Download the presentation
Toward the Conception of a Multichain to Meet Users’ Future Needs: A Design Science Research Approach to Digital Servitization in the Automotive Industry
_ Available on IEEE Xplore and Zenodo
Accelerating Blockchain Applications on IoT Architecture Models – Solutions and Drawbacks_Available on AMC Journal and Zenodo
Threat intelligence using Digital Twin honeypots in Cybersecurity_IEEE Explore and Zenodo
User-centric design and validation of a DLT/Blockchain-based auditing tool for incident response traceability and accountability_RISE 2023 online proceedings
Fine-Grained Coverage-Based Fuzzing_ Available on ACM Transactions on Software Engineering and Methodology Journal and Zenodo
FLVoogd: Robust And Privacy Preserving Federated Learning _ Available on Proceedings of Machine Learning Research and Zenodo
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks_ACM Digital Library and Zenodo.
- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay_ Available on Springer and Zenodo
- No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent_ Available on Springer and Zenodo
- VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents_ Available on Springer and Zenodo
- Lighter is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption_ Available on Springer and Zenodo