Abstract is missing.
- Stretch-BFT: Workload-Adaptive and Stretchable Consensus Protocol for Permissioned BlockchainXing Tong, Zhao Zhang, Cheqing Jin, Wei Fan, Yanqin Yang, Aoying Zhou. 1-13 [doi]
- An Effective and Robust Transaction Packaging Approach for Multi-leader BFT Blockchain SystemsWenbin Wang, Xiulong Liu, Hao Xu, Wenyu Qu. 14-24 [doi]
- Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal PerspectiveZhipin Gu, Jiangyong Shi, Yuexiang Yang, Liangzhong He. 25-34 [doi]
- BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic EncryptionDongwon Lee, Myeonghwan Ahn, Hyesun Kwak, Jin B. Hong, Hyoungshick Kim. 35-45 [doi]
- CRIBA: A Tool for Comprehensive Analysis of Cryptographic Ransomware's I/O BehaviorTânia Esteves, Bruno Pereira, Rui Pedro Oliveira, João Marco, João Paulo 0001. 46-58 [doi]
- Range-Based Set ReconciliationAljoscha Meyer. 59-69 [doi]
- CASPR: Connectivity-Aware Scheduling for Partition ResilienceSara Qunaibi, Sreeharsha Udayashankar, Samer Al-Kiswany. 70-81 [doi]
- TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-WorldHua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott. 82-92 [doi]
- PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache SparkShuailou Li, Yu Wen, Tao Xue, Zhaoyang Wang, Yanna Wu, Dan Meng. 93-106 [doi]
- GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower LatencyXiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, Hai Jin 0001. 107-117 [doi]
- Sensor Node Fault Detection in Wireless Sensor Networks Utilizing Node-Level DiagnosticsDominik Widhalm, Karl Michael Göschka, Wolfgang Kastner. 118-128 [doi]
- Transparent Fault Tolerance for Stateful Applications in Kubernetes with Checkpoint/RestoreHenri Schmidt, Zeineb Rejiba, Raphael Eidenbenz, Klaus-Tycho Förster. 129-139 [doi]
- Subdomain Protection is Needed: An SPF and DMARC-Based Empirical Measurement Study and Proactive Solution of Email SecurityHan Zhang, Dengke Mi, Libo Chen, Ming Liu, Yong Shi, Zhi Xue. 140-150 [doi]
- ScaIOTA: Scalable Secure Over-the-Air Software Updates for VehiclesAli Shoker, Fernando Alves, Paulo Esteves Veríssimo. 151-161 [doi]
- ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood AttacksSimon Scherrer, Jo Vliegen, Arish Sateesan, Hsu-Chun Hsiao, Nele Mentens, Adrian Perrig. 162-172 [doi]
- SilenTower: A Robust, Scalable and Secure Watchtower with Silent ExecutorsMinze Xu, Yuan Zhang, Sheng Zhong. 173-186 [doi]
- Extending The Boundaries and Exploring The Limits Of Blockchain CompressionAnurag Jain, Emmanuelle Anceaume, Sujit Gujar. 187-197 [doi]
- Low-Overhead Routing for Offchain Networks with High Resource UtilizationXiaoxue Zhang, Shouqian Shi, Chen Qian 0001. 198-208 [doi]
- FreSh: A Lock-Free Data Series IndexPanagiota Fatourou, Eleftherios Kosmas, Themis Palpanas, George Paterakis. 209-220 [doi]
- Resource Optimization of Stream Processing in Layered Internet of ThingsAnik Momtaz, Ramy Medhat, Borzoo Bonakdarpour. 221-231 [doi]
- Inducing Lattices in Non-Lattice-Linear ProblemsArya Tanmay Gupta, Sandeep S. Kulkarni. 232-242 [doi]
- Detective-Dee: A Non-Intrusive In Situ Anomaly Detection and Fault Localization FrameworkYang Man, Shiyi Li, Wen Xia, Yikai Li, Bochun Yu, Yingchi Long, Yanqi Pan. 243-253 [doi]
- Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient SystemsMaher Khan, Amy Babay. 254-267 [doi]