Login / Signup
AINA (4)
2024
2024
2024
Keyphrases
Publications
2024
Andrew Jessup
,
Henrique Zanela Cochak
,
Guilherme P. Koslovski
,
Maurício A. Pillon
,
Charles Christian Miers
,
Pedro H. B. Correia
,
Marco A. Marques
,
Marcos A. Simplício Jr.
DVID: Adding Delegated Authentication to SPIFFE Trusted Domains.
AINA (4)
(2024)
Zhicheng Dou
,
Yuchen Guo
,
Ching-Chun Chang
,
Huy H. Nguyen
,
Isao Echizen
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis.
AINA (4)
(2024)
Yang Lyu
,
Yaokai Feng
,
Kouichi Sakurai
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds.
AINA (4)
(2024)
Yining Hu
,
Alistair McFarlane
,
Farookh Hussain
CarbonApp: Blockchain Enabled Carbon Offset Project Management.
AINA (4)
(2024)
Nghia Dinh
,
Huy Tran Tien
,
Viet-Tuan Le
,
Huu-Thanh Duong
,
Lidia Ogiela
,
Vinh Truong Hoang
Cognitive Blind Blockchain CAPTCHA Architecture.
AINA (4)
(2024)
Ronald Petrlic
Specifying SSI over EAP: Towards an Even Better Eduroam in the Future.
AINA (4)
(2024)
Hamzah Al-Qadasi
,
Djafer Yahia Messaoud Benchadi
,
Salim Chehida
,
Kazuhiro Fukui
,
Saddek Bensalem
Neural Network Innovations in Image-Based Malware Classification: A Comparative Study.
AINA (4)
(2024)
Baskoro Adi Pratomo
,
Stefanus A. Kosim
,
Hudan Studiawan
,
Angela O. Prabowo
BarongTrace: A Malware Event Log Dataset for Linux.
AINA (4)
(2024)
Hideki Sakurada
,
Kouichi Sakurai
SoK: Directions and Issues in Formal Verification of Payment Protocols.
AINA (4)
(2024)
Guilherme Falcão da Silva Campos
,
Jovani Dalzochio
,
Raul Ceretta Nunes
,
Luís Alvaro de Lima Silva
,
Edison Pignaton de Freitas
,
Rafael Kunst
Using Biometric Data to Authenticate Tactical Edge Network Users.
AINA (4)
(2024)
Chunlu Chen
,
Kevin I-Kai Wang
,
Peng Li
,
Kouichi Sakurai
Enhancing Security and Efficiency: A Lightweight Federated Learning Approach.
AINA (4)
(2024)
Gabriel Rossi Figlarz
,
Fabiano Passuelo Hessel
Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature Method.
AINA (4)
(2024)
Thanaporn Sanamontre
,
Vasaka Visoottiviseth
,
Chaiyong Ragkhitwetsagul
Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning.
AINA (4)
(2024)
Md Fahad Monir
,
Azwad Fawad Hasan
Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet.
AINA (4)
(2024)
Jing Ning
,
Kin Fun Li
A Study on Privacy-Preserving Transformer Model for Cross-Domain Recommendation.
AINA (4)
(2024)
Lalitha Chavali
,
Paresh Saxena
,
Barsha Mitra
Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection Systems.
AINA (4)
(2024)
Houaida Ghanmi
,
Nasreddine Hajlaoui
,
Haifa Touati
,
Mohamed Hadded
,
Paul Muhlethaler
,
Saadi Boudjit
A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model.
AINA (4)
(2024)
Fabio Junior Bertinatto
,
Daniel Arioza
,
Jéferson Campos Nobre
,
Lisandro Zambenedetti Granville
Container-Level Auditing in Container Orchestrators with eBPF.
AINA (4)
(2024)
Ankit Agrawal
,
Ashutosh Bhatia
,
Kamlesh Tiwari
Enhancing Mobile Crowdsensing Security: A Proof of Stake-Based Publisher Selection Algorithm to Combat Sybil Attacks in Blockchain-Assisted MCS Systems.
AINA (4)
(2024)
Rildo Antonio de Souza
,
Vitor de Castro-Silva
,
Sylvio Barbon Junior
,
Bruno Bogaz Zarpelão
Forecasting Malware Incident Rates in Higher Education Institutions.
AINA (4)
(2024)
Nicolas Keiji Cattani Sakashita
,
Maurício Aronne Pillon
,
Charles Christian Miers
,
Guilherme Piêgas Koslovski
Investigating the Impact of Congestion Control Algorithms on Edge-Cloud Continuum.
AINA (4)
(2024)
Rihem Zorgati
,
Hamdi Hassen
,
Kahlil Ahmad Alsulbi
The Deployment of E-Learning Application as a Web Service in a Cloud Broker Architecture.
AINA (4)
(2024)
Suleyman Uslu
,
Davinder Kaur
,
Samuel J. Rivera
,
Arjan Durresi
,
Meghna Babbar-Sebens
Causal Inference to Enhance AI Trustworthiness in Environmental Decision-Making.
AINA (4)
(2024)
Urszula Ogiela
,
Marek R. Ogiela
Towards User-Oriented Steganography.
AINA (4)
(2024)
Marek R. Ogiela
,
Lidia Ogiela
AI-Based Cybersecurity Systems.
AINA (4)
(2024)
Mamun I. Abu-Tair
,
Unsub Zia
,
Jamshed Memon
,
Bryan W. Scotney
,
Jorge Martínez Carracedo
,
Ali Sajjad
Transparent Encryption for IoT Using Offline Key Exchange over Public Blockchains.
AINA (4)
(2024)
Italo Tiago da Cunha
,
Eduardo Castilho Rosa
,
Rodrigo Moreira
,
Flávio de Oliveira Silva
Highly Reliable Communication Using Multipath Slices with Alternating Transmission.
AINA (4)
(2024)
Juarez Oliveira
,
Altair O. Santin
,
Eduardo Viegas
,
Pedro Horchulhack
A Non-interactive One-Time Password-Based Method to Enhance the Vault Security.
AINA (4)
(2024)
Hung-You Chen
,
Pi-Chung Wang
Reliability-Aware SFC Protection by Using Nodes with Spare Resources.
AINA (4)
(2024)
Ayane Sano
,
Yukiko Sawaya
,
Takamasa Isohara
,
Masakatsu Nishigaki
Messages and Incentives to Promote Updating of Software on Smartphones.
AINA (4)
(2024)
Shunya Higashi
,
Phudit Ampririt
,
Ermioni Qafzezi
,
Makoto Ikeda
,
Keita Matsuo
,
Leonard Barolli
Design and Implementation of a Fuzzy-Based System for Assessment of Relational Trust.
AINA (4)
(2024)
Carlos André Rodrigues da Silva
,
Lauro de Souza Silva
,
Julio Cesar Santos dos Anjos
,
Jorgito Matiuzzi Stocchero
,
Juliano Araujo Wickboldt
,
Edison Pignaton de Freitas
SDN Supported Network State Aware Command and Control Application Framework.
AINA (4)
(2024)
Takuya Suzuki
,
Hayato Yamana
PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN.
AINA (4)
(2024)
Manish Pandey
,
Harkeerat Kaur
,
Sudipta Basak
,
Isao Echizen
Privacy-Preserving Location-Based Services: A DQN Algorithmic Perspective.
AINA (4)
(2024)
Emanuele Scala
,
Leonardo Mostarda
Efficient Inner-Product Argument from Compressed Σ-Protocols and Applications.
AINA (4)
(2024)
Subashiny Tanigassalame
,
Yohan Pipereau
,
Adam Chader
,
Jana Toljaga
,
Gaël Thomas
FastSGX: A Message-Passing Based Runtime for SGX.
AINA (4)
(2024)
Fatma Shalabi
,
Hichem Felouat
,
Huy H. Nguyen
,
Isao Echizen
Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context Detection.
AINA (4)
(2024)
Badis Hammi
,
Tristan Bilot
,
Danyil Bazain
,
Nicolas Binand
,
Maxime Jaen
,
Chems Mitta
,
Nour El Madhoun
An End-to-End Approach for the Detection of Phishing Attacks.
AINA (4)
(2024)
Maurício de Vasconcelos Barros
,
Jean Everson Martina
SovereignRx: An Electronic Prescription System Based on High Privacy, Blockchain, and Self-Sovereign Identity.
AINA (4)
(2024)
Md Hasan Shahriar
,
Abrar Hasin Kamal
,
Anne V. D. M. Kayem
Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings.
AINA (4)
(2024)
volume 202, 2024
Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4
AINA (4)
202 (2024)