You can access and read the papers here.
Full Papers
# | Title\Authors |
1 | DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks Liyue Fan and Akarsh Pokkunuru |
2 | Comparing local and central differential privacy using membership inference attacks Daniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum |
3 | Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism Fumiyuki Kato, Yang Cao and Masatoshi Yoshikawa |
4 | Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-Maps Jiafan Wang and Sherman S. M. Chow |
5 | Distributed query evaluation over encrypted data Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati |
6 | Multi-party Private Set Operations with an External Decider Sara Ramezanian, Tommi Meskanen and Valtteri Niemi |
7 | Encrypted-Input Obfuscation of Image Classifiers Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, Yuriy Polyakov and Dave Cousins |
8 | Verifiable Hierarchical Key Assignment Schemes Anna Lisa Ferrara, Federica Paci and Chiara Ricciardi |
9 | An ABAC model with Trust and Gossiping (ABAC–TG) for online social networks Adi Swissa and Ehud Gudes |
10 | Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Dataset Mina Sheikhalishahi and Nicola Zannone |
11 | A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsabanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou and Ruben Verborgh |
12 | A Digital Twin-based Cyber Range for SOC Analysts Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos and Günther Pernul |
13 | Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine and Michael Rusinowitch |
14 | Access Control Policy Generation From User Stories Using Machine Learning John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu |
15 | Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration Support Wojciech Ozga, Do Le Quoc and Christof Fetzer |
Short Papers
# | Title\Authors |
1 | Nowhere to Leak: A Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting Alexandros Bakas and Antonis Michalas |
2 | Preserving Privacy of Co-Occurring Keywords over Encrypted Data D.V.N. Siva Kumar and P. Santhi Thilagam |
3 | On Feasibility of Attribute-Aware Relationship Based Access Control Policy Mining Shuvra Chakraborty and Ravi Sandhu |
4 | DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things Na Shi, Bo Tang, Ravi Sandhu and Qi Li |
5 | The tkl-Score for Data-Sharing Misuseability Kalvin Eng and Eleni Stroulia |
6 | Automated Risk Assessment and Trade-Off Analysis of OpenID Connect and OAuth 2.0 Deployments Salimeh Dashti, Amir Sharif, Roberto Carbone and Silvio Ranise |
7 | PDF Malware Detection Using Visualization and Machine Learning Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang and Hung-Min Sun |
8 | Deep Learning for Detecting Network Attacks: An End-to-end Approach Qingtian Zou, Anoop Singhal, Xiaoyan Sun and Peng Liu |