Abstract is missing.
- Cybersecurity in Industry 5.0: Open Challenges and Future DirectionsBruno Santos, Rogério Luís C. Costa, Leonel Santos. 1-6 [doi]
- Synthetic Trajectory Generation Through Convolutional Neural NetworksJesse Merhi, Erik Buchholz, Salil S. Kanhere. 1-12 [doi]
- Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in MicrogridsZhibo Zhang, Jiankun Hu, Hemanshu Roy Pota, Shabnam Kasra Kermanshahi, Benjamin P. Turnbull, Ernesto Damiani, Chan Yeob Yeun. 1-5 [doi]
- Post-Quantum Authentication and Integrity in 3-Layer IoT ArchitecturesJuliet Samandari, Clémentine Gritti. 1-11 [doi]
- PEL: Privacy Embedded Learning in Smart Healthcare SystemsMahmuda Akter, Nour Moustafa, Benjamin P. Turnbull. 1-10 [doi]
- A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) DetectionArthur Drichel, Ulrike Meyer. 1-10 [doi]
- Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and ComprehensionMst Mahamuda Sarkar Mithila, Fangyi Yu, Miguel Vargas Martin, Shengqian Wang. 1-13 [doi]
- DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion ModelsWilliam Aiken, Paula Branco, Guy-Vincent Jourdan. 1-11 [doi]
- MIKA: A Minimalist Approach to Hybrid Key ExchangeRaymond K. Zhao, Nazatul H. Sultan, Phillip Yialeloglou, Dongxi Liu, David Liebowitz, Josef Pieprzyk. 1-11 [doi]
- Efficient Integration of Exchange Chains in Privacy-Preserving Kidney ExchangeMalte Breuer, Ulrike Meyer, Susanne Wetzel. 1-10 [doi]
- Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark AnalysisJinglin Sun, Basem Suleiman, Imdad Ullah. 1-8 [doi]
- Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key PrimitivesHiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa. 1-9 [doi]
- Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial AttacksHesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani 0001. 1-9 [doi]
- Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility EvaluationMohamed AbdElSalam, Isaac Mpidi Bita, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier. 1-11 [doi]
- Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security CapabilitiesRoss Porter, Morteza Biglari-Abhari, Benjamin Tan 0001, Duleepa J. Thrimawithana. 1-9 [doi]
- Pk-Anonymization Meets Differential PrivacyMasaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai, Kan Yasuda. 1-11 [doi]
- An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum CryptographyDuc-Thuan Dam, Trong-Hung Nguyen, Thai-Ha Tran, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Cong-Kha Pham. 1-5 [doi]
- The Value of Strong Identity and Access Management for ICS/OT SecurityMohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Praveen Gauravaram, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood, Lei Pan 0002. 1-5 [doi]
- CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language ModelSaurabh Anand, Shubham Malaviya, Manish Shukla 0001, Sachin Lodha. 1-9 [doi]
- Outsourcing vs Insourcing Offensive Security OperationsJason Ford, Caleb House. 1-4 [doi]
- DEFD: Dual-Entity Fuzzy Deduplication for Untrusted EnvironmentsZehui Tang, Shengke Zeng, Song Han 0006, Qi Yu, Shihai Jiang, Peng Chen. 1-11 [doi]
- Malicious Unlearning in Ensemble ModelsHuanyi Ye, Ziyao Liu, Yu Jiang, Jiale Guo, Kwok-Yan Lam. 1-6 [doi]
- Privbench: A Benchmark Capturing Privilege Escalation Vulnerabilities in AndroidMohammed El Amin Tebib, Oum-El-Kheir Aktouf, Pascal André, Mariem Graa. 1-12 [doi]
- DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable CredentialsSandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler, Daniela Schneider. 1-11 [doi]
- Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel AttacksThai-Ha Tran, Duc-Thuan Dam, Binh Kieu-Do-Nguyen, Van-Phuc Hoang, Trong-Thuc Hoang, Cong-Kha Pham. 1-5 [doi]
- Efficient Data Security Using Predictions of File Availability on the WebKevin Saric, Gowri Sankar Ramachandran, Raja Jurdak, Surya Nepal. 1-12 [doi]
- Quantifying Privacy in Cooperative Awareness Services Through Trajectory ReconstructionAtthapan Daramas, Vimal Kumar 0001, Marinho P. Barcellos. 1-10 [doi]
- Proactive Audio Authentication Using Speaker Identity WatermarkingQi Li 0033, Xiaodong Lin 0001. 1-10 [doi]
- Privacy Preservation in Service Operations by Minimizing Sensitive Data ExposureRishabh Kumar, Rohit Gupta, Sutapa Mondal, Mangesh S. Gharote, Praveen Gauravaram, Sachin Lodha. 1-5 [doi]
- can-fp: An Attack-Aware Analysis of False Alarms in Automotive Intrusion Detection ModelsBrooke Kidmose, Weizhi Meng 0001. 1-12 [doi]
- Lack of Systematic Approach to Security of IoT Context Sharing PlatformsMohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha 0001. 1-4 [doi]
- Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data ProcessingAbdelfattah Amamra, Rym Khettab, Raissa Mezine. 1-10 [doi]
- Stake-Driven Rewards and Log-Based Free Rider Detection in Federated LearningHuong Nguyen, Tri Hong Nguyen, Lauri Lovén, Susanna Pirttikangas. 1-10 [doi]
- Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug BridgeAhmed Tanvir Mahdad, Nitesh Saxena. 1-12 [doi]
- "I was Diagnosed with ...": Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPTCostanza Alfieri, Suriya Ganesh Ayyamperumal, Limin Ge, Jingxin Shi, Norman Sadeh 0001. 1-12 [doi]
- AI Efficiency in Cybersecurity: Estimating Token Consumption for Optimal OperationsE. Romanous, J. Ginger. 1-5 [doi]
- Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body PosturesAnuradha Mandal, Nitesh Saxena. 1-12 [doi]
- Towards SAR Automatic Target Recognition: Multi-Category SAR Image Classification Based on Light Weight Vision TransformerGuibin Zhao, Pengfei Li, Zhibo Zhang, Fusen Guo, Xueting Huang, Wei Xu, Jinyin Wang, Jianlong Chen. 1-6 [doi]
- Towards a Portability Scheme for Decentralized Identifiers in Self-Sovereign IdentitiesJoão Pedro Alonso Almeida, Gowri Sankar Ramachandran, Paul Ashley, Raja Jurdak, Steven McCown, Jó Ueyama. 1-4 [doi]