- Attacks.- How to Design Honey Vault Schemes.- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time.- Improving Differential-Neural Cryptanalysis for Large-State SPECK.- Evasion attempt for the malicious PowerShell detector considering feature weights.- A Fast Framework for Efficiently Constructing Valuable Cubes.- A Survey on Acoustic Side Channel Attacks on Keyboards.- Trust.
- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics.- DMA: Mutual Attestation Framework for Distributed Enclaves.- Cabin: Confining Untrusted Programs within Confidential VM.- Anomaly detection.- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering.- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection.- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection.- Privacy.
- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource.- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption.- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems.- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments.