatile Synthetic Data Augmentation Technique and Machine Learning AlgorithmsFurqan Rustam, Anca Delia Jurcut, Wajdi Aljedaani, Imran Ashraf. 1-10 [doi]
- Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted AdvertisingBrennan Mosher, Xiangman Li, Yuanyuan He 0002, Jianbing Ni. 1-9 [doi]
- Transparency in App Analytics: Analyzing the Collection of User Interaction DataFeiyang Tang, Bjarte M. Østvold. 1-10 [doi]
- Efficient Homomorphic Convolution for Secure Deep Learning InferenceXiaoyuan Liu, Hongwei Li 0001, Qinyuan Qian, Hao Ren 0001. 1-6 [doi]
- Geodemographic Profiling of Malicious IP addressesNuray Baltaci Akhuseyinoglu, Usman Anjum. 1-11 [doi]
- Combining homomorphic encryption and differential privacy in federated learningArnaud Grivet Sébert, Marina Checri, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler. 1-7 [doi]
- Improving Malicious PDF Detection with a Robust Stacking Ensemble ApproachAhmed Haj Abdel Khaleq, Miguel A. Garzón. 1-5 [doi]
- A Rule-Language Tailored for Financial Inclusion and KYC/AML ComplianceAlessandro Aldini, Suzana Mesquita de Borba Maranhão Moreno, Jean-Marc Seigneur. 1-10 [doi]
- EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard BuzzerMordechai Guri. 1-11 [doi]
- Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive ApproachKwasi Boakye-Boateng, Ali A. Ghorbani 0001, Arash Habibi Lashkari. 1-12 [doi]
- User modelling for privacy-aware self-disclosureRim Ben Salem, Esma Aïmeur, Hicham Hage. 1-8 [doi]
- VPASS: Voice Privacy Assistant System for Monitoring In-home Voice CommandsBang Tran, Sai Harshavardhan Reddy Kona, Xiaohui Liang, Gabriel Ghinita, Caroline Summerour, John A. Batsis. 1-10 [doi]
- Private set intersection using RSA subgroups with constant-size encryptionsSigurd Eskeland. 1-7 [doi]
- m-Anonymity for Randomization Applied to Binary DataMasaya Kobayashi, Atsushi Fujioka, Koji Chida. 1-7 [doi]
- DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging InfrastructureYoonjib Kim, Saqib Hakak, Ali A. Ghorbani 0001. 1-9 [doi]
- Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action PlatformsPiero Romare, Victor Morel, Farzaneh Karegar, Simone Fischer-Hübner. 1-12 [doi]
- Analysis and Comparison of Deepfakes Detection Methods for Cross-Library GeneralisationChangjin Wang, Hamid R. Sharifzadeh, Soheil Varastehpour, Iman Ardekani. 1-7 [doi]
- ThreatLand: Extracting Intelligence from Audit Logs via NLP methodsVinay Sachidananda, Rajendra Patil, Hongyi Peng, Liu Yang, Kwok-Yan Lam. 1-6 [doi]
- Selective EEG Signal Anonymization using Multi-Objective AutoencodersGirijesh Singh, Palak Patel, Muhammad Asaduzzaman, Garima Bajwa. 1-7 [doi]
- Building Trust in Deep Learning Models via a Self- Interpretable Visual ArchitectureWeimin Zhao, Qusay H. Mahmoud, Sanaa A. Alwidian. 1-10 [doi]
- Re-visited Privacy-Preserving Machine LearningAtsuko Miyaji, Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita, Tomoaki Mimoto. 1-10 [doi]
- Exploration of Various Machine Learning Techniques for Identifying and Mitigating DDoS AttacksOlufunsho I. Falowo, Izunna Okpala, Emmanuel Kojo, Sylvia Worlali Azumah, Chengcheng Li. 1-7 [doi]
- MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI CardinalityYihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou 0018, Liming Fang 0001, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou. 1-7 [doi]
- MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud StoragePanyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou 0018, Liming Fang 0001, Zhe Liu 0001, Chunpeng Ge, Chunhua Su. 1-11 [doi]
- A Secure Distributed Learning Framework Using Homomorphic EncryptionStephen Ly, Yuan Cheng 0002, Haiquan Chen, Ted Krovetz. 1-9 [doi]
- An Efficient Local Differential Privacy Scheme Using Bayesian Ridge RegressionAndres Hernandez-Matamoros, Hiroaki Kikuchi. 1-7 [doi]
- GhostBuy : An All-Steps Anonymous Purchase Platform (ASAPP) based on Separation of DataFabian Willems, Carlisle Adams. 1-12 [doi]
- Attention in Differential Cryptanalysis on Lightweight Block Cipher SPECKHaoran Deng, Xianghui Cao, Yu Cheng 0003. 1-9 [doi]
- A TCP-based Covert Channel with Integrity Check and RetransmissionStefano Bistarelli, Andrea Imparato, Francesco Santini 0001. 1-7 [doi]
- Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter DefibrillatorsAnisha Mitra, Dipanwita Roy Chowdhury. 1-7 [doi]
- Efficient Three-party Boolean-to-Arithmetic Share ConversionNan Cheng, Feng Zhang, Aikaterini Mitrokotsa. 1-6 [doi]
- Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine LearningSascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, Toru Nakamura. 1-7 [doi]
- Protection against Ransomware in Industrial Control Systems through Decentralization using BlockchainAlireza Parvizimosaed, Hamid Azad, Daniel Amyot, John Mylopoulos. 1-5 [doi]
- Private UAV-Assisted IoT Data Collection: An Energy-Privacy Trade-offBenjamin Fenelon, Saeede Enayati, Hossein Pishro-Nik. 1-5 [doi]
- Privacy-Preserving Reputation System Against Dishonest QueriesKittiphop Phalakarn, Toru Nakamura, Takamasa Isohara. 1-9 [doi]
- An Efficient Federated Learning Framework for Privacy-Preserving Data Aggregation in IoTRongquan Shi, Lifei Wei, Lei Zhang. 1-7 [doi]
- A Comparison of Machine Learning Algorithms for Multilingual Phishing DetectionDakota Staples, Saqib Hakak, Paul Cook. 1-6 [doi]
- Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code RepresentationGuoqiang Chen, Han Gao, Jie Zhang, Yanru He, Shaoyin Cheng, Weiming Zhang 0001. 1-11 [doi]
- Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-ExpertsVanessa Bracamonte, Sebastian Pape 0001, Sascha Löbner, Frédéric Tronnier. 1-7 [doi]