Abstract is missing.
- Message from the General Chairs and PC Chairs TPS-ISA 2023Surya Nepal, Jaideep Vaidya, Elena Ferrari, Balaji Palanisamy. [doi]
- Can Federated Learning be Responsible?Ling Liu 0001. [doi]
- Ensuring Trust in Genomics ResearchErman Ayday, Jaideep Vaidya, Xiaoqian Jiang, Amalio Telenti. 1-12 [doi]
- Large Language Models to Enhance Malware Detection in Edge ComputingChristian Rondanini, Barbara Carminati, Elena Ferrari 0001, Ashish Kundu, Akshay Jajoo. 1-10 [doi]
- Digital Evidence Chain of Custody: Navigating New Realities of Digital ForensicsSouradip Nath, Keb Summers, JaeJong Baek, Gail-Joon Ahn. 11-20 [doi]
- RAI4IoE: Responsible AI for Enabling the Internet of EnergyMinhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer. 13-22 [doi]
- Boosting Imperceptibility of Stable Diffusion-based Adversarial Examples Generation with MomentumNashrah Haque, Xiang Li, Zhehui Chen, Yanzhao Wu, Lei Yu, Arun Iyengar, Wenqi Wei. 21-30 [doi]
- Synthetic Information and Digital Twins for Pandemic Science: Challenges and OpportunitiesGalen Harrison, Przemyslaw J. Porebski, Jiangzhuo Chen, Mandy L. Wilson, Henning S. Mortveit, Parantapa Bhattacharya, Dawen Xie, Stefan Hoops, Anil Vullikanti, Li Xiong, James Joshi, Madhav V. Marathe. 23-33 [doi]
- Distributed, Privacy-Aware Location Data AggregationMaja Schneider, Erik Buchmann, Erhard Rahm. 31-40 [doi]
- Supporting Pandemic Preparedness with Privacy Enhancing TechnologyRuixuan Liu, Sepanta Zeighami, Haowen Lin, Cyrus Shahabi, Yang Cao 0011, Shun Takagi, Yoko Konishi, Masatoshi Yoshikawa, Li Xiong 0001. 34-43 [doi]
- Utility-Privacy Aware Mobile Diminished Reality Framework for 3D Visual PrivacySalam Tabet, Ayman I. Kayssi, Imad H. Elhajj. 41-48 [doi]
- Preserving Location Privacy in the Modern Era of Pervasive EnvironmentsTyler Nicewaner, Alian Yu, Wei Jiang, Dan Lin 0001. 44-51 [doi]
- A Privacy-Preserving Cyber Threat Intelligence Sharing SystemPhilip D. Huff, Spencer Massengale, Tran Viet Xuan Phuong, Sri Nikhil Gupta Gourisetti. 49-58 [doi]
- Web 3.0 and The Ownership of LearningSarah A. Flanery, Christiana Chamon, Srujan D. Kotikela, Francis K. H. Quek. 52-54 [doi]
- FUBA: Federated Uncovering of Backdoor Attacks for Heterogeneous DataFabiola Espinoza Castellon, Deepika Singh, Aurelien Mayoue, Cedric Gouy-Pailler. 55-63 [doi]
- Improved Ethereum Fraud Detection Mechanism with Explainable Tabular Transformer ModelRuth Olusegun, Bo Yang. 59-68 [doi]
- Learnable Image Transformations for Privacy Enhanced Deep Neural NetworksDavid Rodriguez, Ram Krishnan. 64-73 [doi]
- Unsupervised Approach for Electricity Theft Detection Combining Recurrent Neural Networks and Rule-Based PolicyAshley Ajuz, Mai Abdelhakim. 69-76 [doi]
- Metamorphic Malware Evolution: The Potential and Peril of Large Language ModelsPooria Madani. 74-81 [doi]
- Bias Detection and Mitigation in Zero-Shot Spam Classification using LLMsHossein Salemi, Anuridhi Gupta, Hemant Purohit. 77-86 [doi]
- A Privacy-Preserving Framework for Collaborative Machine Learning with Kernel MethodsAnika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün. 82-90 [doi]
- Towards Transparent Intrusion Detection: A Coherence-Based Framework in Explainable AI Integrating Large Language ModelsAreej Alnahdi, Sashank Narain. 87-96 [doi]
- Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances ModelsSultan Uddin Khan, Mohammed Mynuddin, Isaac Adom, Mahmoud Nabil Mahmoud. 91-100 [doi]
- PrivComp-KG: Leveraging KG and LLM for Compliance VerificationLeon-Garza, Lavanya Elluri, Aritran Piplai, Anantaa Kotal, Deepti Gupta, Anupam Joshi. 97-106 [doi]
- Resource-Efficient and Data Type-Aware Authentication Protocol for Internet of Things SystemsCong Pu, Imtiaz Ahmed 0001, Sumit Chakravarty. 101-110 [doi]
- A Qualitative Study on Using ChatGPT for Software Security: Perception vs. PracticalityM. Mehdi Kholoosi, M. Ali Babar, Roland Croft. 107-117 [doi]
- Trust, Privacy and Security Aspects of Bias and Fairness in Machine LearningAsli Atabek, Egehan Eralp, Mehmet Emre Gursoy. 111-121 [doi]
- Automated Consistency Analysis of LLMsAditya Patwardhan, Vivek Vaidya, Ashish Kundu. 118-127 [doi]
- Centering Policy and Practice: Research Gaps Around Usable Differential PrivacyRachel Cummings, Jayshree Sarathy. 122-135 [doi]
- Bridging the Legal Divide: Contractual Enforceability and Acceptability in the AI-Driven Automated Conversion of Smart Legal ContractsShriyaa Balaji, Ram Dantu, Kritagya Upadhyay, Thomas McCullough. 128-137 [doi]
- ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and AuditabilityAsma Jodeiri Akbarfam, Mahdieh Heidaripour, Hoda Maleki, Gokila Dorai, Gagan Agrawal. 136-145 [doi]
- Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum EraSaleh Darzi, Attila A. Yavuz. 138-147 [doi]
- Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic SwapShakila Zaman, Ram Dantu, Syed Badruddoja, Sirisha Talapuru, Kritagya Upadhyay. 146-155 [doi]
- Federated Learning in Practice: Reflections and ProjectionsKatharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu 0002. 148-156 [doi]
- Revisit Linear Transformation for Image Privacy in Machine LearningZhiwei Xu, Yangdi Lu, Wenbo He. 156-162 [doi]
- Privacy in Practice: Research Challenges in the Deployment of Privacy-Preserving MLStacey Truex, Margaret Malan. 157-165 [doi]
- Privacy-Preserving Oriented Design for Multi-Modality Models using FLMohammed Alduniawi, Kemal Akkaya, Ruimin Sun. 163-168 [doi]
- ZCube: A Zero-Trust, Zero-Knowledge, and Zero-Memory Platform for Privacy and yet Secured AccessVinh Quach, Ram Dantu, Sirisha Talapuru, Shakila Zaman, Apurba Pokharel. 166-175 [doi]
- An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification AccuracyChengen Wang, Yan Zhou, Kangkook Jee, Murat Kantarcioglu. 169-176 [doi]
- The Intersection of Quantum Computing, AI, and Cybersecurity: Challenges and OpportunitiesDanda B. Rawat, Chandra Bajracharya. 176-181 [doi]
- Towards Neuro-Symbolic AI for Assured and Trustworthy Human-Autonomy TeamingDanda B. Rawat. 177-179 [doi]
- Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the FutureBhavani Thuraisingham. 180-183 [doi]
- Dynamic Black-box Backdoor Attacks on IoT Sensory DataAjesh Koyatan Chathoth, Stephen Lee. 182-191 [doi]
- Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System ResiliencyIndrajit Ray, Sarath Sreedharan, Rakesh Podder, Shadaab Kawnain Bashir, Indrakshi Ray. 184-192 [doi]
- Resilient Federated Learning Using Trimmed-Clipping AggregationChandreyee Bhowmick, Xenofon D. Koutsoukos. 192-201 [doi]
- Invisible Watermarking for Audio Generation Diffusion ModelsXirong Cao, Xiang Li, Divyesh Jadav, Yanzhao Wu 0001, Zhehui Chen, Chen Zeng, Wenqi Wei. 193-202 [doi]
- Noise as a Double-Edged Sword: Reinforcement Learning Exploits Randomized Defenses in Neural NetworksSteve Bakos, Pooria Madani, Heidar Davoudi. 202-210 [doi]
- Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical SystemsShwetha Gowdanakatte, Indrakshi Ray, Mahmoud Abdelgawad. 203-212 [doi]
- Preserving Privacy During Reinforcement Learning With AI FeedbackDavid Gao, Ian Miller, Ali A. Allami, Dan Lin 0001. 211-220 [doi]
- Mind the CORSMatteo Golinelli, Elham Arshad, Dmytro Kashchuk, Bruno Crispo. 213-221 [doi]
- Towards Assessing Integrated Differential Privacy and Fairness Mechanisms in Supervised LearningMaryam Aldairi, James Joshi. 221-232 [doi]
- Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and IncentivizationReginald Cushing, Xin Zhou, Adam Belloum, Paola Grosso, Tom M. van Engers, Cees de Laat. 222-229 [doi]
- Efficiently Supporting Attribute-Based Access Control in Relational DatabasesGaurav Meena, Proteet Paul, Shamik Sural. 230-239 [doi]
- MOFHEI: Model Optimizing Framework for Fast and Efficient Homomorphically Encrypted Neural Network InferenceParsa Ghazvinian, Robert Podschwadt, Prajwal Panzade, Mohammad Hossein Rafiei, Daniel Takabi. 233-244 [doi]
- Toward a (Secure) Path of Least Resistance: An Examination of Usability Challenges in Secure Sandbox SystemsAdam Beauchaine, Craig A. Shue. 240-246 [doi]
- LLM-Sentry: A Model-Agnostic Human-in-the-Loop Framework for Securing Large Language ModelsSaquib Irtiza, Khandakar Ashrafi Akbar, Arowa Yasmeen, Latifur Khan, Ovidiu Daescu, Bhavani Thuraisingham. 245-254 [doi]
- Ensuring Privacy Policy Compliance of Wearables with IoT RegulationsKelvin Uzoma Echenim, Lavanya Elluri, Karuna Pande Joshi. 247-256 [doi]
- PrivacySphere: Privacy-Preserving Smart SpacesHabiba Farrukh, Nada Lahjouji, Sharad Mehrotra, Faisal Nawab, Julie Rousseau, Shantanu Sharma 0001, Nalini Venkatasubramanian, Roberto Yus. 255-264 [doi]
- Balancing Privacy and Accuracy in IoT Using Domain-Specific Features for Time Series ClassificationPranshul Lakhanpal, Asmita Sharma, Joydeep Mukherjee, Marin Litoiu, Sumona Mukhopadhyay. 257-266 [doi]
- Patient-Centered and Practical Privacy to Support AI for HealthcareRuixuan Liu, Hong-Kyu Lee, Sivasubramanium V. Bhavani, Xiaoqian Jiang, Lucila Ohno-Machado, Li Xiong 0001. 265-272 [doi]
- Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital SignaturesAttila A. Yavuz, Kiarash Sedghighadikolaei, Saleh Darzi, Saif E. Nouma. 267-276 [doi]
- Advances in Privacy Preserving Federated Learning to Realize a Truly Learning Healthcare SystemRavi K. Madduri, Zilinghan Li, Tarak Nandi, Kibaek Kim, Minseok Ryu, Alex Rodriguez. 273-279 [doi]
- Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity OperationsAhmad Mohsin, Helge Janicke, Surya Nepal, David Holmes. 277-286 [doi]
- Towards Privacy-Preserving and Secure Machine Unlearning: Taxonomy, Challenges and Research DirectionsLiou Tang, James Joshi. 280-291 [doi]
- The Dark Side of the Metaverse: Why is it Falling Short of Expectations?Sirisha Talapuru, Ram Dantu, Kritagya Upadhyay, Syed Badruddoja, Shakila Zaman. 287-296 [doi]
- Resiliency Graphs: Modelling the Interplay between Cyber Attacks and System Failures through AI PlanningShadaab Kawnain Bashir, Rakesh Podder, Sarath Sreedharan, Indrakshi Ray, Indrajit Ray. 292-302 [doi]
- Large Language Model-Powered Smart Contract Vulnerability Detection: New PerspectivesSihao Hu, Tiansheng Huang, Fatih Ilhan, Selim Furkan Tekin, Ling Liu 0001. 297-306 [doi]
- SR2ACM: A Methodical Approach for Translating Natural Language Security Requirements to Access Control ModelSaja Alqurashi, Indrakshi Ray, Mahmoud Abdelgawad, Hossein Shirazi. 303-312 [doi]
- Large Language Models and Computer SecurityArun Iyengar, Ashish Kundu. 307-313 [doi]
- Fine-Tuning LLMs for Code Mutation: A New Era of Cyber ThreatsMohammad Setak, Pooria Madani. 313-321 [doi]
- k-Anonymity in Federated Heterogenous Graphs and k-Core AnonymizationMark Dockendorf, Ram Dantu. 314-323 [doi]
- HAL 9000: a Risk Manager for ITSsTadeu Freitas, Carlos Novo, João Soares, Inês Dutra, Manuel Eduardo Correia, Behnam Shariati, Rolando Martins. 322-331 [doi]
- Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph DatabasesJohn Long, Ram Dantu, Jacob White. 324-334 [doi]
- Discovery of Evolving Relationships of Software VulnerabilitiesHailey Sparks, Krishnendu Ghosh. 332-340 [doi]
- Harvesting Security: A Semantically Enriched Access Control Architecture for Smart FarmsGhadeer I. Yassin, Lakshmish Ramaswamy. 335-343 [doi]
- Leveraging Multimodal Retrieval-Augmented Generation for Cyber Attack Detection in Transit SystemsMuhaimin Bin Munir, Yuchen Cai, Latifur Khan, Bhavani Thuraisingham. 341-350 [doi]
- Peculiarity and Diversity Measures to Evaluate Attribute-Based Access RulesAbner Perez-Haro, Arturo Diaz-Perez. 344-349 [doi]
- Quantitative Risk Analysis with Qualitative StatementsKarim Elhammady, Sebastian Fischmeister. 350-359 [doi]
- BobGAT: Towards Inferring Software Bill of Behavior with Pre-Trained Graph Attention NetworksJustin Allen, Geoff Sanders. 351-360 [doi]
- A Comprehensive Analysis of Trust, Privacy, and Security Measures in the Digital AgeDebashis Das, Sourav Banerjee, Pushpita Chatterjee, Uttam Ghosh. 360-369 [doi]
- Translating Natural Language Specifications into Access Control Policies by Leveraging Large Language ModelsSherifdeen Lawal, Xingmeng Zhao, Anthony Rios, Ram Krishnan, David Ferraiolo. 361-370 [doi]
- Secured Data Movement Using Data Ring FencingAditya Nangia, Saksham Bhupal, Mukesh K. Mohania, Chinmay Kundu. 370-379 [doi]
- Constraints Visualization and Specification for Activity-centric Access ControlTanjila Mawla, Maanak Gupta. 371-380 [doi]
- The Effect of Human v/s Synthetic Test Data and Round-Tripping on Assessment of Sentiment Analysis Systems for BiasKausik Lakkaraju, Aniket Gupta, Biplav Srivastava, Marco Valtorta, Dezhi Wu. 380-389 [doi]
- Fast and Post-Quantum Authentication for Real-time Next Generation Networks with Bloom FilterKiarash Sedghighadikolaei, Attila A. Yavuz. 381-388 [doi]
- Secure Cross-Chain Provenance for Digital Forensics CollaborationAsma Jodeiri Akbarfam, Gokila Dorai, Hoda Maleki. 389-398 [doi]
- CRISP: Change Risk for IT Service ProvidersArun Ayachitula, Upendra Sharma. 390-395 [doi]
- SOC and Academia - Building Resilient SystemsCarson Zimmerman, Abhilasha Bhargav-Spantzel. 396-399 [doi]
- Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) AttributionNanda Rani, Bikash Saha, Ravi Kumar, Sandeep Kumar Shukla. 399-408 [doi]
- Bridging the Gap: Industry Perspectives and Trends in Cloud Security, and Opportunities for Collaborative ResearchSarabjeet Chugh. 400-404 [doi]
- [Short Paper] Forensic Analysis of Indirect Prompt Injection Attacks on LLM AgentsMaxim Chernyshev, Zubair A. Baig, Robin Doss. 409-411 [doi]
- Pitfalls of Generic Large Language Models (GLLMs) from reliability and security perspectivesDipankar Dasgupta, Arunava Roy. 412-419 [doi]
- Large Language Models for Hardware Security (Invited, Short Paper)Hammond Pearce, Benjamin Tan 0001. 420-423 [doi]
- Short paper: Secure Lightweight Computation for Federated N-Gram Language ModelTho Thi Ngoc Le, Tran Viet Xuan Phuong. 424-426 [doi]
- Probing Robustness of In-context Learning in LLM Classification Predictions Under Label NoiseSriya Ayachitula, Chinmay Kundu, Birendra Mishra. 427-436 [doi]
- Design Challenges for Scam Prevention Tools to Protect Neurodiverse and Older Adult PopulationsPragathi Tummala, Hannah Choi, Anuridhi Gupta, Tomas A Lapnas, Yoo Sun Chung, Matthew Peterson, Géraldine Walther, Hemant Purohit. 437-441 [doi]
- Towards Inclusive Cybersecurity: Protecting the Vulnerable with Social Cyber Vulnerability MetricsShutonu Mitra, Qi Zhang, Chen-Wei Chang, Hossein Salemi, Hemant Purohit, Fengxiu Zhang, Michin Hong, Chang-Tien Lu, Jin-Hee Cho. 442-445 [doi]
- A Blockchain-Enabled Approach to Cross-Border Compliance and TrustVikram Kulothungan. 446-454 [doi]
- Mind the Inclusion Gap: A Critical Review of Accessibility in Anti-Counterfeiting TechnologiesKrishna Purohit, Salem Abdul-Baki, Hemant Purohit. 455-460 [doi]
- Randomized Benchmarking of Local Zeroth-Order Optimizers for Variational Quantum SystemsLucas Tecot, Cho-Jui Hsieh. 461-470 [doi]
- Pragmatic Obfuscation of Factoring in Hamiltonian Simulation and Ground State EstimationDhruv Gopalakrishnan, Michele Mosca. 471-480 [doi]
- Study of Attacks on the HHL Quantum AlgorithmYizhuo Tan, Hrvoje Kukina, Jakub Szefer. 481-488 [doi]
- Synergizing Error Suppression, Mitigation and Correction for Fault-Tolerant Quantum ComputingYanzhang Zhu, Siyuan Niu, Di Wu. 489-490 [doi]
- Simulation of Quantum Homomorphic Encryption: Demonstration and AnalysisSohrab Ganjian, Connor Paddock, Anne Broadbent. 491-498 [doi]
- Enhancing Quantum Security over Federated Learning via Post-Quantum CryptographyPingzhi Li, Tianlong Chen, Junyu Liu. 499-505 [doi]
- Network Operations Scheduling for Distributed Quantum ComputingNitish K. Chandra, Eneet Kaur, Kaushik P. Seshadreesan. 506-515 [doi]
- Entangling Intelligence: AI-Quantum Crossovers and PerspectivesZhuo Chen, Di Luo. 516-519 [doi]
- Towards efficient and secure quantum-classical communication networksPei Zeng, Debayan Bandyopadhyay, José A. Méndez Méndez, Nolan Bitner, Alexander Kolar, Michael T. Solomon, F. Joseph Heremans, David D. Awschalom, Liang Jiang, Junyu Liu. 520-523 [doi]
- Organizational Influence on Supply Chain for Digital Energy Infrastructure: Business Models, and Policy LandscapeGabriel Weaver, Megan Culler, Emma M. Stewart. 524-530 [doi]
- Development of a Cyber-Physical Model and Emulation of an Oil and Gas Compressor Station for Cybersecurity Research and DevelopmentAdam J. Beauchaine, Titus A. Gray, Andrew S. Hahn, Lee T. Maccarone, Scott T. Bowman. 531-536 [doi]
- On the Application of Cyber-Informed Engineering (CIE)Benjamin Lampe. 537-542 [doi]
- Formal Verification of a Nuclear Plant Thermal Dispatch Operation Using System DecompositionAbhimanyu Kapuria, Daniel G. Cole. 543-548 [doi]
- Statistical Methods for Developing Cybersecurity Response Thresholds for Operational Technology Systems Using Historical DataJ. Connor Grady, Shaw X. Wen, Lee T. Maccarone, Scott T. Bowman. 549-554 [doi]
- Defensive Priorities in Securing Space-Based Infrastructure DependenciesJoseph Slowik. 555-559 [doi]
- Advancing Spacecraft Security Through Anomaly DetectionNathan Wiatrek, Kisa Burnett, Szu-Li Lin, Samantha Liu, Patrick Saenz. 560-565 [doi]
- Provably Secure and Optimal Inter-Satellite Link Authentication for Low Orbit SatellitesKerry Anne Farrea, Zubair A. Baig, Robin Doss, Dongxi Liu. 566-571 [doi]