default search action
2nd TPS-ISA 2019: Los Angeles, CA, USA
- First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, Los Angeles, CA, USA, December 12-14, 2019. IEEE 2019, ISBN 978-1-7281-6741-1
- Mehrnoosh Shakarami, Ravi S. Sandhu:
Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis. 1-9 - Ian Y. Garrett, Ryan M. Gerdes:
Z Table: Cost-Optimized Attack on Reinforcement Learning. 10-17 - Anders Tungeland Gjerdrum, Håvard Dagenborg Johansen, Lars Brenna, Dag Johansen:
Diggi: A Secure Framework for Hosting Native Cloud Functions with Minimal Trust. 18-27 - Abdulrahman Alzahrani, Hani Alshahrani, Ali Alshehri, Huirong Fu:
An Intelligent Behavior-Based Ransomware Detection System For Android Platform. 28-35 - Kuheli Sai, David Tipper:
Disincentivizing Double Spend Attacks Across Interoperable Blockchains. 36-45 - Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Xukai Zou:
Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control. 46-55 - Kyle Haefner, Indrakshi Ray:
ComplexIoT: Behavior-Based Trust For IoT Networks. 56-65 - Jai Gopal Pandey, Chhavi Mitharwal, Abhijit Karmakar:
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security. 66-72 - Yasamin Alagrash, Nithasha Mohan, Sandhya Rani Gollapalli, Julian L. Rrushi:
Machine Learning and Recognition of User Tasks for Malware Detection. 73-81 - Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu:
Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. 82-91 - Josh Payne, Ashish Kundu:
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems. 92-100 - Feng Wei, Uyen Trang Nguyen:
Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word Embeddings. 101-109 - Sara M. Sutton, Benjamin Bond, Sementa Tahiri, Julian L. Rrushi:
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency. 110-119 - Hyunsu Mun, Youngseok Lee:
Analysis and Nudging of Personally Identifiable Information in Online Used Markets. 120-129 - Nahida Sultana Chowdhury, Rajeev R. Raje:
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps. 130-139 - Hanlin Chen, Baijian Yang:
A Performance Evaluation of CAN Encryption. 140-149 - Naresh Adhikari, Naila Bushra, Mahalingam Ramkumar:
Redistricting using Blockchain Network. 150-159 - Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar:
Secure Queryable Dynamic Graphs using Blockchain. 160-167 - Ashwini Rao, Jürgen Pfeffer:
Data Siphoning Across Borders: The Role of Internet Tracking. 168-176 - Kemal Bicakci, Ihsan Kagan Ak, Betul Askin Özdemir, Mesut Gozutok:
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography. 177-183 - Jonathan Kilgallin, Ross Vasko:
Factoring RSA Keys in the IoT Era. 184-189 - Golam Dastoger Bashar, Graham Hill, Subroto Singha, Praneeth Babu Marella, Gaby G. Dagher, Jidong Xiao:
Contextualizing Consensus Protocols in Blockchain: A Short Survey. 190-195 - Mortaza S. Bargh, Sunil Choenni:
Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems. 196-202 - Ajay Kumar Shrestha, Julita Vassileva:
User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM-Based Study. 203-208 - Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources. 209-217 - Murat Kantarcioglu, Fahad Shaon:
Securing Big Data in the Age of AI. 218-220 - Abhishek Malvankar, Josh Payne, Karan K. Budhraja, Ashish Kundu, Suresh Chari, Mukesh K. Mohania:
Malware Containment in Cloud. 221-227 - Md Shihabul Islam, Harsh Verma, Latifur Khan, Murat Kantarcioglu:
Secure Real-Time Heterogeneous IoT Data Management System. 228-235 - Amirmasoud Ghiassi, Taraneh Younesian, Zilong Zhao, Robert Birke, Valerio Schiavoni, Lydia Y. Chen:
Robust (Deep) Learning Framework Against Dirty Labels and Beyond. 236-244 - Benjamin D. Horne, Maurício Gruppi, Sibel Adali:
Trustworthy Misinformation Mitigation with Soft Information Nudging. 245-254 - David Mohaisen, Songqing Chen:
Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One. 255-259 - Denis Gracanin, Ramoni O. Lasisi, Mohamed Azab, Mohamed Eltoweissy:
Next Generation Smart Built Environments: The Fusion of Empathy, Privacy and Ethics. 260-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.