{"id":321,"date":"2021-07-16T09:57:51","date_gmt":"2021-07-16T15:57:51","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/?page_id=321"},"modified":"2022-02-13T11:03:43","modified_gmt":"2022-02-13T17:03:43","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\n<p>You can access and read the papers <a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-030-81242-3\">here<\/a>. <\/p>\n\n\n\n<p class=\"has-accent-1-color has-text-color has-large-font-size\">Full Papers<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>#<\/strong><\/td><td><strong>Title\\Authors<\/strong><\/td><\/tr><tr><td>1<\/td><td><strong>DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks<\/strong><br><em>Liyue Fan and Akarsh Pokkunuru<\/em><\/td><\/tr><tr><td>2<\/td><td><strong>Comparing local and central differential privacy using membership inference attacks<\/strong><br><em>Daniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum<\/em><\/td><\/tr><tr><td>3<\/td><td><strong>Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism<\/strong><br><em>Fumiyuki Kato, Yang Cao and Masatoshi Yoshikawa<\/em><\/td><\/tr><tr><td>4<\/td><td><strong>Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-Maps<\/strong><br><em>Jiafan Wang and Sherman S. M. Chow<\/em><\/td><\/tr><tr><td>5<\/td><td><strong>Distributed query evaluation over encrypted data<\/strong><br><em>Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati<\/em><\/td><\/tr><tr><td>6<\/td><td><strong>Multi-party Private Set Operations with an External Decider<\/strong><br><em>Sara Ramezanian, Tommi Meskanen and Valtteri Niemi<\/em><\/td><\/tr><tr><td>7<\/td><td><strong>Encrypted-Input Obfuscation of Image Classifiers<\/strong><br><em>Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, Yuriy Polyakov and Dave Cousins<\/em><\/td><\/tr><tr><td>8<\/td><td><strong>Verifiable Hierarchical Key Assignment Schemes<\/strong><br><em>Anna Lisa Ferrara, Federica Paci and Chiara Ricciardi<\/em><\/td><\/tr><tr><td>9<\/td><td><strong>An ABAC model with Trust and Gossiping (ABAC\u2013TG) for online social networks<\/strong><br><em>Adi Swissa and Ehud Gudes<\/em><\/td><\/tr><tr><td>10<\/td><td><strong>Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Dataset<\/strong><br><em>Mina Sheikhalishahi and Nicola Zannone<\/em><\/td><\/tr><tr><td>11<\/td><td><strong>A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness<\/strong><br><em>Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsabanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou and Ruben Verborgh<\/em><\/td><\/tr><tr><td>12<\/td><td><strong>A Digital Twin-based Cyber Range for SOC Analysts<\/strong><br><em>Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos and G\u00fcnther Pernul<\/em><\/td><\/tr><tr><td>13<\/td><td><strong>Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks<\/strong><br><em>Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine and Michael Rusinowitch<\/em><\/td><\/tr><tr><td>14<\/td><td><strong>Access Control Policy Generation From User Stories Using Machine Learning<\/strong><br><em>John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu<\/em><\/td><\/tr><tr><td>15<\/td><td><strong>Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration Support<\/strong><br><em>Wojciech Ozga, Do Le Quoc and Christof Fetzer<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-accent-1-color has-text-color has-large-font-size\">Short Papers<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>#<\/strong><\/td><td>Title\\Authors<\/td><\/tr><tr><td>1<\/td><td><strong>Nowhere to Leak: A Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting<\/strong><br><em>Alexandros Bakas and Antonis Michalas<\/em><\/td><\/tr><tr><td>2<\/td><td><strong>Preserving Privacy of Co-Occurring Keywords over Encrypted Data<\/strong><br><em>D.V.N. Siva Kumar and P. Santhi Thilagam<\/em><\/td><\/tr><tr><td>3<\/td><td><strong>On Feasibility of Attribute-Aware Relationship Based Access Control Policy Mining<\/strong><br><em>Shuvra Chakraborty and Ravi Sandhu<\/em><\/td><\/tr><tr><td>4<\/td><td><strong>DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things<\/strong><br><em>Na Shi, Bo Tang, Ravi Sandhu and Qi Li<\/em><\/td><\/tr><tr><td>5<\/td><td><strong>The tkl-Score for Data-Sharing Misuseability<\/strong><br><em>Kalvin Eng and Eleni Stroulia<\/em><\/td><\/tr><tr><td>6<\/td><td><strong>Automated Risk Assessment and Trade-Off Analysis of OpenID Connect and OAuth 2.0 Deployments<\/strong><br><em>Salimeh Dashti, Amir Sharif, Roberto Carbone and Silvio Ranise<\/em><\/td><\/tr><tr><td>7<\/td><td><strong>PDF Malware Detection Using Visualization and Machine Learning<\/strong><br><em>Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang and Hung-Min Sun<\/em><\/td><\/tr><tr><td>8<\/td><td><strong>Deep Learning for Detecting Network Attacks: An End-to-end Approach<\/strong><br><em>Qingtian Zou, Anoop Singhal, Xiaoyan Sun and Peng Liu<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>You can access and read the papers here. Full Papers # Title\\Authors 1 DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial NetworksLiyue Fan and Akarsh Pokkunuru 2 Comparing local and central differential privacy using membership inference attacksDaniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum 3 &hellip;<\/p>\n","protected":false},"author":206,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-321","page","type-page","status-publish","hentry"],"featured_image_src":null,"featured_image_src_square":null,"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages\/321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/users\/206"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":7,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages\/321\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/pages\/321\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/wp-json\/wp\/v2\/media?parent=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}