Abstract is missing.
- Privacy and Security Issues for Human Digital TwinsGiorgia Sirigu, Barbara Carminati, Elena Ferrari. 1-9 [doi]
- A Universal Deduplication Architecture for Secure and Efficient Cloud StorageKevin Saric, Gowri Sankar Ramachandran, Shantanu Pal, Raja Jurdak, Surya Nepal. 10-19 [doi]
- Accountable AI for Healthcare IoT SystemsPrachi Bagave, Marcus Westberg, Roel Dobbe, Marijn Janssen 0001, Aaron Yi Ding. 20-28 [doi]
- Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum EraAttila A. Yavuz, Saif E. Nouma, Thang Hoang, Duncan Earl, Scott Packard. 29-38 [doi]
- Auditing Metaverse Requires Multimodal Deep LearningKritagya Upadhyay, Ram Dantu, Yanyan He, Syed Badruddoja, Abiola Salau. 39-46 [doi]
- Developing Self-evolving Deepfake Detectors Against AI AttacksIan Miller, Dan Lin. 47-54 [doi]
- Privacy Challenges and Solutions for Image Data SharingLiyue Fan. 55-57 [doi]
- Maintaining Review Credibility Using NLP, Reputation, and BlockchainZachary Zaccagni, Ram Dantu, Kirill Morozov. 58-66 [doi]
- MnemoSys: A Conditional Probability Estimation Protocol for Blockchain Audited Reputation ManagementDaniel Rouhana, Peyton Lundquist, Tim Andersen, Gaby G. Dagher. 67-76 [doi]
- Managing Reputation Scores in a Blockchain-based Decentralized MarketplaceRavi Mukkamala, Stephan Olariu, Meshari Aljohani, Sandeep Kalari. 77-86 [doi]
- Efficient Blockchain Enabled Attribute-based Access Control as a ServiceRitik Kumar, Balaji Palanisamy, Shamik Sural. 87-96 [doi]
- Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building CostsDaiki Ito, Yuta Takata, Masaki Kamizono. 97-106 [doi]
- Investigating Organizational Factors Associated with GDPR Noncompliance using Privacy Policies: A Machine Learning ApproachAbdel-Jaouad Aberkane, Seppe Vanden Broucke, Geert Poels. 107-113 [doi]
- Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure ComputationMichele Amoretti, Alexandru Budianu, Gianluca Caparra, Felice D'Agruma, Davide Ferrari, Gabriele Penzotti, Luca Veltri, Francesco Zanichelli. 114-123 [doi]
- A Method of Constructing Malware Classification Dataset Using ClusteringWoo-Jin Joe, Hyong-Shik Kim. 124-129 [doi]
- Detecting Cloud-Based Phishing Attacks by Combining Deep Learning ModelsBirendra Jha, Medha Atre, Ashwini Rao. 130-139 [doi]
- ML-FEED: Machine Learning Framework for Efficient Exploit DetectionTanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha. 140-149 [doi]
- Impact of Dimensionality Reduction on Outlier Detection: an Empirical StudyVivek Vaidya, Jaideep Vaidya. 150-159 [doi]
- Weaponizing IoT Sensors: When Table Choice Poses a Security VulnerabilityGustavo Casqueiro, Sayed Erfan Arefin, Tasnia Heya Ashrafi, Abdul Serwadda, Hassan Wasswa. 160-167 [doi]
- Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning AttacksNaoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki. 168-177 [doi]
- Beta Poisoning Attacks Against Machine Learning Models: Extensions, Limitations and DefensesAtakan Kara, Nursena Köprücü, Mehmet Emre Gursoy. 178-187 [doi]
- Enhanced Scanning in SDN Networks and its Detection using Machine LearningAbdullah H. Alqahtani, John A. Clark. 188-197 [doi]
- Defending Against Targeted Poisoning Attacks in Federated LearningPinar Erbil, Mehmet Emre Gursoy. 198-207 [doi]
- Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring NetworkShafika Showkat Moni, Deepti Gupta. 208-216 [doi]
- Scenario-Driven Device-to-Device Access Control in Smart Home IoTMehrnoosh Shakarami, James Benson, Ravi S. Sandhu. 217-228 [doi]
- Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data OperationsMohit Bhasi Thazhath, Jan Michalak, Thang Hoang. 229-238 [doi]
- Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We?Talal Halabi, Israat Haque, Hadis Karimipour. 239-247 [doi]
- ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary DatabaseHai-Van Dang, Tran Viet Xuan Phuong, Thuc Dinh Nguyen, Thang Hoang. 248-257 [doi]
- What Makefile? Detecting Compiler Information Without Source Using The Code Property GraphSean Deaton. 258-265 [doi]
- ProProv: A Language and Graphical Tool for Specifying Data Provenance PoliciesKevin Dennis, Shamaria Engram, Tyler Kaczmarek, Jay Ligatti. 266-275 [doi]
- Dynamic defenses and the transferability of adversarial examplesSam Thomas, Farnoosh Koleini, Nasseh Tabrizi. 276-284 [doi]
- Understanding Model Extraction GamesXun Xian, Mingyi Hong, Jie Ding 0002. 285-294 [doi]
- Towards faster settlement in HTLC-based Cross-Chain Atomic SwapsSubhra Mazumdar 0004. 295-304 [doi]
- Last Mile of Blockchains: RPC and Node-as-a-serviceZhongtang Luo, Rohan Murukutla, Aniket Kate. 305-311 [doi]