default search action
5th TPS-ISA 2023: Atlanta, GA, USA
- 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2023, Atlanta, GA, USA, November 1-4, 2023. IEEE 2023, ISBN 979-8-3503-2385-6
- Surya Nepal, Jaideep Vaidya, Elena Ferrari, Balaji Palanisamy:
Message from the General Chairs and PC Chairs TPS-ISA 2023. xi - Ling Liu:
Can Federated Learning be Responsible? xv - Erman Ayday, Jaideep Vaidya, Xiaoqian Jiang, Amalio Telenti:
Ensuring Trust in Genomics Research. 1-12 - Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. 13-22 - Galen Harrison, Przemyslaw J. Porebski, Jiangzhuo Chen, Mandy L. Wilson, Henning S. Mortveit, Parantapa Bhattacharya, Dawen Xie, Stefan Hoops, Anil Vullikanti, Li Xiong, James Joshi, Madhav V. Marathe:
Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities. 23-33 - Ruixuan Liu, Sepanta Zeighami, Haowen Lin, Cyrus Shahabi, Yang Cao, Shun Takagi, Yoko Konishi, Masatoshi Yoshikawa, Li Xiong:
Supporting Pandemic Preparedness with Privacy Enhancing Technology. 34-43 - Tyler Nicewarner, Alian Yu, Wei Jiang, Dan Lin:
Preserving Location Privacy in the Modern Era of Pervasive Environments. 44-51 - Sarah A. Flanery, Christiana Chamon, Srujan D. Kotikela, Francis K. H. Quek:
Web 3.0 and The Ownership of Learning. 52-54 - Fabiola Espinoza Castellon, Deepika Singh, Aurélien Mayoue, Cédric Gouy-Pailler:
FUBA: Federated Uncovering of Backdoor Attacks for Heterogeneous Data. 55-63 - David Rodriguez, Ram Krishnan:
Learnable Image Transformations for Privacy Enhanced Deep Neural Networks. 64-73 - Pooria Madani:
Metamorphic Malware Evolution: The Potential and Peril of Large Language Models. 74-81 - Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün:
A Privacy-Preserving Framework for Collaborative Machine Learning with Kernel Methods. 82-90 - Sultan Uddin Khan, Mohammed Mynuddin, Isaac Adom, Mahmoud Nabil Mahmoud:
Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models. 91-100 - Cong Pu, Imtiaz Ahmed, Sumit Chakravarty:
Resource-Efficient and Data Type-Aware Authentication Protocol for Internet of Things Systems. 101-110 - Asli Atabek, Egehan Eralp, Mehmet Emre Gursoy:
Trust, Privacy and Security Aspects of Bias and Fairness in Machine Learning. 111-121 - Rachel Cummings, Jayshree Sarathy:
Centering Policy and Practice: Research Gaps Around Usable Differential Privacy. 122-135 - Asma Jodeiri Akbarfam, Mahdieh Heidaripour, Hoda Maleki, Gokila Dorai, Gagan Agrawal:
ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability. 136-145 - Shakila Zaman, Ram Dantu, Syed Badruddoja, Sirisha Talapuru, Kritagya Upadhyay:
Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic Swap. 146-155 - Zhiwei Xu, Yangdi Lu, Wenbo He:
Revisit Linear Transformation for Image Privacy in Machine Learning. 156-162 - Mohammed Alduniawi, Kemal Akkaya, Ruimin Sun:
Privacy-Preserving Oriented Design for Multi-Modality Models using FL. 163-168 - Chengen Wang, Yan Zhou, Kangkook Jee, Murat Kantarcioglu:
An Investigation on the Fragility of Graph Neural Networks: The Impact of Node Feature Modification on Graph Classification Accuracy. 169-176 - Danda B. Rawat:
Towards Neuro-Symbolic AI for Assured and Trustworthy Human-Autonomy Teaming. 177-179 - Bhavani Thuraisingham:
Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the Future. 180-183 - Indrajit Ray, Sarath Sreedharan, Rakesh Podder, Shadaab Kawnain Bashir, Indrakshi Ray:
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency. 184-192 - Xirong Cao, Xiang Li, Divyesh Jadav, Yanzhao Wu, Zhehui Chen, Chen Zeng, Wenqi Wei:
Invisible Watermarking for Audio Generation Diffusion Models. 193-202 - Shwetha Gowdanakatte, Indrakshi Ray, Mahmoud Abdelgawad:
Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical Systems. 203-212 - Matteo Golinelli, Elham Arshad, Dmytro Kashchuk, Bruno Crispo:
Mind the CORS. 213-221 - Reginald Cushing, Xin Zhou, Adam Belloum, Paola Grosso, Tom M. van Engers, Cees de Laat:
Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and Incentivization. 222-229 - Gaurav Meena, Proteet Paul, Shamik Sural:
Efficiently Supporting Attribute-Based Access Control in Relational Databases. 230-239 - Adam Beauchaine, Craig A. Shue:
Toward a (Secure) Path of Least Resistance: An Examination of Usability Challenges in Secure Sandbox Systems. 240-246 - Kelvin Uzoma Echenim, Lavanya Elluri, Karuna Pande Joshi:
Ensuring Privacy Policy Compliance of Wearables with IoT Regulations. 247-256 - Pranshul Lakhanpal, Asmita Sharma, Joydeep Mukherjee, Marin Litoiu, Sumona Mukhopadhyay:
Balancing Privacy and Accuracy in IoT Using Domain-Specific Features for Time Series Classification. 257-266 - Attila A. Yavuz, Kiarash Sedghighadikolaei, Saleh Darzi, Saif E. Nouma:
Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures. 267-276 - Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes:
Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations. 277-286 - Sirisha Talapuru, Ram Dantu, Kritagya Upadhyay, Syed Badruddoja, Shakila Zaman:
The Dark Side of the Metaverse: Why is it Falling Short of Expectations? 287-296 - Sihao Hu, Tiansheng Huang, Fatih Ilhan, Selim Furkan Tekin, Ling Liu:
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives. 297-306 - Arun Iyengar, Ashish Kundu:
Large Language Models and Computer Security. 307-313 - Mark Dockendorf, Ram Dantu:
k-Anonymity in Federated Heterogenous Graphs and k-Core Anonymization. 314-323 - John Long, Ram Dantu, Jacob White:
Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph Databases. 324-334 - Ghadeer I. Yassin, Lakshmish Ramaswamy:
Harvesting Security: A Semantically Enriched Access Control Architecture for Smart Farms. 335-343 - Abner Perez-Haro, Arturo Diaz-Perez:
Peculiarity and Diversity Measures to Evaluate Attribute-Based Access Rules. 344-349 - Karim Elhammady, Sebastian Fischmeister:
Quantitative Risk Analysis with Qualitative Statements. 350-359 - Debashis Das, Sourav Banerjee, Pushpita Chatterjee, Uttam Ghosh:
A Comprehensive Analysis of Trust, Privacy, and Security Measures in the Digital Age. 360-369 - Aditya Nangia, Saksham Bhupal, Mukesh K. Mohania, Chinmay Kundu:
Secured Data Movement Using Data Ring Fencing. 370-379 - Kausik Lakkaraju, Aniket Gupta, Biplav Srivastava, Marco Valtorta, Dezhi Wu:
The Effect of Human v/s Synthetic Test Data and Round-Tripping on Assessment of Sentiment Analysis Systems for Bias. 380-389 - Arun Ayachitula, Upendra Sharma:
CRISP: Change Risk for IT Service Providers. 390-395 - Carson Zimmerman, Abhilasha Bhargav-Spantzel:
SOC and Academia - Building Resilient Systems. 396-399 - Sarabjeet Chugh:
Bridging the Gap: Industry Perspectives and Trends in Cloud Security, and Opportunities for Collaborative Research. 400-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.