


Остановите войну!
for scientists:


default search action
3rd TPS-ISA 2021: Atlanta, GA, USA
- 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021. IEEE 2021, ISBN 978-1-6654-1623-8
- Nathalie Baracaldo:
Conference Tutorial: Can federated learning solve our data privacy problems? State of the art and open challenges. xxv - William Zhang, Yu Xia:
Hydra: Pipelineable Interactive Arguments of Knowledge for Verifiable Neural Networks. 1-10 - Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla:
Membership Inference Attack on Graph Neural Networks. 11-20 - Prajwal Panzade, Daniel Takabi:
Towards Faster Functional Encryption for Privacy-preserving Machine Learning. 21-30 - Georges A. Kamhoua, Eranga Bandara, Peter Foytik, Priyanka Aggarwal, Sachin Shetty:
Resilient and Verifiable Federated Learning against Byzantine Colluding Attacks. 31-40 - Tania Tahmina Jui, Md. Nazmul Hoq, Suryadipta Majumdar, Md. Shohrab Hossain:
Feature Reduction through Data Preprocessing for Intrusion Detection in IoT Networks. 41-50 - Lars Creutz, Jens Schneider, Guido Dartmann:
Fides: Distributed Cyber-Physical Contracts. 51-60 - Fathima James, Indrajit Ray, Deep Medhi:
Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack Modeling. 61-69 - Glen Cathey, James O. Benson, Maanak Gupta, Ravi S. Sandhu:
Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems. 70-79 - Dominick Reilly, Liyue Fan:
A Comparative Evaluation of Differentially Private Image Obfuscation. 80-89 - Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere:
Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study. 90-97 - Kritagya Upadhyay, Ram Dantu, Yanyan He, Abiola Salau
, Syed Badruddoja:
Make Consumers Happy by Defuzzifying the Service Level Agreements. 98-105 - Eric Muhati, Danda B. Rawat:
Asynchronous Advantage Actor-Critic (A3C) Learning for Cognitive Network Security. 106-113 - Priyanka Aggarwal, Sayyed Farid Ahamed, Sachin Shetty, Laura J. Freeman:
Selective Targeted Transfer Learning for Malware Classification. 114-120 - Hassan Karim, Danda B. Rawat:
Homomorphic Encryption Reference Model for Mobile Cyber Physical Systems. 121-128 - Kritagya Upadhyay, Ram Dantu, Yanyan He, Syed Badruddoja, Abiola Salau
:
Can't Understand SLAs? Use the Smart Contract. 129-136 - Yutian Yang, Wenbo Shen, Bonan Ruan, Wenmao Liu, Kui Ren:
Security Challenges in the Container Cloud. 137-145 - Ka Ho Chow, Ling Liu:
Perception Poisoning Attacks in Federated Learning. 146-155 - Pietro Colombo, Elena Ferrari, Engin Deniz Tümer
:
Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era. 159-166 - Aaron Yi Ding
, Marijn Janssen, Jon Crowcroft:
Trustworthy and Sustainable Edge AI: A Research Agenda. 164-172 - David Liebowitz, Surya Nepal
, Kristen Moore
, Cody James Christopher, Salil S. Kanhere, David D. Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar:
Deception for Cyber Defence: Challenges and Opportunities. 173-182 - Ting Cao, Jianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng, Wei-Shinn Ku, Xiao Qin:
DDoS Detection Systems for Cloud Data Storage. 183-190 - Mustafa Safa Özdayi, Murat Kantarcioglu:
The Impact of Data Distribution on Fairness and Robustness in Federated Learning. 191-196 - Calton Pu, Qingyang Wang, Yasuhiko Kanemasa, Rodrigo Alves Lima, Joshua Kimball, Shungeng Zhang, Jianshu Liu, Xuhang Gu:
A Functional Model and Analysis of Next Generation Malware Attacks and Defenses. 197-206 - Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Ka Ho Chow:
The TSC-PFed Architecture for Privacy-Preserving FL. 207-216 - Brian Ricks, Patrick Tague, Bhavani Thuraisingham:
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection. 217-224 - Michela Iezzi:
The Evolving Path of "the Right to Be Left Alone" - When Privacy Meets Technology. 225-234 - Kobbi Nissim, Alexandra Wood
:
Foundations for Robust Data Protection: Co-designing Law and Computer Science. 235-242 - Proteet Paul, Shamik Sural:
Towards Efficient Evaluation of ABAC Policies using High-Dimensional Indexing Techniques. 243-251 - Jianzhou Mao, Ting Cao, Xiaopu Peng, Tathagata Bhattacharya, Wei-Shinn Ku, Xiao Qin:
Energy-Aware Privacy Controls for Clouds. 252-260 - Kritagya Upadhyay, Ram Dantu, Yanyan He, Abiola Salau
, Syed Badruddoja:
Paradigm Shift from Paper Contracts to Smart Contracts. 261-268 - Arthur Drozdov, Mark Law, Jorge Lobo, Alessandra Russo, Mercion Wilathgamuwage Don:
Online Symbolic Learning of Policies for Explainable Security. 269-278 - Florian Kerschbaum:
Towards Privacy in Deep Learning. 279-280 - Roberto Di Pietro, Stefano Cresci:
Metaverse: Security and Privacy Issues. 281-288 - Danda B. Rawat:
Deep Transfer Learning for Physical Layer Security in Wireless Communication Systems. 289-296 - Vignesh Narayanan, Brett W. Robertson, Andrea Hickerson, Biplav Srivastava, Bryant Walker Smith:
Securing social media for seniors from information attacks: Modeling, detecting, intervening, and communicating risks. 297-302 - Ashish Kundu, Arun Ayachitula, Nagamani Sistla:
Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity. 303-306 - Ashish Kundu, Abhishek Reddypalle, Chinmay Kundu:
AI-Driven Selective Protection of Multimedia Data. 307-313 - Sidra Malik, Volkan Dedeoglu
, Salil S. Kanhere, Raja Jurdak
, Hye-Young Paik:
Traceable, trustworthy and privacy preserving agri-food supply chains. 313-320 - Gowri Sankar Ramachandran
, Felicity Deane
, Sidra Malik, Ali Dorri, Raja Jurdak
:
Towards Assisted Autonomy for Supply Chain Compliance Management. 321-330 - Taha Abdelgalil, Vasileios Manolas, Leandros A. Maglaras
, Ioanna Kantzavelou, Mohamed Amine Ferrag
:
Blockchain Technology: A case study in supply chain management. 331-339 - Sai Sree Laya Chukkapalli, Priyanka Ranade, Sudip Mittal, Anupam Joshi:
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem. 340-347 - Mohammad E. Alim, Shelton R. Wright, Tommy H. Morris:
A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity Research. 348-354 - H. M. N. Dilum Bandara
, Shiping Chen
, Mark Staples
, Yilin Sai
:
Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain. 355-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.