Abstract is missing.
- Privacy-Preserving k-core Decomposition for GraphsXuyang Liu, Rong Zhao, Bingwen Feng, Jilian Zhang. 3-18 [doi]
- Anomaly Detection in Log Streams Based on Time-Contextual ModelsDaniil Fedotov, Jaroslav Kuchar, Tomas Vitvar. 19-29 [doi]
- Enhancing Open-Set Recognition with Global Feature RepresentationGuolou Ping. 30-45 [doi]
- Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data PublishingSamsad Jahan, Yong-Feng Ge, Hua Wang 0002, Md. Enamul Kabir. 46-57 [doi]
- A Graph-Based Approach for Software Functionality Classification on the WebYinhao Jiang, Michael Bewong, Arash Mahboubi, Sajal Halder, Md. Rafiqul Islam 0001, Md Zahidul Islam 0001, Ryan H. L. Ip, Praveen Gauravaram, Jason Xue. 58-73 [doi]
- FUD-LDP: Fully User Driven Local Differential PrivacyGnanakumar Thedchanamoorthy, Michael Bewong, Meisam Mohammady, Tanveer A. Zia, Md Zahidul Islam 0001. 74-83 [doi]
- A Privacy-Preserving Encryption Framework for Big Data AnalysisTaslima Khanam, Siuly Siuly, Kate N. Wang 0001, Zhonglong Zheng. 84-94 [doi]
- Location Nearest Neighbor Query Scheme in Edge Computing Based on Differential PrivacyYanni Han, Zhuoqun Li, Jian Zhang, Zhen Wu, Ying Ding. 95-106 [doi]
- Open Research Challenges for Private Advertising Systems Under Local Differential PrivacyMatilde Tullii, Solenne Gaucher, Hugo Richard, Eustache Diemert, Vianney Perchet, Alain Rakotomamonjy, Clément Calauzènes, Maxime Vono. 107-122 [doi]
- Industry-Specific Vulnerability AssessmentMohammed Alkinoon, Hattan Althebeiti, Ali Alkinoon, Manar Mohaisen, Saeed Salem, David Mohaisen. 123-139 [doi]
- Blockchain-Driven Medical Data Shamir Threshold Encryption with Attribute-Based Access Control SchemeWei Shen, Qian Zhou, Jiayang Wu. 140-150 [doi]
- Smart Contracts Vulnerability Detection Using TransformersRiham Badra, Layth Sliman, Amine Dhraief. 151-165 [doi]
- Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo PlatformZhiqi Li, Weidong Fang, Wuxiong Zhang. 166-176 [doi]
- More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator AppsMuhammad Ikram 0001, I Wayan Budi Sentana, Hassan Jameel Asghar, Mohamed Ali Kâafar, Michal Kepkowski. 177-192 [doi]
- Synthetic Data: Generate Avatar Data on DemandThomas Lebrun, Louis Béziaud, Tristan Allard, Antoine Boutet, Sébastien Gambs, Mohamed Maouche. 193-203 [doi]
- A Lightweight Detection of Sequential Patterns in File System Events During Ransomware AttacksArash Mahboubi, Hang Thanh Bui, Hamed Aboutorab, Khanh Luong, Seyit Camtepe, Keyvan Ansari. 204-215 [doi]
- Detection and Mitigation of Backdoor Attacks on x-AppsRouaa Naim, Hams Gelban, Ahmed Badawy. 216-230 [doi]
- Cohesive Database Neighborhoods for Differential Privacy: Mapping Relational Databases to RDFSara Taki, Adrien Boiret, Cédric Eichler, Benjamin Nguyen. 231-242 [doi]
- i-Right: Identifying and Classifying GDPR User Rights in Fitness Tracker and Smart Home Privacy PoliciesAlexia Dini Kounoudes, Georgia M. Kapitsaki, Ioannis Katakis 0001. 243-254 [doi]
- AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition DatasetPritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili. 255-270 [doi]
- R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional GradientsTamer Ahmed Eltaras, Qutaibah M. Malluhi, Alessandro Savino, Stefano Di Carlo, Adnan Qayyum. 271-285 [doi]
- Privacy-Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card TransactionsFarouk Damoun, Hamida Seba, Radu State. 286-301 [doi]
- DisCo-FEND: Social Context Veracity Dissemination Consistency-Guided Case Reasoning for Few-Shot Fake News DetectionWeiqiang Jin, Ningwei Wang, Tao Tao, Mengying Jiang, Xiaotian Wang, Biao Zhao, Hao Wu, Haibin Duan, Guang Yang 0006. 305-319 [doi]
- NLWM: A Robust, Efficient and High-Quality Watermark for Large Language ModelsMengting Song, Ziyuan Li, Kai Liu, Min Peng, Gang Tian. 320-335 [doi]
- Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor DatasetsLarry Huynh, Andrew Gansemer, Hyoungshick Kim, Jin B. Hong. 336-351 [doi]
- Rumor Alteration for Improving Rumor GenerationLarry Huynh, Jesse Kilcullen, Jin B. Hong. 352-362 [doi]
- Generating Effective Answers to People's Everyday Cybersecurity Questions: An Initial StudyAnanya Balaji, Lea Duesterwald, Ian Yang, Aman Priyanshu, Costanza Alfieri, Norman M. Sadeh. 363-379 [doi]
- Propaganda to Hate: A Multimodal Analysis of Arabic Memes with Multi-agent LLMsFiroj Alam, Md. Rafiul Biswas, Uzair Shah, Wajdi Zaghouani, Georgios Mikros. 380-390 [doi]
- Did You Tell a Deadly Lie? Evaluating Large Language Models for Health Misinformation IdentificationSurendrabikram Thapa, Kritesh Rauniyar, Hariram Veeramani, Aditya Shah, Imran Razzak, Usman Naseem. 391-405 [doi]
- Native vs Non-native Language Prompting: A Comparative AnalysisMohamed Bayan Kmainasi, Rakif Khan, Ali Ezzat Shahroor, Boushra Bendou, Maram Hasanain, Firoj Alam. 406-420 [doi]
- DisFact: Fact-Checking Disaster ClaimsAdemola Adesokan, Haiwei Hu, Sanjay Madria. 421-437 [doi]
- Multi-perspective Conformance Checking for Email-Driven ProcessesRalph Bou Nader, Ikram Garfatta, Marwa Elleuch, Walid Gaaloul, Yehia Taher. 441-457 [doi]
- Progressive Server-Side Rendering with Suspendable Web TemplatesFernando Miguel Carvalho. 458-473 [doi]
- HMSC-LLMs: A Hierarchical Multi-agent Service Composition Method Based on Large Language ModelsXingchuang Liao, Wenjun Wu, Xiaoming Yu, Xin Ji, Yiting Chen, Junting Li. 474-484 [doi]
- Enhancing Web Spam Detection Through a Blockchain-Enabled Crowdsourcing MechanismNoah Kader, Inwon Kang, Oshani Seneviratne. 485-499 [doi]
- WNSWE: Web-Based Network Simulator for Web Engineering EducationSebastian Heil, Lucas Schröder, Martin Gaedke. 500-511 [doi]