Abstract is missing.
- Conference Tutorial: Can federated learning solve our data privacy problems? State of the art and open challengesNathalie Baracaldo. [doi]
- Hydra: Pipelineable Interactive Arguments of Knowledge for Verifiable Neural NetworksWilliam Zhang, Yu Xia 0005. 1-10 [doi]
- Membership Inference Attack on Graph Neural NetworksIyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla. 11-20 [doi]
- Towards Faster Functional Encryption for Privacy-preserving Machine LearningPrajwal Panzade, Daniel Takabi. 21-30 [doi]
- Resilient and Verifiable Federated Learning against Byzantine Colluding AttacksGeorges A. Kamhoua, Eranga Bandara, Peter Foytik, Priyanka Aggarwal, Sachin Shetty. 31-40 [doi]
- Feature Reduction through Data Preprocessing for Intrusion Detection in IoT NetworksTania Tahmina Jui, Md. Nazmul Hoq, Suryadipta Majumdar, Md. Shohrab Hossain. 41-50 [doi]
- Fides: Distributed Cyber-Physical ContractsLars Creutz, Jens Schneider, Guido Dartmann. 51-60 [doi]
- Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack ModelingFathima James, Indrajit Ray, Deep Medhi. 61-69 [doi]
- Edge Centric Secure Data Sharing with Digital Twins in Smart EcosystemsGlen Cathey, James Benson, Maanak Gupta, Ravi S. Sandhu. 70-79 [doi]
- A Comparative Evaluation of Differentially Private Image ObfuscationDominick Reilly, Liyue Fan. 80-89 [doi]
- Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case studyRoelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere. 90-97 [doi]
- Make Consumers Happy by Defuzzifying the Service Level AgreementsKritagya Upadhyay, Ram Dantu, Yanyan He, Abiola Salau, Syed Badruddoja. 98-105 [doi]
- Asynchronous Advantage Actor-Critic (A3C) Learning for Cognitive Network SecurityEric Muhati, Danda B. Rawat. 106-113 [doi]
- Selective Targeted Transfer Learning for Malware ClassificationPriyanka Aggarwal, Sayyed Farid Ahamed, Sachin Shetty, Laura J. Freeman. 114-120 [doi]
- Homomorphic Encryption Reference Model for Mobile Cyber Physical SystemsHassan Karim, Danda B. Rawat. 121-128 [doi]
- Can't Understand SLAs? Use the Smart ContractKritagya Upadhyay, Ram Dantu, Yanyan He, Syed Badruddoja, Abiola Salau. 129-136 [doi]
- Security Challenges in the Container CloudYutian Yang, Wenbo Shen, Bonan Ruan, Wenmao Liu, Kui Ren 0001. 137-145 [doi]
- Perception Poisoning Attacks in Federated LearningKa Ho Chow, Ling Liu. 146-155 [doi]
- Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust eraPietro Colombo, Elena Ferrari, Engin Deniz Tümer. 159-166 [doi]
- Trustworthy and Sustainable Edge AI: A Research AgendaAaron Yi Ding, Marijn Janssen 0001, Jon Crowcroft. 164-172 [doi]
- Deception for Cyber Defence: Challenges and OpportunitiesDavid Liebowitz, Surya Nepal, Kristen Moore, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar. 173-182 [doi]
- DDoS Detection Systems for Cloud Data StorageTing Cao, Jianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng, Wei-Shinn Ku, Xiao Qin 0001. 183-190 [doi]
- The Impact of Data Distribution on Fairness and Robustness in Federated LearningMustafa Safa Özdayi, Murat Kantarcioglu. 191-196 [doi]
- A Functional Model and Analysis of Next Generation Malware Attacks and DefensesCalton Pu, Qingyang Wang, Yasuhiko Kanemasa, Rodrigo Alves Lima, Joshua Kimball, Shungeng Zhang, Jianshu Liu, Xuhang Gu. 197-206 [doi]
- The TSC-PFed Architecture for Privacy-Preserving FLStacey Truex, Ling Liu 0001, Mehmet Emre Gursoy, Wenqi Wei, Ka Ho Chow. 207-216 [doi]
- DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster DetectionBrian Ricks, Patrick Tague, Bhavani M. Thuraisingham. 217-224 [doi]
- The Evolving Path of "the Right to Be Left Alone" - When Privacy Meets TechnologyMichela Iezzi. 225-234 [doi]
- Foundations for Robust Data Protection: Co-designing Law and Computer ScienceKobbi Nissim, Alexandra Wood. 235-242 [doi]
- Towards Efficient Evaluation of ABAC Policies using High-Dimensional Indexing TechniquesProteet Paul, Shamik Sural. 243-251 [doi]
- Energy-Aware Privacy Controls for CloudsJianzhou Mao, Ting Cao, Xiaopu Peng, Tathagata Bhattacharya, Wei-Shinn Ku, Xiao Qin 0001. 252-260 [doi]
- Paradigm Shift from Paper Contracts to Smart ContractsKritagya Upadhyay, Ram Dantu, Yanyan He, Abiola Salau, Syed Badruddoja. 261-268 [doi]
- Online Symbolic Learning of Policies for Explainable SecurityArthur Drozdov, Mark Law, Jorge Lobo 0001, Alessandra Russo, Mercion Wilathgamuwage Don. 269-278 [doi]
- Towards Privacy in Deep LearningFlorian Kerschbaum. 279-280 [doi]
- Metaverse: Security and Privacy IssuesRoberto Di Pietro, Stefano Cresci. 281-288 [doi]
- Deep Transfer Learning for Physical Layer Security in Wireless Communication SystemsDanda B. Rawat. 289-296 [doi]
- Securing social media for seniors from information attacks: Modeling, detecting, intervening, and communicating risksVignesh Narayanan, Brett W. Robertson, Andrea Hickerson, Biplav Srivastava, Bryant Walker Smith. 297-302 [doi]
- Similarities and Learnings from Ancient Literature on Blockchain Consensus and IntegrityAshish Kundu, Arun Ayachitula, Nagamani Sistla. 303-306 [doi]
- AI-Driven Selective Protection of Multimedia DataAshish Kundu, Abhishek Reddypalle, Chinmay Kundu. 307-313 [doi]
- Traceable, trustworthy and privacy preserving agri-food supply chainsSidra Malik, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak, Hye-Young Paik. 313-320 [doi]
- Towards Assisted Autonomy for Supply Chain Compliance ManagementGowri Sankar Ramachandran, Felicity Deane, Sidra Malik, Ali Dorri, Raja Jurdak. 321-330 [doi]
- Blockchain Technology: A case study in supply chain managementTaha Abdelgalil, Vasileios Manolas, Leandros A. Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag. 331-339 [doi]
- A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming EcosystemSai Sree Laya Chukkapalli, Priyanka Ranade, Sudip Mittal, Anupam Joshi. 340-347 [doi]
- A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity ResearchMohammad E. Alim, Shelton R. Wright, Tommy H. Morris. 348-354 [doi]
- Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply ChainH. M. N. Dilum Bandara, Shiping Chen 0001, Mark Staples, Yilin Sai. 355-364 [doi]