Table of Contents
|
Data and Applications Security and Privacy XXXV Ken Barker, Kambiz Ghazinour |
Front Matter |
Differential Privacy
|
DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks Liyue Fan, Akarsh Pokkunuru |
3-21 |
Comparing Local and Central Differential Privacy Using Membership Inference Attacks Daniel Bernau, Jonas Robl, Philip Grassal, Steffen Schneider, Florian Kerschbaum |
22-42 |
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa |
43-60 |
Cryptology I
|
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps Jiafan Wang, Sherman Chow |
63-83 |
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme Alexandros Bakas, Antonis Michalas |
84-95 |
Distributed Query Evaluation over Encrypted Data Sabrina de Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati |
96-114 |
Cryptology II
|
Multi-party Private Set Operations with an External Decider Sara Ramezanian, Tommi Meskanen, Valtteri Niemi |
117-135 |
Encrypted-Input Obfuscation of Image Classifiers Giovanni Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, David Cousins, Yuriy Polyakov |
136-156 |
Preserving Privacy of Co-occurring Keywords over Encrypted Data D. Siva Kumar, P. Santhi Thilagam |
157-168 |
Machine Learning
|
Access Control Policy Generation from User Stories Using Machine Learning John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu, Ravi Sandhu |
171-188 |
Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support Wojciech Ozga, Do Quoc, Christof Fetzer |
189-208 |
PDF Malware Detection Using Visualization and Machine Learning Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang, Hung-Min Sun |
209-220 |
Deep Learning for Detecting Network Attacks: An End-to-End Approach Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu |
221-234 |
Potpourri I
|
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets Mina Alishahi, Nicola Zannone |
237-258 |
A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsampanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou, Ruben Verborgh |
259-277 |
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things Na Shi, Bo Tang, Ravi Sandhu, Qi Li |
278-290 |
Potpourri II
|
A Digital Twin-Based Cyber Range for SOC Analysts Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, Günther Pernul |
293-311 |
The $${tkl}\hbox {-}\mathrm {Score}$$tkl-Score for Data-Sharing Misuseability Kalvin Eng, Eleni Stroulia |
312-324 |
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments Salimeh Dashti, Amir Sharif, Roberto Carbone, Silvio Ranise |
325-337 |
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks Sanaz Eidizadehakhcheloo, Bizhan Pijani, Abdessamad Imine, Michaël Rusinowitch |
338-356 |
Access Control
|
Verifiable Hierarchical Key Assignment Schemes Anna Ferrara, Federica Paci, Chiara Ricciardi |
357-376 |
An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks Adi Swissa, Ehud Gudes |
377-392 |
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining Shuvra Chakraborty, Ravi Sandhu |
393-405 |