All Stories

  1. Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities
  2. DEMO : Passive Identification of WiFi Devices in Real-Time
  3. Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation
  4. DeepSneak: User GPS Trajectory Reconstruction from Federated Route Recommendation Models
  5. Honeyfile Camouflage: Hiding Fake Files in Plain Sight
  6. Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity
  7. VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models
  8. SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
  9. Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler
  10. The Current State of Information Flows in Supply Chains
  11. Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage
  12. Reconstruction of location trajectories from a supposedly private data release
  13. Transferable Graph Backdoor Attack
  14. MetaGanFi
  15. Graphical layout recommendations with machine learning
  16. A Novel Model-Based Security Scheme for LoRa Key Generation
  17. A blockchain-based framework for energy trading between solar powered base stations and grid
  18. Adversarial Multi-view Networks for Activity Recognition
  19. Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization
  20. Impact of consensus on appendable-block blockchain for IoT
  21. Spatio-Temporal Graph Convolutional and Recurrent Networks for Citywide Passenger Demand Prediction
  22. HydraDoctor
  23. MindID
  24. WiCare