


default search action
6th TPS-ISA 2024: Washington, DC, USA
- 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2023, Atlanta, GA, USA, November 1-4, 2023. IEEE 2023, ISBN 979-8-3503-2385-6
- Christian Rondanini, Barbara Carminati, Elena Ferrari, Ashish Kundu, Akshay Jajoo:
Large Language Models to Enhance Malware Detection in Edge Computing. 1-10 - Souradip Nath
, Keb Summers, Jaejong Baek, Gail-Joon Ahn:
Digital Evidence Chain of Custody: Navigating New Realities of Digital Forensics. 11-20 - Nashrah Haque, Xiang Li, Zhehui Chen, Yanzhao Wu
, Lei Yu, Arun Iyengar, Wenqi Wei:
Boosting Imperceptibility of Stable Diffusion-based Adversarial Examples Generation with Momentum. 21-30 - Maja Schneider, Erik Buchmann, Erhard Rahm:
Distributed, Privacy-Aware Location Data Aggregation. 31-40 - Salam Tabet, Ayman I. Kayssi, Imad H. Elhajj:
Utility-Privacy Aware Mobile Diminished Reality Framework for 3D Visual Privacy. 41-48 - Philip D. Huff, Spencer Massengale, Tran Viet Xuan Phuong, Sri Nikhil Gupta Gourisetti:
A Privacy-Preserving Cyber Threat Intelligence Sharing System. 49-58 - Ruth Olusegun, Bo Yang:
Improved Ethereum Fraud Detection Mechanism with Explainable Tabular Transformer Model. 59-68 - Ashley Ajuz, Mai Abdelhakim:
Unsupervised Approach for Electricity Theft Detection Combining Recurrent Neural Networks and Rule-Based Policy. 69-76 - Hossein Salemi, Anuridhi Gupta, Hemant Purohit:
Bias Detection and Mitigation in Zero-Shot Spam Classification using LLMs. 77-86 - Areej Alnahdi, Sashank Narain:
Towards Transparent Intrusion Detection: A Coherence-Based Framework in Explainable AI Integrating Large Language Models. 87-96 - Leon Garza, Lavanya Elluri, Aritran Piplai, Anantaa Kotal, Deepti Gupta, Anupam Joshi:
PrivComp-KG: Leveraging KG and LLM for Compliance Verification. 97-106 - M. Mehdi Kholoosi, M. Ali Babar, Roland Croft:
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality. 107-117 - Aditya Patwardhan, Vivek Vaidya, Ashish Kundu:
Automated Consistency Analysis of LLMs. 118-127 - Shriyaa Balaji, Ram Dantu, Kritagya Upadhyay, Thomas McCullough:
Bridging the Legal Divide: Contractual Enforceability and Acceptability in the AI-Driven Automated Conversion of Smart Legal Contracts. 128-137 - Saleh Darzi, Attila A. Yavuz:
Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era. 138-147 - Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu:
Federated Learning in Practice: Reflections and Projections. 148-156 - Stacey Truex, Margaret Malan:
Privacy in Practice: Research Challenges in the Deployment of Privacy-Preserving ML. 157-165 - Vinh Quach, Ram Dantu, Sirisha Talapuru, Shakila Zaman, Apurba Pokharel:
ZCube: A Zero-Trust, Zero-Knowledge, and Zero-Memory Platform for Privacy and yet Secured Access. 166-175 - Danda B. Rawat, Chandra Bajracharya:
The Intersection of Quantum Computing, AI, and Cybersecurity: Challenges and Opportunities. 176-181 - Ajesh Koyatan Chathoth, Stephen Lee:
Dynamic Black-box Backdoor Attacks on IoT Sensory Data. 182-191 - Chandreyee Bhowmick, Xenofon D. Koutsoukos:
Resilient Federated Learning Using Trimmed-Clipping Aggregation. 192-201 - Steve Bakos, Pooria Madani, Heidar Davoudi:
Noise as a Double-Edged Sword: Reinforcement Learning Exploits Randomized Defenses in Neural Networks. 202-210 - David Gao, Ian Miller, Ali A. Allami
, Dan Lin:
Preserving Privacy During Reinforcement Learning With AI Feedback. 211-220 - Maryam Aldairi, James Joshi:
Towards Assessing Integrated Differential Privacy and Fairness Mechanisms in Supervised Learning. 221-232 - Parsa Ghazvinian, Robert Podschwadt, Prajwal Panzade, Mohammad Hossein Rafiei, Daniel Takabi:
MOFHEI: Model Optimizing Framework for Fast and Efficient Homomorphically Encrypted Neural Network Inference. 233-244 - Saquib Irtiza, Khandakar Ashrafi Akbar, Arowa Yasmeen, Latifur Khan, Ovidiu Daescu, Bhavani Thuraisingham:
LLM-Sentry: A Model-Agnostic Human-in-the-Loop Framework for Securing Large Language Models. 245-254 - Habiba Farrukh, Nada Lahjouji, Sharad Mehrotra, Faisal Nawab, Julie Rousseau, Shantanu Sharma, Nalini Venkatasubramanian, Roberto Yus:
PrivacySphere: Privacy-Preserving Smart Spaces. 255-264 - Ruixuan Liu, Hong-Kyu Lee, Sivasubramanium V. Bhavani, Xiaoqian Jiang, Lucila Ohno-Machado, Li Xiong:
Patient-Centered and Practical Privacy to Support AI for Healthcare. 265-272 - Ravi K. Madduri, Zilinghan Li, Tarak Nandi, Kibaek Kim, Minseok Ryu, Alex Rodriguez:
Advances in Privacy Preserving Federated Learning to Realize a Truly Learning Healthcare System. 273-279 - Liou Tang, James Joshi:
Towards Privacy-Preserving and Secure Machine Unlearning: Taxonomy, Challenges and Research Directions. 280-291 - Shadaab Kawnain Bashir, Rakesh Podder
, Sarath Sreedharan, Indrakshi Ray, Indrajit Ray:
Resiliency Graphs: Modelling the Interplay between Cyber Attacks and System Failures through AI Planning. 292-302 - Saja Alqurashi, Indrakshi Ray, Mahmoud Abdelgawad, Hossein Shirazi:
SR2ACM: A Methodical Approach for Translating Natural Language Security Requirements to Access Control Model. 303-312 - Mohammad Setak, Pooria Madani:
Fine-Tuning LLMs for Code Mutation: A New Era of Cyber Threats. 313-321 - Tadeu Freitas, Carlos Novo
, João Soares
, Inês Dutra, Manuel Eduardo Correia, Behnam Shariati, Rolando Martins:
HAL 9000: a Risk Manager for ITSs. 322-331 - Hailey Sparks, Krishnendu Ghosh:
Discovery of Evolving Relationships of Software Vulnerabilities. 332-340 - Muhaimin Bin Munir, Yuchen Cai
, Latifur Khan, Bhavani Thuraisingham:
Leveraging Multimodal Retrieval-Augmented Generation for Cyber Attack Detection in Transit Systems. 341-350 - Justin Allen, Geoff Sanders:
BobGAT: Towards Inferring Software Bill of Behavior with Pre-Trained Graph Attention Networks. 351-360 - Sherifdeen Lawal, Xingmeng Zhao, Anthony Rios, Ram Krishnan, David F. Ferraiolo:
Translating Natural Language Specifications into Access Control Policies by Leveraging Large Language Models. 361-370 - Tanjila Mawla, Maanak Gupta:
Constraints Visualization and Specification for Activity-centric Access Control. 371-380 - Kiarash Sedghighadikolaei, Attila A. Yavuz:
Fast and Post-Quantum Authentication for Real-time Next Generation Networks with Bloom Filter. 381-388 - Asma Jodeiri Akbarfam, Gokila Dorai, Hoda Maleki:
Secure Cross-Chain Provenance for Digital Forensics Collaboration. 389-398 - Nanda Rani, Bikash Saha, Ravi Kumar, Sandeep Kumar Shukla:
Genesis of Cyber Threats: Towards Malware-based Advanced Persistent Threat (APT) Attribution. 399-408 - Maxim Chernyshev, Zubair A. Baig, Robin Doss:
[Short Paper] Forensic Analysis of Indirect Prompt Injection Attacks on LLM Agents. 409-411 - Dipankar Dasgupta, Arunava Roy:
Pitfalls of Generic Large Language Models (GLLMs) from reliability and security perspectives. 412-419 - Hammond Pearce, Benjamin Tan:
Large Language Models for Hardware Security (Invited, Short Paper). 420-423 - Tho Thi Ngoc Le, Tran Viet Xuan Phuong:
Short paper: Secure Lightweight Computation for Federated N-Gram Language Model. 424-426 - Sriya Ayachitula, Chinmay Kundu, Birendra Mishra:
Probing Robustness of In-context Learning in LLM Classification Predictions Under Label Noise. 427-436 - Pragathi Tummala, Hannah Choi, Anuridhi Gupta, Tomas A Lapnas, Yoo Sun Chung, Matthew Peterson, Géraldine Walther, Hemant Purohit:
Design Challenges for Scam Prevention Tools to Protect Neurodiverse and Older Adult Populations. 437-441 - Shutonu Mitra, Qi Zhang, Chen-Wei Chang, Hossein Salemi, Hemant Purohit, Fengxiu Zhang, Michin Hong
, Chang-Tien Lu, Jin-Hee Cho:
Towards Inclusive Cybersecurity: Protecting the Vulnerable with Social Cyber Vulnerability Metrics. 442-445 - Vikram Kulothungan
:
A Blockchain-Enabled Approach to Cross-Border Compliance and Trust. 446-454 - Krishna Purohit, Salem Abdul-Baki, Hemant Purohit:
Mind the Inclusion Gap: A Critical Review of Accessibility in Anti-Counterfeiting Technologies. 455-460 - Lucas Tecot, Cho-Jui Hsieh:
Randomized Benchmarking of Local Zeroth-Order Optimizers for Variational Quantum Systems. 461-470 - Dhruv Gopalakrishnan, Michele Mosca:
Pragmatic Obfuscation of Factoring in Hamiltonian Simulation and Ground State Estimation. 471-480 - Yizhuo Tan, Hrvoje Kukina, Jakub Szefer:
Study of Attacks on the HHL Quantum Algorithm. 481-488 - Yanzhang Zhu, Siyuan Niu, Di Wu:
Synergizing Error Suppression, Mitigation and Correction for Fault-Tolerant Quantum Computing. 489-490 - Sohrab Ganjian, Connor Paddock, Anne Broadbent:
Simulation of Quantum Homomorphic Encryption: Demonstration and Analysis. 491-498 - Pingzhi Li, Tianlong Chen, Junyu Liu
:
Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography. 499-505 - Nitish K. Chandra, Eneet Kaur, Kaushik P. Seshadreesan
:
Network Operations Scheduling for Distributed Quantum Computing. 506-515 - Zhuo Chen, Di Luo:
Entangling Intelligence: AI-Quantum Crossovers and Perspectives. 516-519 - Pei Zeng, Debayan Bandyopadhyay, José A. Méndez Méndez, Nolan Bitner, Alexander Kolar, Michael T. Solomon, F. Joseph Heremans, David D. Awschalom, Liang Jiang, Junyu Liu
:
Towards efficient and secure quantum-classical communication networks. 520-523 - Gabriel Weaver, Megan Culler, Emma M. Stewart:
Organizational Influence on Supply Chain for Digital Energy Infrastructure: Business Models, and Policy Landscape. 524-530 - Adam J. Beauchaine, Titus A. Gray, Andrew S. Hahn, Lee T. Maccarone, Scott T. Bowman:
Development of a Cyber-Physical Model and Emulation of an Oil and Gas Compressor Station for Cybersecurity Research and Development. 531-536 - Benjamin Lampe:
On the Application of Cyber-Informed Engineering (CIE). 537-542 - Abhimanyu Kapuria, Daniel G. Cole:
Formal Verification of a Nuclear Plant Thermal Dispatch Operation Using System Decomposition. 543-548 - J. Connor Grady, Shaw X. Wen, Lee T. Maccarone, Scott T. Bowman:
Statistical Methods for Developing Cybersecurity Response Thresholds for Operational Technology Systems Using Historical Data. 549-554 - Joseph Slowik:
Defensive Priorities in Securing Space-Based Infrastructure Dependencies. 555-559 - Nathan Wiatrek, Kisa Burnett, Szu-Li Lin, Samantha Liu, Patrick Saenz:
Advancing Spacecraft Security Through Anomaly Detection. 560-565 - Kerry Anne Farrea, Zubair A. Baig, Robin Doss, Dongxi Liu:
Provably Secure and Optimal Inter-Satellite Link Authentication for Low Orbit Satellites. 566-571

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.