- Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo and Vicenç Torra. Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding
|
- Kevin Pfisterer, Quentin Hillebrand and Vorapong Suppakitpaisarn. Facility Location Problem under Local Differential Privacy without Super-set Assumption
|
- Daniel Shlomo, Ehud Gudess and Shlomi Dolev. Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3
|
- Paulo Amora, Francisco Daniel Praciano and Javam Machado. Purpose Filter: A space-efficient purpose metadata storage
|
- Reika Arakawa, Yo Kanemoto and Mitsuaki Akiyama. Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs
|
- Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten Everts, Florian Hahn and Andreas Peter. Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning
|
- Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge and Junaid Haseeb. Metadata Assisted Supply-Chain Attack Detection for Ansible
|
- Anand Manojkumar Parikh, Shamik Sural, Vijay Atluri and Jaideep Vaidya. Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains
|
- Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens and Frédéric Cuppens. Diffusion-based Adversarial Purification for Intrusion Detection
|
- Maxwel Bar-On, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray and Indrajit Ray. Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications
|
- Jingzhe Wang and Balaji Palanisamy. P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts
|
- Antonio Muñoz, Javier López, Cristina Alcaraz and Fabio Martinelli. Privacy Management in Cyber-Physical Systems: The DUCA Framework
|
- Basel Abdeen, Latifur Khan, S M Tahmid Siddiqui, Meah Tahmeed Ahmed and Anoop Singhal. Hallucination Detection in Large Language Models using Diversion Decoding
|
- Junaid Haseeb, Masood Mansoori and Ian Welch. Feature Identification and Study of Attackers' Behaviours Using Honeypots
|
- Mian Yang, Vijayalakshmi Atluri, Shamik Sural and Ashish Kundu. Automated Privacy Policy Analysis using Large Language Models
|
- Zahra Ebadi Ansaroudi, Amir Sharif, Giada Sciarretta, Francesco Antonio Marino and Silvio Ranise. Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0
|
- Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Sara Petrilli and Pierangela Samarati. Supporting delegation in outsourced ICA process
|
- Hao Du, Shang Liu and Yang Cao. Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?
|
- Sona Alex and Bian Yang. Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE)
|