Abstract is missing.
- Trustworthy and Private AI/MLJaideep Vaidya. 5
- Privacy Risks in Machine Learning: Truths and MythsJosep Domingo-Ferrer. 7
- PPVFL-SplitNN: Privacy-Preserving Vertical Federated Learning with Split Neural Networks for Distributed Patient DataBashair Alrashed, Priyadarsi Nanda, Hoang Dinh, Amani Aldahiri, Hadeel Alhosaini, Nojood Alghamdi. 13-24 [doi]
- Evaluating a Bimodal User Verification Robustness Against Synthetic Data AttacksSandeep Gupta 0002, Rajesh Kumar, Kiran B. Raja, Bruno Crispo, Carsten Maple. 25-36 [doi]
- FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church AlgorithmShokofeh VahidianSadegh, Alberto Ibarrondo, Lena Wiese. 37-48 [doi]
- Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public VerifiabilityTianxiang Dai, Yufan Jiang, Yong Li 0021, Jörn Müller-Quade, Andy Rupp. 49-60 [doi]
- A Resilient Randomization Technique Against ML-Driven Timing Side Channel Attack on Mobile LocationAbdeslam El-Yahyaoui, Mohammed Erradi. 61-71 [doi]
- Correlation Power Analysis on Ascon with Multi-Bit Selection FunctionViet Sang Nguyen, Vincent Grosso, Pierre-Louis Cayrel. 72-83 [doi]
- Lens Aberrations Detection and Digital Camera Identification with Convolutional AutoencodersJaroslaw Bernacki, Rafal Scherer. 84-95 [doi]
- RingAuth: User Authentication Using a Smart RingJack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic. 96-107 [doi]
- Post-Quantum Secure Channel Protocols for eSIMs: Design, Validation and Performance AnalysisLuk Bettale, Emmanuelle Dottax, Laurent Grémy. 108-119 [doi]
- Bolstering IIoT Resilience: The Synergy of Blockchain and CapBACArgiro Anagnostopoulou, Eleni Kehrioti, Ioannis Mavridis, Dimitris Gritzalis. 120-131 [doi]
- Privacy2Practice: Leveraging Automated Analysis for Privacy Policy Transparency and ComplianceSaja Alqurashi, Indrakshi Ray. 132-143 [doi]
- SCAM: Secure Shared Cache Partitioning Scheme to Enhance Throughput of CMPsVarun Venkitaraman, Rishab Ravi, Tejeshwar Bhagatsing Thorawade, Nirmal Kumar Boran, Virendra Singh. 144-155 [doi]
- Weak, Weak-Insider, and Randomized Weak Privacy in the HPVP Model for RFIDFerucio Laurentiu Tiplea. 156-167 [doi]
- An NLP-Based Framework Leveraging Email and Multimodal User DataNeda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens. 168-178 [doi]
- Beyond Rules: How Large Language Models Are Redefining Cryptographic Misuse DetectionZohaib Masood, Miguel Vargas Martin. 179-194 [doi]
- Did You Break the Glass Properly? A Policy Compliance Framework for Protected Health Information (PHI) Emergency AccessMd. Al-Amin, Rushabh Shah, Hemanth Tummala, Indrajit Ray. 195-208 [doi]
- Empirical Evaluation of Memory-Erasure ProtocolsReynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua. 209-220 [doi]
- Blockchain-Based Multi-Signature System for Critical ScenariosCristina Alcaraz, Davide Ferraris, Hector Guzman, Javier López 0001. 221-232 [doi]
- Control Flow Protection by Cryptographic Instruction ChainingShahzad Ahmad, Stefan Rass, Maksim Goman, Manfred Schlägl, Daniel Große. 233-246 [doi]
- PRIVÉ: Towards Privacy-Preserving Swarm AttestationNada El Kassem, Wouter Hellemans, Ioannis Siachos, Edlira Dushku, Stefanos Vasileiadis, Dimitrios S. Karas, Liqun Chen 0002, Constantinos Patsakis, Thanassis Giannetsos. 247-262 [doi]
- An Enhanced Two-Step CPA Side-Channel Analysis Attack on ML-KEMMark Kennaway, Anh Tuan Hoang, Ayesha Khalid, Ciara Rafferty, Máire O'Neill. 263-274 [doi]
- Can Contributing More Put You at a Higher Leakage Risk? The Relationship Between Shapley Value and Training Data Leakage Risks in Federated LearningSoumia Zohra El Mestari, Maciej Krzysztof Zuziak, Gabriele Lenzini, Salvatore Rinzivillo. 275-286 [doi]
- Synthetic and (Un)Secure: Evaluating Generalized Membership Inference Attacks on Image DataPasquale Coscia, Stefano Ferrari, Vincenzo Piuri, Ayse Salman. 287-297 [doi]
- Towards Quantum Machine Learning in Ransomware DetectionFrancesco Mercaldo, Giovanni Ciaramella, Fabio Martinelli, Antonella Santone. 301-308 [doi]
- A Hybrid-Based Transfer Learning Approach for IoT Device IdentificationStephanie M. Opoku, Habib Louafi, Malek Mouhoub. 309-320 [doi]
- Insider Threats and Countermeasures Based on AI Lie DetectionKonstantinos Kalodanis, Panagiotis Rizomiliotis, Charalampos Papapavlou, Apostolos Skrekas, Stavros Papadimas, Dimosthenis Anagnostopoulos. 321-328 [doi]
- On the Security of Opportunistic Re-KeyingStefan Lucks, David Schatz, Guenter Schaefer. 329-338 [doi]
- Secure and Practical Cold (and Hot) StakingMario Larangeira. 339-346 [doi]
- Privacy-Preserving Machine Learning in IoT: A Study of Data Obfuscation MethodsYonan Yonan, Mohammad O. Abdullah, Felix Nilsson, Mahdi Fazeli, Ahmad Patooghy, Slawomir Nowaczyk. 347-354 [doi]
- Addressing the C/C++ Vulnerability Datasets Limitation: The Good, the Bad and the UglyClaudio Curto, Daniela Giordano, Daniel Gustav Indelicato. 355-362 [doi]
- Large Language Models as Carriers of Hidden MessagesJakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki. 363-371 [doi]
- TIGER: TrIaGing KEy Refreshing Frequency via Digital SensorsMd Toufiq Hasan Anik, Hasin Ishraq Reefat, Mohammad Ebrahimabadi, Javad Bahrami, Hossein Pourmehrani, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. 372-380
- MICODE: A Minimal Code Design for Secret Sharing SchemeBelkacem Imine, Rahul Saha, Mauro Conti. 381-391 [doi]
- I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce PlatformsIoannis Vlachogiannakis, Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos. 392-399 [doi]
- RAHE: A Robust Attribute-Based Aggregate Scheme Enhanced with Homomorphic Encryption for 5G-Connected Delivery DronesAagii Mariam Thomas, Sana Belguith. 400-411 [doi]
- Secure and Hybrid Clustering for IoT Networks: An Adaptive Dynamic Reconfigurability ApproachOsama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Ibrahim Haddadi. 412-419 [doi]
- VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG)Md. Rakibul Hasan Talukder, Rakesh Podder, Indrajit Ray. 420-428 [doi]
- Learning Personalized and Context-Aware Violation Detection Rules in Trigger-Action AppsMahsa Saeidi, Sai Sree Laya Chukkapalli, Anita Sarma, Rakesh B. Bobba. 429-442 [doi]
- MK-SEAC: Multi-Keyword Searchable Encryption with Access ControlRiccardo Longo, Enrico Sorbera, Valeria Vicard. 443-454 [doi]
- A Fragile Watermarking Technique for Integrity Authentication of CSV-Files Using Invisible Line-Ending Control CharactersFlorian Zimmer, Malte Hellmeier, Motoki Nakamura, Tobias Urbanek. 455-466 [doi]
- A Hybrid Approach to Improve the Intrusion Detection Systems Using Generative Artificial Intelligence and Deep Reinforcement LearningInes Ben Makhlouf, Ghassen Kilani, Fehmi Jaafar, Haïfa Nakouri. 467-474 [doi]
- Enhancing Anonymity for Electric Vehicles in the ISO 15118 Plug-and-ChargeNethmi Hettiarachchi, Kalikinkar Mandal, Saqib Hakak. 475-482 [doi]
- A Safety-Centric Analysis and Benchmarks of Modern Open-Source Homomorphic Encryption LibrariesNges Brian Njungle, Milan Stojkov, Michel A. Kinsy. 483-494 [doi]
- MATRIX: A Comprehensive Graph-Based Framework for Malware Analysis and Threat ResearchMarco Simoni, Andrea Saracino. 495-502 [doi]
- Enhancing Access Control in Distributed Systems Through Intelligent ABAC Policy MiningSudhir Kumar Bai, Jason Aaron Goveas, Barsha Mitra. 503-514 [doi]
- SONNI: Secure Oblivious Neural Network InferenceLuke Sperling, Sandeep S. Kulkarni. 515-522 [doi]
- Hierarchical Colored Petri Nets for Vulnerability Detection in Software ArchitecturesMaya Benabdelhafid, Kamel Adi, Omer Landry Nguena-Timo, Luigi Logrippo. 523-530 [doi]
- Optimal Noise Injection on Training Data: A Defense Against Membership Inference AttacksRadia Kassa, Kamel Adi, Myria Bouhaddi. 531-538 [doi]
- Robust Peer-to-Peer Machine Learning Against Poisoning AttacksMyria Bouhaddi, Kamel Adi. 539-546 [doi]
- Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network SecurityEmilia Rivas, Sabrina Saika, Ahtesham Bakht, Aritran Piplai, Nathaniel D. Bastian, Ankit Shah 0002. 547-554 [doi]
- A Method for Packed (and Unpacked) Malware Detection by Means of Convolutional Neural NetworksGiovanni Ciaramella, Fabio Martinelli, Antonella Santone, Francesco Mercaldo. 557-564 [doi]
- Anomaly Detection in ZkSync Transactions with Unsupervised Machine LearningKamil Kaczynski, Aleksander Wiacek. 565-570 [doi]
- NULLDect: A Dynamic Adaptive Learning Framework for Robust NULL Pointer Dereference DetectionTasmin Karim, Md. Shazzad Hossain Shaon, Md. Fahim Sultan, Alfredo Cuzzocrea, Mst. Shapna Akter. 571-576 [doi]
- A Mobile Payment Scheme Using Biometric Identification with Mutual AuthenticationJack Sturgess, Ivan Martinovic. 577-585 [doi]
- EDQKD: Enhanced-Dynamic Quantum Key Distributions with Improved Security and Key RateNikhil Kumar Parida, Sarath Babu 0003, Neeraj Panwar, Virendra Singh. 586-591 [doi]
- Post-Quantum Digital Signature Algorithms on IoT: Evaluating Performance on LoRa ESP32 MicrocontrollerMads Villum Nielsen, Magnus Raagaard Kjeldsen, Togu Turnip, Birger Andersen. 592-600 [doi]
- Stegoslayer: A Robust Browser-Integrated Approach for Thwarting StegomalwareRushikesh Kawale, Sarath Babu 0003, Virendra Singh. 601-606 [doi]
- Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 SimulatorMahreen Khan, Maria Mushtaq, Renaud Pacalet, Ludovic Apvrille. 607-612 [doi]
- UOV-Based Verifiable Timed Signature SchemeErkan Uslu, Oguz Yayla. 613-618 [doi]
- EdgeFuzz: A Middleware-Based Security Testing Tool for Vulnerability Discovery in Distributed Computing ApplicationsMishaal Ahmed, Muhammad Ajmal Naz. 619-625 [doi]
- Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through Threat Modeling and Security TestingJared Sheldon, Isabelle Brown-Cantrell, Patrick Pape, Thomas H. Morris. 626-631 [doi]
- Threshold Structure-Preserving Signatures with Randomizable KeyAhmet Ramazan Agirtas, Emircan Çelik, Sermin Kocaman, Fatih Sulak, Oguz Yayla. 632-637 [doi]
- Privacy-Preserving EEG Data Generation: A Federated Split Learning Approach Using Privacy-Adaptive Autoencoders and Secure Aggregation with GFlowNetShouvik Paul, Garima Bajwa. 638-643 [doi]
- AI-Based Anomaly Detection and Classification of Traffic Using NetflowGustavo Gonzalez Granadillo, Nesrine Kaaniche. 644-649 [doi]
- Accelerating PEGASUS by Applying NTRU-Based GSW-Like EncryptionShusaku Uemura, Kazuhide Fukushima. 650-657 [doi]
- A Multi-Model Approach to Enhance Automatic Matching of Vulnerabilities to Attack PatternsMarine Sauze-Kadar, Thomas Loubier. 658-665 [doi]
- Evasive IPv6 Covert Channels: Design, Machine Learning Detection, and Explainable AI EvaluationViet-Anh Phan, Jan Jerabek. 666-675 [doi]
- Dataset Watermarking Using the Discrete Wavelet TransformMike P. Raave, Devris Isler, Zekeriya Erkin. 676-681 [doi]
- Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and ClusteringKalu Gamage Kavindu Induwara Kumarasinghe, Ilangan Pakshage Madhawi Pathum Kumarsiri, Harsha Sandaruwan Gardiyawasam Pussewalage, Kapuruka Abarana Gedara Thihara Vilochana Kumarasinghe, Kushan Sudheera Kalupahana Liyanage, Yahani Pinsara Manawadu, Haran Mamankaran. 682-689 [doi]
- Software Benchmarking of NIST Lightweight Hash Function Finalists on Resource-Constrained AVR Platform via ChipWhispererMohsin Khan, Håvard D. Johansen, Dag Johansen. 690-695 [doi]
- How to Design a Public Key Infrastructure for a Central Bank Digital CurrencyMakan Rafiee, Lars Hupel. 696-704 [doi]
- An ETSI GS QKD Compliant TLS ImplementationThomas Prévost, Bruno Martin, Olivier Alibart. 705-710 [doi]
- From Real to Synthetic: GAN and DPGAN for Privacy Preserving ClassificationsMohammad Emadi, Vahideh Moghtadaiee, Mina Alishahi. 711-716 [doi]
- New Integral Distinguishers and Security Reassessment of LTLBCAbhilash Kumar Das. 717-722 [doi]
- Enhancing National Digital Identity Systems: A Framework for Institutional and Technical Harm Prevention Inspired by Microsoft's Harms ModelingGiovanni Corti, Gianluca Sassetti, Amir Sharif, Roberto Carbone, Silvio Ranise. 723-728 [doi]
- MorphDet: Towards the Detection of Morphing AttacksJival Kapoor, Priyanka Singh, Manoranjan Mohanty. 729-734 [doi]
- Learning Without Sharing: A Comparative Study of Federated Learning Models for HealthcareAnja Campmans, Mina Alishahi, Vahideh Moghtadaiee. 735-740 [doi]
- Comparison of Credential Status Mechanisms for the Digital Wallet EcosystemRiccardo Germenia, Salvatore Manfredi, Giada Sciarretta, Mario Scuro, Alessandro Tomasi 0001. 741-749 [doi]
- Masked Vector Sampling for HQCMaxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage. 750-758 [doi]
- Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-RestFederico Valbusa, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher. 759-764 [doi]
- Privacy-Enhancing Federated Time-Series Forecasting: A Microaggregation-Based ApproachSargam Gupta, Vicenç Torra. 765-770 [doi]
- Extending Null Embedding for Deep Neural Network (DNN) WatermarkingKaan Altinay, Devris Isler, Zekeriya Erkin. 771-776 [doi]
- Supporting Resilient, Ethical, and Verifiable Anonymous Identities Through BlockchainsAlberto De Marchi, Lorenzo Gigli, Andrea Melis 0001, Luca Sciullo, Fabio Vitali. 777-782 [doi]