Abstract is missing.
- Message from the General Chairs and PC Chairs TPS-ISA 2023Surya Nepal, Jaideep Vaidya, Elena Ferrari, Balaji Palanisamy. [doi]
- Can Federated Learning be Responsible?Ling Liu 0001. [doi]
- Ensuring Trust in Genomics ResearchErman Ayday, Jaideep Vaidya, Xiaoqian Jiang, Amalio Telenti. 1-12 [doi]
- RAI4IoE: Responsible AI for Enabling the Internet of EnergyMinhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer. 13-22 [doi]
- Synthetic Information and Digital Twins for Pandemic Science: Challenges and OpportunitiesGalen Harrison, Przemyslaw J. Porebski, Jiangzhuo Chen, Mandy L. Wilson, Henning S. Mortveit, Parantapa Bhattacharya, Dawen Xie, Stefan Hoops, Anil Vullikanti, Li Xiong, James Joshi, Madhav V. Marathe. 23-33 [doi]
- Supporting Pandemic Preparedness with Privacy Enhancing TechnologyRuixuan Liu, Sepanta Zeighami, Haowen Lin, Cyrus Shahabi, Yang Cao 0011, Shun Takagi, Yoko Konishi, Masatoshi Yoshikawa, Li Xiong 0001. 34-43 [doi]
- Preserving Location Privacy in the Modern Era of Pervasive EnvironmentsTyler Nicewaner, Alian Yu, Wei Jiang, Dan Lin 0001. 44-51 [doi]
- Web 3.0 and The Ownership of LearningSarah A. Flanery, Christiana Chamon, Srujan D. Kotikela, Francis K. H. Quek. 52-54 [doi]
- FUBA: Federated Uncovering of Backdoor Attacks for Heterogeneous DataFabiola Espinoza Castellon, Deepika Singh, Aurelien Mayoue, Cedric Gouy-Pailler. 55-63 [doi]
- Learnable Image Transformations for Privacy Enhanced Deep Neural NetworksDavid Rodriguez, Ram Krishnan. 64-73 [doi]
- Metamorphic Malware Evolution: The Potential and Peril of Large Language ModelsPooria Madani. 74-81 [doi]
- A Privacy-Preserving Framework for Collaborative Machine Learning with Kernel MethodsAnika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün. 82-90 [doi]
- Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances ModelsSultan Uddin Khan, Mohammed Mynuddin, Isaac Adom, Mahmoud Nabil Mahmoud. 91-100 [doi]
- Resource-Efficient and Data Type-Aware Authentication Protocol for Internet of Things SystemsCong Pu, Imtiaz Ahmed 0001, Sumit Chakravarty. 101-110 [doi]
- Trust, Privacy and Security Aspects of Bias and Fairness in Machine LearningAsli Atabek, Egehan Eralp, Mehmet Emre Gursoy. 111-121 [doi]
- Centering Policy and Practice: Research Gaps Around Usable Differential PrivacyRachel Cummings, Jayshree Sarathy. 122-135 [doi]
- ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and AuditabilityAsma Jodeiri Akbarfam, Mahdieh Heidaripour, Hoda Maleki, Gokila Dorai, Gagan Agrawal. 136-145 [doi]
- Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic SwapShakila Zaman, Ram Dantu, Syed Badruddoja, Sirisha Talapuru, Kritagya Upadhyay. 146-155 [doi]
- Revisit Linear Transformation for Image Privacy in Machine LearningZhiwei Xu, Yangdi Lu, Wenbo He. 156-162 [doi]
- Privacy-Preserving Oriented Design for Multi-Modality Models using FLMohammed Alduniawi, Kemal Akkaya, Ruimin Sun. 163-168 [doi]
- An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification AccuracyChengen Wang, Yan Zhou, Kangkook Jee, Murat Kantarcioglu. 169-176 [doi]
- Towards Neuro-Symbolic AI for Assured and Trustworthy Human-Autonomy TeamingDanda B. Rawat. 177-179 [doi]
- Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the FutureBhavani Thuraisingham. 180-183 [doi]
- Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System ResiliencyIndrajit Ray, Sarath Sreedharan, Rakesh Podder, Shadaab Kawnain Bashir, Indrakshi Ray. 184-192 [doi]
- Invisible Watermarking for Audio Generation Diffusion ModelsXirong Cao, Xiang Li, Divyesh Jadav, Yanzhao Wu 0001, Zhehui Chen, Chen Zeng, Wenqi Wei. 193-202 [doi]
- Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical SystemsShwetha Gowdanakatte, Indrakshi Ray, Mahmoud Abdelgawad. 203-212 [doi]
- Mind the CORSMatteo Golinelli, Elham Arshad, Dmytro Kashchuk, Bruno Crispo. 213-221 [doi]
- Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and IncentivizationReginald Cushing, Xin Zhou, Adam Belloum, Paola Grosso, Tom M. van Engers, Cees de Laat. 222-229 [doi]
- Efficiently Supporting Attribute-Based Access Control in Relational DatabasesGaurav Meena, Proteet Paul, Shamik Sural. 230-239 [doi]
- Toward a (Secure) Path of Least Resistance: An Examination of Usability Challenges in Secure Sandbox SystemsAdam Beauchaine, Craig A. Shue. 240-246 [doi]
- Ensuring Privacy Policy Compliance of Wearables with IoT RegulationsKelvin Uzoma Echenim, Lavanya Elluri, Karuna Pande Joshi. 247-256 [doi]
- Balancing Privacy and Accuracy in IoT Using Domain-Specific Features for Time Series ClassificationPranshul Lakhanpal, Asmita Sharma, Joydeep Mukherjee, Marin Litoiu, Sumona Mukhopadhyay. 257-266 [doi]
- Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital SignaturesAttila A. Yavuz, Kiarash Sedghighadikolaei, Saleh Darzi, Saif E. Nouma. 267-276 [doi]
- Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity OperationsAhmad Mohsin, Helge Janicke, Surya Nepal, David Holmes. 277-286 [doi]
- The Dark Side of the Metaverse: Why is it Falling Short of Expectations?Sirisha Talapuru, Ram Dantu, Kritagya Upadhyay, Syed Badruddoja, Shakila Zaman. 287-296 [doi]
- Large Language Model-Powered Smart Contract Vulnerability Detection: New PerspectivesSihao Hu, Tiansheng Huang, Fatih Ilhan, Selim Furkan Tekin, Ling Liu 0001. 297-306 [doi]
- Large Language Models and Computer SecurityArun Iyengar, Ashish Kundu. 307-313 [doi]
- k-Anonymity in Federated Heterogenous Graphs and k-Core AnonymizationMark Dockendorf, Ram Dantu. 314-323 [doi]
- Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph DatabasesJohn Long, Ram Dantu, Jacob White. 324-334 [doi]
- Harvesting Security: A Semantically Enriched Access Control Architecture for Smart FarmsGhadeer I. Yassin, Lakshmish Ramaswamy. 335-343 [doi]
- Peculiarity and Diversity Measures to Evaluate Attribute-Based Access RulesAbner Perez-Haro, Arturo Diaz-Perez. 344-349 [doi]
- Quantitative Risk Analysis with Qualitative StatementsKarim Elhammady, Sebastian Fischmeister. 350-359 [doi]
- A Comprehensive Analysis of Trust, Privacy, and Security Measures in the Digital AgeDebashis Das, Sourav Banerjee, Pushpita Chatterjee, Uttam Ghosh. 360-369 [doi]
- Secured Data Movement Using Data Ring FencingAditya Nangia, Saksham Bhupal, Mukesh K. Mohania, Chinmay Kundu. 370-379 [doi]
- The Effect of Human v/s Synthetic Test Data and Round-Tripping on Assessment of Sentiment Analysis Systems for BiasKausik Lakkaraju, Aniket Gupta, Biplav Srivastava, Marco Valtorta, Dezhi Wu. 380-389 [doi]
- CRISP: Change Risk for IT Service ProvidersArun Ayachitula, Upendra Sharma. 390-395 [doi]
- SOC and Academia - Building Resilient SystemsCarson Zimmerman, Abhilasha Bhargav-Spantzel. 396-399 [doi]
- Bridging the Gap: Industry Perspectives and Trends in Cloud Security, and Opportunities for Collaborative ResearchSarabjeet Chugh. 400-404 [doi]