Sign in
TPS-ISA
2019
2020
2021
2022
2019
2022
Keyphrases
Publications
2022
Vivek Vaidya
,
Jaideep Vaidya
Impact of Dimensionality Reduction on Outlier Detection: an Empirical Study.
TPS-ISA
(2022)
Mehrnoosh Shakarami
,
James Benson
,
Ravi S. Sandhu
Scenario-Driven Device-to-Device Access Control in Smart Home IoT.
TPS-ISA
(2022)
Daniel Rouhana
,
Peyton Lundquist
,
Tim Andersen
,
Gaby G. Dagher
MnemoSys: A Conditional Probability Estimation Protocol for Blockchain Audited Reputation Management.
TPS-ISA
(2022)
Birendra Jha
,
Medha Atre
,
Ashwini Rao
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models.
TPS-ISA
(2022)
Woo-Jin Joe
,
Hyong-Shik Kim
A Method of Constructing Malware Classification Dataset Using Clustering.
TPS-ISA
(2022)
Attila A. Yavuz
,
Saif E. Nouma
,
Thang Hoang
,
Duncan Earl
,
Scott Packard
Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era.
TPS-ISA
(2022)
Xun Xian
,
Mingyi Hong
,
Jie Ding
Understanding Model Extraction Games.
TPS-ISA
(2022)
Ian Miller
,
Dan Lin
Developing Self-evolving Deepfake Detectors Against AI Attacks.
TPS-ISA
(2022)
Kritagya Upadhyay
,
Ram Dantu
,
Yanyan He
,
Syed Badruddoja
,
Abiola Salau
Auditing Metaverse Requires Multimodal Deep Learning.
TPS-ISA
(2022)
Ravi Mukkamala
,
Stephan Olariu
,
Meshari Aljohani
,
Sandeep Kalari
Managing Reputation Scores in a Blockchain-based Decentralized Marketplace.
TPS-ISA
(2022)
Liyue Fan
Privacy Challenges and Solutions for Image Data Sharing.
TPS-ISA
(2022)
Abdel-Jaouad Aberkane
,
Seppe vanden Broucke
,
Geert Poels
Investigating Organizational Factors Associated with GDPR Noncompliance using Privacy Policies: A Machine Learning Approach.
TPS-ISA
(2022)
Atakan Kara
,
Nursena Köprücü
,
Mehmet Emre Gursoy
Beta Poisoning Attacks Against Machine Learning Models: Extensions, Limitations and Defenses.
TPS-ISA
(2022)
Zhongtang Luo
,
Rohan Murukutla
,
Aniket Kate
Last Mile of Blockchains: RPC and Node-as-a-service.
TPS-ISA
(2022)
Gustavo Casqueiro
,
Sayed Erfan Arefin
,
Tasnia Heya Ashrafi
,
Abdul Serwadda
,
Hassan Wasswa
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability.
TPS-ISA
(2022)
Subhra Mazumdar
Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps.
TPS-ISA
(2022)
4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2022, Atlanta, GA, USA, December 14-17, 2022
TPS-ISA
(2022)
Mohit Bhasi Thazhath
,
Jan Michalak
,
Thang Hoang
Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations.
TPS-ISA
(2022)
Tanujay Saha
,
Tamjid Al Rahat
,
Najwa Aaraj
,
Yuan Tian
,
Niraj K. Jha
ML-FEED: Machine Learning Framework for Efficient Exploit Detection.
TPS-ISA
(2022)
Shafika Showkat Moni
,
Deepti Gupta
Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network.
TPS-ISA
(2022)
Ritik Kumar
,
Balaji Palanisamy
,
Shamik Sural
Efficient Blockchain Enabled Attribute-based Access Control as a Service.
TPS-ISA
(2022)
Hai-Van Dang
,
Tran Viet Xuan Phuong
,
Thuc Dinh Nguyen
,
Thang Hoang
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database.
TPS-ISA
(2022)
Michele Amoretti
,
Alexandru Budianu
,
Gianluca Caparra
,
Felice D'Agruma
,
Davide Ferrari
,
Gabriele Penzotti
,
Luca Veltri
,
Francesco Zanichelli
Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure Computation.
TPS-ISA
(2022)
Kevin Saric
,
Gowri Sankar Ramachandran
,
Shantanu Pal
,
Raja Jurdak
,
Surya Nepal
A Universal Deduplication Architecture for Secure and Efficient Cloud Storage.
TPS-ISA
(2022)
Zachary Zaccagni
,
Ram Dantu
,
Kirill Morozov
Maintaining Review Credibility Using NLP, Reputation, and Blockchain.
TPS-ISA
(2022)
Giorgia Sirigu
,
Barbara Carminati
,
Elena Ferrari
Privacy and Security Issues for Human Digital Twins.
TPS-ISA
(2022)
Daiki Ito
,
Yuta Takata
,
Masaki Kamizono
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.
TPS-ISA
(2022)
Abdullah H. Alqahtani
,
John A. Clark
Enhanced Scanning in SDN Networks and its Detection using Machine Learning.
TPS-ISA
(2022)
Sam Thomas
,
Farnoosh Koleini
,
Nasseh Tabrizi
Dynamic defenses and the transferability of adversarial examples.
TPS-ISA
(2022)
Kevin Dennis
,
Shamaria Engram
,
Tyler Kaczmarek
,
Jay Ligatti
ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies.
TPS-ISA
(2022)
Naoya Tezuka
,
Hideya Ochiai
,
Yuwei Sun
,
Hiroshi Esaki
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks.
TPS-ISA
(2022)
Prachi Bagave
,
Marcus Westberg
,
Roel Dobbe
,
Marijn Janssen
,
Aaron Yi Ding
Accountable AI for Healthcare IoT Systems.
TPS-ISA
(2022)
Sean Deaton
What Makefile? Detecting Compiler Information Without Source Using The Code Property Graph.
TPS-ISA
(2022)
Talal Halabi
,
Israat Haque
,
Hadis Karimipour
Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We?
TPS-ISA
(2022)
Pinar Erbil
,
Mehmet Emre Gursoy
Defending Against Targeted Poisoning Attacks in Federated Learning.
TPS-ISA
(2022)
2021
Yutian Yang
,
Wenbo Shen
,
Bonan Ruan
,
Wenmao Liu
,
Kui Ren
Security Challenges in the Container Cloud.
TPS-ISA
(2021)
Pietro Colombo
,
Elena Ferrari
,
Engin Deniz Tümer
Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era.
TPS-ISA
(2021)
Kobbi Nissim
,
Alexandra Wood
Foundations for Robust Data Protection: Co-designing Law and Computer Science.
TPS-ISA
(2021)
Kritagya Upadhyay
,
Ram Dantu
,
Yanyan He
,
Syed Badruddoja
,
Abiola Salau
Can't Understand SLAs? Use the Smart Contract.
TPS-ISA
(2021)
Sidra Malik
,
Volkan Dedeoglu
,
Salil S. Kanhere
,
Raja Jurdak
,
Hye-Young Paik
Traceable, trustworthy and privacy preserving agri-food supply chains.
TPS-ISA
(2021)
Kritagya Upadhyay
,
Ram Dantu
,
Yanyan He
,
Abiola Salau
,
Syed Badruddoja
Make Consumers Happy by Defuzzifying the Service Level Agreements.
TPS-ISA
(2021)
Glen Cathey
,
James Benson
,
Maanak Gupta
,
Ravi S. Sandhu
Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems.
TPS-ISA
(2021)
Ashish Kundu
,
Arun Ayachitula
,
Nagamani Sistla
Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity.
TPS-ISA
(2021)
Brian Ricks
,
Patrick Tague
,
Bhavani Thuraisingham
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection.
TPS-ISA
(2021)
H. M. N. Dilum Bandara
,
Shiping Chen
,
Mark Staples
,
Yilin Sai
Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain.
TPS-ISA
(2021)
Roelien C. Timmer
,
David Liebowitz
,
Surya Nepal
,
Salil S. Kanhere
Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study.
TPS-ISA
(2021)
Lars Creutz
,
Jens Schneider
,
Guido Dartmann
Fides: Distributed Cyber-Physical Contracts.
TPS-ISA
(2021)
Iyiola E. Olatunji
,
Wolfgang Nejdl
,
Megha Khosla
Membership Inference Attack on Graph Neural Networks.
TPS-ISA
(2021)
Michela Iezzi
The Evolving Path of "the Right to Be Left Alone" - When Privacy Meets Technology.
TPS-ISA
(2021)
Eric Muhati
,
Danda B. Rawat
Asynchronous Advantage Actor-Critic (A3C) Learning for Cognitive Network Security.
TPS-ISA
(2021)