Abstract is missing.
- Bilateral Personalized Information Fusion in Mobile CrowdsensingZheqi Feng, Tao Peng 0011, Guojun Wang 0001, Kejian Guan. 3-16 [doi]
- BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTMAmirah Almutairi, Boojoong Kang, Nawfal Al Hashimy. 17-30 [doi]
- Impact of Library Code in Binary Similarity SystemsAndrei Vasile Mihalca, Ciprian Pavel Oprisa. 31-44 [doi]
- How Does Post-quantum Cryptography Affect Central Bank Digital Currency?Lars Hupel, Makan Rafiee. 45-62 [doi]
- FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification ModelYuheng Zhang, Pin Liu, Guojun Wang 0001, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu. 63-75 [doi]
- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language ModelsAysan Esmradi, Daniel Wankit Yip, Chun-Fai Chan. 76-95 [doi]
- Process Mining with Programmable Logic Controller Memory StatesChun-Fai Chan, Kam-Pui Chow. 96-113 [doi]
- Honey-Gauge: Enabling User-Centric Honeypot ClassificationVinay Sachidananda, Berwyn Chai, Florian Gondesen, Kwok-Yan Lam, Yang Liu 0003. 114-132 [doi]
- Improving DNS Data Exfiltration Detection Through Temporal AnalysisGeorgios P. Spathoulas, Marios Anagnostopoulos, Konstantinos Papageorgiou, Georgios Kavallieratos, Georgios Theodoridis. 133-146 [doi]
- Deploying Post-quantum Algorithms in Existing Applications and Embedded DevicesPetr Muzikant, Jan Willemson. 147-162 [doi]
- SCORD: Shuffling Column-Oriented Relational Database to Enhance SecurityTieming Geng, Chin-Tser Huang, Csilla Farkas. 163-176 [doi]
- A SLAHP in the Face of DLL Search Order HijackingAntonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri. 177-190 [doi]
- Poison Egg: Scrambling Federated Learning with Delayed Backdoor AttackMasayoshi Tsutsui, Tatsuya Kaneko, Shinya Takamaeda-Yamazaki. 191-204 [doi]
- Channel Spatio-Temporal Convolutional Network for Trajectory PredictionZhonghao Lu, Lina Xu, Ying Hu, Liping Sun, Yonglong Luo. 205-218 [doi]
- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware DetectionAndri Rai, Eul-Gyu Im. 219-235 [doi]
- SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDNYuwei Xu, Tiantian Zhang, Junyu Zeng, Rongrong Wang, Kehui Song, Jingdong Xu. 236-252 [doi]
- Loft: An Architecture for Lifetime Management of Privacy Data in Service CooperationCong Zha, Zhenan Xu, Ju Xing, Hao Yin. 255-273 [doi]
- Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based EncryptionTsz Ho Pun, Yi Jun He, Siu-Ming Yiu. 274-288 [doi]
- A Probability Mapping-Based Privacy Preservation Method for Social NetworksQingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan 0001, Changguang Wang. 289-303 [doi]
- TruFaaS - Trust Verification Framework for FaaSAvishka Shamendra, Binoy Peries, Gayangi Seneviratne, Sunimal Rathnayake. 304-318 [doi]
- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial IntelligenceMohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine. 319-334 [doi]
- Privacy Preserving Elder Fall Detection Using Deep LearningFaseeh Iftikhar, Muhammad Faizan Khan, Guojun Wang 0001, Fazli Wahid. 335-347 [doi]
- Research on Authorization Model of Attribute Access Control Based on Knowledge GraphLi Ma 0011, Qidi Lao, Wenyin Yang, Zexian Yang, Dong Yuan, Zhaoxiong Bu. 348-359 [doi]
- Simulation of Mixmining Reward Parameters for the Nym MixnetHarry Halpin. 363-379 [doi]
- Blockchain-Based Privacy-Preservation Platform for Data Storage and Query ProcessingMichael Mireku Kwakye, Ken Barker 0001. 380-400 [doi]
- Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based AuthenticationAndre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono. 401-419 [doi]
- A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital EvidenceAli Alshumrani, Nathan L. Clarke, Bogdan Ghita 0003. 420-435 [doi]
- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent SystemsChin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng. 436-449 [doi]
- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture FeaturesDaniel Chong, Junjie Zhang, Nathaniel Boland, Lingwei Chen. 450-461 [doi]