default search action
2nd TPS-ISA 2020: Atlanta, GA, USA
- Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020, Atlanta, GA, USA, October 28-31, 2020. IEEE 2020, ISBN 978-1-7281-8543-9
- Andrew Feutrill, Matthew Roughan, Joshua Ross, Yuval Yarom:
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities. 1-11 - Helge Janicke, Sharif Abuadbba, Surya Nepal:
Security and Privacy for a Sustainable Internet of Things. 12-19 - Jiyue Huang, Rania Talbi, Zilong Zhao, Sara Bouchenak, Lydia Y. Chen, Stefanie Roos:
An Exploratory Analysis on Users' Contributions in Federated Learning. 20-29 - Mehmet Emre Gursoy, Vivekanand Rajasekar, Ling Liu:
Utility-Optimized Synthesis of Differentially Private Location Traces. 30-39 - Xiaofeng Meng, Xiaojian Zhang:
Big Data Privacy Management: A Vision Paper. 40-45 - Nan Li, Dongxi Liu, Surya Nepal, Guangyu Pei:
A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability. 46-54 - Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva Raj Pokhrel, Surya Nepal, Helge Janicke:
Towards IoT Security Automation and Orchestration. 55-63 - Saurabh Gupta, Arun Balaji Buduru, Ponnurangam Kumaraguru:
imdpGAN: Generating Private and Specific Data with Generative Adversarial Networks. 64-72 - Armando Ruggeri, Antonio Celesti, Maria Fazio, Antonino Galletta, Massimo Villari:
BCB-X3DH: a Blockchain Based Improved Version of the Extended Triple Diffie-Hellman Protocol. 73-78 - Sowmya Ravidas, Indrakshi Ray, Nicola Zannone:
Handling Incomplete Information in Policy Evaluation using Attribute Similarity. 79-88 - Marco Anisetti, Claudio A. Ardagna, Barbara Carminati, Elena Ferrari, Cora Lisa Perner:
Requirements and Challenges for Secure and Trustworthy UAS Collaboration. 89-98 - Vibha Belavadi, Yan Zhou, Jonathan Z. Bakdash, Murat Kantarcioglu, Daniel C. Krawczyk, Linda Nguyen, Jelena Rakic, Bhavani Thuraisingham:
MultiModal Deception Detection: Accuracy, Applicability and Generalizability. 99-106 - Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. 107-117 - Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, David Mohaisen:
From Blue-Sky to Practical Adversarial Learning. 118-127 - DeMarcus Edwards, Danda B. Rawat:
Quantum Adversarial Machine Learning: Status, Challenges and Perspectives. 128-133 - Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data and Machine Learning. 134-137 - Aref Asvadishirehjini, Murat Kantarcioglu, Bradley A. Malin:
A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments. 138-147 - Smriti Bhatt, Ravi S. Sandhu:
Convergent Access Control to Enable Secure Smart Communities. 148-156 - Daniel Mossé, Henrique Pötter, Stephen Lee:
Maintaining Privacy and Utility in IoT System Analytics. 157-164 - Chinmay Kundu:
Towards Dynamic Access Control for Privacy. 165-168 - Abdullah S. Al-Alaj, Ravi S. Sandhu, Ram Krishnan:
A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions. 169-178 - Samir Talegaon, Ram Krishnan:
Role-Based Access Control Models for Android. 179-188 - Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Shreya Goyal, Xukai Zou, Saptarshi Purkayastha, Huanmei Wu:
AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization. 189-198 - Pranut Jain, Henrique Pötter, Adam J. Lee, Daniel Mossé:
MAFIA: Multi-layered Architecture For IoT-based Authentication. 199-208 - David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Survival Game Analysis to Personal Identity Protection Strategies. 209-217 - Jeffrey Byrnes, Thomas Hoang, Nihal Nitin Mehta, Yuan Cheng:
A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems. 218-225 - Runhua Xu, James Joshi:
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions. 226-235 - Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Adversarial Deception in Deep Learning: Analysis and Mitigation. 236-245 - Huangyi Ge, Sze Yiu Chau, Ninghui Li:
MoNet: Impressionism As A Defense Against Adversarial Examples. 246-255 - Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information. 256-262 - Ka Ho Chow, Ling Liu, Margaret Loper, Juhyun Bae, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems. 263-272 - Mohammad A. Yahya, Nasir Sharaf, Julian L. Rrushi, Ho Ming Tay, Bing Liu, Kai Xu:
Physics Reasoning for Intrusion Detection in Industrial Networks. 273-283 - Jianzhou Mao, Ting Cao, Xiaopu Peng, Tathagata Bhattacharya, Wei-Shinn Ku, Xiao Qin:
Security-Aware Energy Management in Clouds. 284-293 - Qi Zhang, Zehra Sura, Ashish Kundu, Gong Su, Arun Iyengar, Ling Liu:
StackVault: Protection from Untrusted Functions. 294-306 - Sean S. E. Thorpe, Julian Jarrett, Tyrone Grandison:
Envisioning a Cyber-Security Incident Managed Campus Environment. 307-309 - Ting Cao, Jianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng, Wei-Shinn Ku, Xiao Qin:
Data Security and Malware Detection in Cloud Storage Services. 310-318 - Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems. 319-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.