default search action
4th TPS-ISA 2022: Atlanta, GA, USA
- 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2022, Atlanta, GA, USA, December 14-17, 2022. IEEE 2022, ISBN 978-1-6654-7408-5
- Giorgia Sirigu, Barbara Carminati, Elena Ferrari:
Privacy and Security Issues for Human Digital Twins. 1-9 - Kevin Saric, Gowri Sankar Ramachandran, Shantanu Pal, Raja Jurdak, Surya Nepal:
A Universal Deduplication Architecture for Secure and Efficient Cloud Storage. 10-19 - Prachi Bagave, Marcus Westberg, Roel Dobbe, Marijn Janssen, Aaron Yi Ding:
Accountable AI for Healthcare IoT Systems. 20-28 - Attila A. Yavuz, Saif E. Nouma, Thang Hoang, Duncan Earl, Scott Packard:
Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era. 29-38 - Kritagya Upadhyay, Ram Dantu, Yanyan He, Syed Badruddoja, Abiola Salau:
Auditing Metaverse Requires Multimodal Deep Learning. 39-46 - Ian Miller, Dan Lin:
Developing Self-evolving Deepfake Detectors Against AI Attacks. 47-54 - Liyue Fan:
Privacy Challenges and Solutions for Image Data Sharing. 55-57 - Zachary Zaccagni, Ram Dantu, Kirill Morozov:
Maintaining Review Credibility Using NLP, Reputation, and Blockchain. 58-66 - Daniel Rouhana, Peyton Lundquist, Tim Andersen, Gaby G. Dagher:
MnemoSys: A Conditional Probability Estimation Protocol for Blockchain Audited Reputation Management. 67-76 - Ravi Mukkamala, Stephan Olariu, Meshari Aljohani, Sandeep Kalari:
Managing Reputation Scores in a Blockchain-based Decentralized Marketplace. 77-86 - Ritik Kumar, Balaji Palanisamy, Shamik Sural:
Efficient Blockchain Enabled Attribute-based Access Control as a Service. 87-96 - Daiki Ito, Yuta Takata, Masaki Kamizono:
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs. 97-106 - Abdel-Jaouad Aberkane, Seppe vanden Broucke, Geert Poels:
Investigating Organizational Factors Associated with GDPR Noncompliance using Privacy Policies: A Machine Learning Approach. 107-113 - Michele Amoretti, Alexandru Budianu, Gianluca Caparra, Felice D'Agruma, Davide Ferrari, Gabriele Penzotti, Luca Veltri, Francesco Zanichelli:
Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure Computation. 114-123 - Woo-Jin Joe, Hyong-Shik Kim:
A Method of Constructing Malware Classification Dataset Using Clustering. 124-129 - Birendra Jha, Medha Atre, Ashwini Rao:
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models. 130-139 - Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha:
ML-FEED: Machine Learning Framework for Efficient Exploit Detection. 140-149 - Vivek Vaidya, Jaideep Vaidya:
Impact of Dimensionality Reduction on Outlier Detection: an Empirical Study. 150-159 - Gustavo Casqueiro, Sayed Erfan Arefin, Tasnia Heya Ashrafi, Abdul Serwadda, Hassan Wasswa:
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability. 160-167 - Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki:
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks. 168-177 - Atakan Kara, Nursena Köprücü, Mehmet Emre Gursoy:
Beta Poisoning Attacks Against Machine Learning Models: Extensions, Limitations and Defenses. 178-187 - Abdullah H. Alqahtani, John A. Clark:
Enhanced Scanning in SDN Networks and its Detection using Machine Learning. 188-197 - Pinar Erbil, Mehmet Emre Gursoy:
Defending Against Targeted Poisoning Attacks in Federated Learning. 198-207 - Shafika Showkat Moni, Deepti Gupta:
Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network. 208-216 - Mehrnoosh Shakarami, James O. Benson, Ravi S. Sandhu:
Scenario-Driven Device-to-Device Access Control in Smart Home IoT. 217-228 - Mohit Bhasi Thazhath, Jan Michalak, Thang Hoang:
Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations. 229-238 - Talal Halabi, Israat Haque, Hadis Karimipour:
Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We? 239-247 - Hai-Van Dang, Tran Viet Xuan Phuong, Thuc Dinh Nguyen, Thang Hoang:
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database. 248-257 - Sean Deaton:
What Makefile? Detecting Compiler Information Without Source Using The Code Property Graph. 258-265 - Kevin Dennis, Shamaria Engram, Tyler Kaczmarek, Jay Ligatti:
ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies. 266-275 - Sam Thomas, Farnoosh Koleini, Nasseh Tabrizi:
Dynamic defenses and the transferability of adversarial examples. 276-284 - Xun Xian, Mingyi Hong, Jie Ding:
Understanding Model Extraction Games. 285-294 - Subhra Mazumdar:
Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps. 295-304 - Zhongtang Luo, Rohan Murukutla, Aniket Kate:
Last Mile of Blockchains: RPC and Node-as-a-service. 305-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.