Default Cover Image

2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)

Nov. 1 2023 to Nov. 4 2023

Atlanta, GA, USA

ISBN: 979-8-3503-2385-6

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 1-1
CopyrightFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-x
Organizing Committee: TPS-ISA 2023Freely available from IEEE.pp. xii-xii
Technical Program Committee: TPS-ISA 2023Freely available from IEEE.pp. xiii-xiii
Steering Committee: TPS-ISA 2023Freely available from IEEE.pp. xiv-xiv
Can Federated Learning be Responsible?Freely available from IEEE.pp. xv-xv
Grand Challenges in Cyber Security and PrivacyFreely available from IEEE.pp. xvi-xix
Ensuring Trust in Genomics ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Preserving Location Privacy in the Modern Era of Pervasive EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 44-51
Web 3.0 and The Ownership of LearningFull-text access may be available. Sign in or learn about subscription options.pp. 52-54
FUBA: Federated Uncovering of Backdoor Attacks for Heterogeneous DataFull-text access may be available. Sign in or learn about subscription options.pp. 55-63
Learnable Image Transformations for Privacy Enhanced Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 64-73
Metamorphic Malware Evolution: The Potential and Peril of Large Language ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Resource-Efficient and Data Type-Aware Authentication Protocol for Internet of Things SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
Trust, Privacy and Security Aspects of Bias and Fairness in Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 111-121
Centering Policy and Practice: Research Gaps Around Usable Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 122-135
Revisit Linear Transformation for Image Privacy in Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 156-162
Privacy-Preserving Oriented Design for Multi-Modality Models using FLFull-text access may be available. Sign in or learn about subscription options.pp. 163-168
Towards Neuro-Symbolic AI for Assured and Trustworthy Human-Autonomy TeamingFull-text access may be available. Sign in or learn about subscription options.pp. 177-179
Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the FutureFull-text access may be available. Sign in or learn about subscription options.pp. 180-183
Invisible Watermarking for Audio Generation Diffusion ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 203-212
Mind the CORSFull-text access may be available. Sign in or learn about subscription options.pp. 213-221
Efficiently Supporting Attribute-Based Access Control in Relational DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 230-239
Toward a (Secure) Path of Least Resistance: An Examination of Usability Challenges in Secure Sandbox SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 240-246
Ensuring Privacy Policy Compliance of Wearables with IoT RegulationsFull-text access may be available. Sign in or learn about subscription options.pp. 247-256
The Dark Side of the Metaverse: Why is it Falling Short of Expectations?Full-text access may be available. Sign in or learn about subscription options.pp. 287-296
Large Language Model-Powered Smart Contract Vulnerability Detection: New PerspectivesFull-text access may be available. Sign in or learn about subscription options.pp. 297-306
Large Language Models and Computer SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 307-313
k-Anonymity in Federated Heterogenous Graphs and k-Core AnonymizationFull-text access may be available. Sign in or learn about subscription options.pp. 314-323
Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 324-334
Harvesting Security: A Semantically Enriched Access Control Architecture for Smart FarmsFull-text access may be available. Sign in or learn about subscription options.pp. 335-343
Peculiarity and Diversity Measures to Evaluate Attribute-Based Access RulesFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Quantitative Risk Analysis with Qualitative StatementsFull-text access may be available. Sign in or learn about subscription options.pp. 350-359
A Comprehensive Analysis of Trust, Privacy, and Security Measures in the Digital AgeFull-text access may be available. Sign in or learn about subscription options.pp. 360-369
Secured Data Movement Using Data Ring FencingFull-text access may be available. Sign in or learn about subscription options.pp. 370-379
CRISP: Change Risk for IT Service ProvidersFull-text access may be available. Sign in or learn about subscription options.pp. 390-395
SOC and Academia – Building Resilient SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 396-399
Bridging the Gap: Industry Perspectives and Trends in Cloud Security, and Opportunities for Collaborative ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
Author IndexFreely available from IEEE.pp. 405-407
Showing 57 out of 57