All Stories

  1. Evaluating Honeyfile Realism and Enticement Metrics
  2. Navigating the Gray Interventions: The Impact of Soft Moderation Techniques Across Social Media Platforms
  3. BeyondLife: Third-Party Digital Will Application
  4. DeepSneak: User GPS Trajectory Reconstruction from Federated Route Recommendation Models
  5. Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities
  6. DEMO : Passive Identification of WiFi Devices in Real-Time
  7. Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation
  8. Honeyfile Camouflage: Hiding Fake Files in Plain Sight
  9. Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity
  10. VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models
  11. SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
  12. Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler
  13. The Current State of Information Flows in Supply Chains
  14. Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage
  15. Reconstruction of location trajectories from a supposedly private data release
  16. Transferable Graph Backdoor Attack
  17. MetaGanFi
  18. Graphical layout recommendations with machine learning
  19. A Novel Model-Based Security Scheme for LoRa Key Generation
  20. A blockchain-based framework for energy trading between solar powered base stations and grid
  21. Adversarial Multi-view Networks for Activity Recognition
  22. Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization
  23. Impact of consensus on appendable-block blockchain for IoT
  24. Spatio-Temporal Graph Convolutional and Recurrent Networks for Citywide Passenger Demand Prediction
  25. HydraDoctor
  26. MindID
  27. WiCare