


default search action
4th TPS-ISA 2022: Atlanta, GA, USA
- 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2022, Atlanta, GA, USA, December 14-17, 2022. IEEE 2022, ISBN 978-1-6654-7408-5

- Giorgia Sirigu

, Barbara Carminati, Elena Ferrari:
Privacy and Security Issues for Human Digital Twins. 1-9 - Kevin Saric, Gowri Sankar Ramachandran

, Shantanu Pal, Raja Jurdak
, Surya Nepal
:
A Universal Deduplication Architecture for Secure and Efficient Cloud Storage. 10-19 - Prachi Bagave, Marcus Westberg, Roel Dobbe, Marijn Janssen, Aaron Yi Ding

:
Accountable AI for Healthcare IoT Systems. 20-28 - Attila A. Yavuz

, Saif E. Nouma, Thang Hoang, Duncan Earl, Scott Packard:
Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era. 29-38 - Kritagya Upadhyay

, Ram Dantu, Yanyan He, Syed Badruddoja
, Abiola Salau:
Auditing Metaverse Requires Multimodal Deep Learning. 39-46 - Ian Miller, Dan Lin:

Developing Self-evolving Deepfake Detectors Against AI Attacks. 47-54 - Liyue Fan:

Privacy Challenges and Solutions for Image Data Sharing. 55-57 - Zachary Zaccagni

, Ram Dantu, Kirill Morozov:
Maintaining Review Credibility Using NLP, Reputation, and Blockchain. 58-66 - Daniel Rouhana, Peyton Lundquist, Tim Andersen, Gaby G. Dagher:

MnemoSys: A Conditional Probability Estimation Protocol for Blockchain Audited Reputation Management. 67-76 - Ravi Mukkamala, Stephan Olariu, Meshari Aljohani

, Sandeep Kalari:
Managing Reputation Scores in a Blockchain-based Decentralized Marketplace. 77-86 - Ritik Kumar, Balaji Palanisamy, Shamik Sural

:
Efficient Blockchain Enabled Attribute-based Access Control as a Service. 87-96 - Daiki Ito, Yuta Takata, Masaki Kamizono:

Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs. 97-106 - Abdel-Jaouad Aberkane

, Seppe vanden Broucke, Geert Poels
:
Investigating Organizational Factors Associated with GDPR Noncompliance using Privacy Policies: A Machine Learning Approach. 107-113 - Michele Amoretti, Alexandru Budianu, Gianluca Caparra

, Felice D'Agruma, Davide Ferrari
, Gabriele Penzotti, Luca Veltri, Francesco Zanichelli:
Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure Computation. 114-123 - Woo-Jin Joe, Hyong-Shik Kim:

A Method of Constructing Malware Classification Dataset Using Clustering. 124-129 - Birendra Jha, Medha Atre, Ashwini Rao:

Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models. 130-139 - Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha:

ML-FEED: Machine Learning Framework for Efficient Exploit Detection. 140-149 - Vivek Vaidya, Jaideep Vaidya:

Impact of Dimensionality Reduction on Outlier Detection: an Empirical Study. 150-159 - Gustavo Casqueiro, Sayed Erfan Arefin

, Tasnia Heya Ashrafi, Abdul Serwadda, Hassan Wasswa
:
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability. 160-167 - Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki:

Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks. 168-177 - Atakan Kara, Nursena Köprücü, Mehmet Emre Gursoy:

Beta Poisoning Attacks Against Machine Learning Models: Extensions, Limitations and Defenses. 178-187 - Abdullah H. Alqahtani, John A. Clark:

Enhanced Scanning in SDN Networks and its Detection using Machine Learning. 188-197 - Pinar Erbil, Mehmet Emre Gursoy:

Defending Against Targeted Poisoning Attacks in Federated Learning. 198-207 - Shafika Showkat Moni, Deepti Gupta:

Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network. 208-216 - Mehrnoosh Shakarami, James O. Benson, Ravi S. Sandhu:

Scenario-Driven Device-to-Device Access Control in Smart Home IoT. 217-228 - Mohit Bhasi Thazhath, Jan Michalak, Thang Hoang:

Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations. 229-238 - Talal Halabi, Israat Haque, Hadis Karimipour:

Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We? 239-247 - Hai-Van Dang, Tran Viet Xuan Phuong, Thuc Dinh Nguyen, Thang Hoang:

ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database. 248-257 - Sean Deaton:

What Makefile? Detecting Compiler Information Without Source Using The Code Property Graph. 258-265 - Kevin Dennis, Shamaria Engram, Tyler Kaczmarek, Jay Ligatti:

ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies. 266-275 - Sam Thomas, Farnoosh Koleini, Nasseh Tabrizi:

Dynamic defenses and the transferability of adversarial examples. 276-284 - Xun Xian, Mingyi Hong, Jie Ding:

Understanding Model Extraction Games. 285-294 - Subhra Mazumdar:

Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps. 295-304 - Zhongtang Luo

, Rohan Murukutla, Aniket Kate:
Last Mile of Blockchains: RPC and Node-as-a-service. 305-311

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














