Balancing XAI with Privacy and Security Considerations (English)
- New search for: Spartalis, Christoforos N.
- Further information on Spartalis, Christoforos N.:
- https://orcid.org/http://orcid.org/0000-0001-8228-4235
- New search for: Semertzidis, Theodoros
- Further information on Semertzidis, Theodoros:
- https://orcid.org/http://orcid.org/0000-0002-6825-4328
- New search for: Daras, Petros
- Further information on Daras, Petros:
- https://orcid.org/http://orcid.org/0000-0003-3814-6710
- New search for: Katsikas, Sokratis
- Further information on Katsikas, Sokratis:
- https://orcid.org/https://orcid.org/0000-0003-2966-9683
- New search for: Abie, Habtamu
- Further information on Abie, Habtamu:
- https://orcid.org/https://orcid.org/0000-0003-0866-5050
- New search for: Ranise, Silvio
- Further information on Ranise, Silvio:
- https://orcid.org/https://orcid.org/0000-0001-7269-9285
- New search for: Verderame, Luca
- Further information on Verderame, Luca:
- https://orcid.org/https://orcid.org/0000-0001-7155-7429
- New search for: Cambiaso, Enrico
- Further information on Cambiaso, Enrico:
- https://orcid.org/https://orcid.org/0000-0002-6932-1975
- New search for: Ugarelli, Rita
- Further information on Ugarelli, Rita:
- https://orcid.org/https://orcid.org/0000-0002-2096-8591
- New search for: Praça, Isabel
- Further information on Praça, Isabel:
- https://orcid.org/https://orcid.org/0000-0002-2519-9859
- New search for: Li, Wenjuan
- Further information on Li, Wenjuan:
- https://orcid.org/https://orcid.org/0000-0003-3745-5669
- New search for: Meng, Weizhi
- Further information on Meng, Weizhi:
- https://orcid.org/https://orcid.org/0000-0003-4384-5786
- New search for: Furnell, Steven
- Further information on Furnell, Steven:
- https://orcid.org/https://orcid.org/0000-0003-0984-7542
- New search for: Katt, Basel
- Further information on Katt, Basel:
- https://orcid.org/https://orcid.org/0000-0002-0177-9496
- New search for: Pirbhulal, Sandeep
- Further information on Pirbhulal, Sandeep:
- https://orcid.org/https://orcid.org/0000-0003-0843-8974
- New search for: Shukla, Ankur
- Further information on Shukla, Ankur:
- https://orcid.org/https://orcid.org/0000-0002-6737-2031
- New search for: Ianni, Michele
- Further information on Ianni, Michele:
- https://orcid.org/https://orcid.org/0000-0003-0562-7462
- New search for: Dalla Preda, Mila
- Further information on Dalla Preda, Mila:
- https://orcid.org/https://orcid.org/0000-0003-2761-4347
- New search for: Choo, Kim-Kwang Raymond
- Further information on Choo, Kim-Kwang Raymond:
- https://orcid.org/https://orcid.org/0000-0001-9208-5336
- New search for: Pupo Correia, Miguel
- New search for: Abhishta, Abhishta
- Further information on Abhishta, Abhishta:
- https://orcid.org/https://orcid.org/0000-0001-7122-3103
- New search for: Sileno, Giovanni
- New search for: Alishahi, Mina
- New search for: Kalutarage, Harsha
- Further information on Kalutarage, Harsha:
- https://orcid.org/https://orcid.org/0000-0001-6430-9558
- New search for: Yanai, Naoto
- Further information on Yanai, Naoto:
- https://orcid.org/https://orcid.org/0000-0002-0817-6188
- New search for: Spartalis, Christoforos N.
- Further information on Spartalis, Christoforos N.:
- https://orcid.org/http://orcid.org/0000-0001-8228-4235
- New search for: Semertzidis, Theodoros
- Further information on Semertzidis, Theodoros:
- https://orcid.org/http://orcid.org/0000-0002-6825-4328
- New search for: Daras, Petros
- Further information on Daras, Petros:
- https://orcid.org/http://orcid.org/0000-0003-3814-6710
In:
Computer Security. ESORICS 2023 International Workshops
: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II
;
Chapter: 7
;
111-124
;
2024
- Article/Chapter (Book) / Electronic Resource
-
Title:Balancing XAI with Privacy and Security Considerations
-
Additional title:Lect.Notes Computer
-
Contributors:Katsikas, Sokratis ( editor ) / Abie, Habtamu ( editor ) / Ranise, Silvio ( editor ) / Verderame, Luca ( editor ) / Cambiaso, Enrico ( editor ) / Ugarelli, Rita ( editor ) / Praça, Isabel ( editor ) / Li, Wenjuan ( editor ) / Meng, Weizhi ( editor ) / Furnell, Steven ( editor )
-
Conference:European Symposium on Research in Computer Security ; 2023 ; The Hague, The Netherlands
-
Published in:Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II ; Chapter: 7 ; 111-124Lecture Notes in Computer Science ; 14399 ; 111-124
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024-03-12
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An Opportunity-Based Approach to Information Security RiskTran, Dinh Uy / Selnes, Sigrid Haug / Jøsang, Audun / Hagen, Janne et al. | 2024
- 2
-
A Methodology for Cybersecurity Risk Assessment in Supply ChainsGokkaya, Betul / Aniello, Leonardo / Karafili, Erisa / Halak, Basel et al. | 2024
- 3
-
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical OperationsSaraiva, Guilherme / Apolinário, Filipe / Pardal, Miguel L. et al. | 2024
- 4
-
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization FrameworkDias, Tiago Fontes / Vitorino, João / Fonseca, Tiago / Praça, Isabel / Maia, Eva / Viamonte, Maria João et al. | 2024
- 5
-
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPTDaniel, Nir / Kaiser, Florian Klaus / Dzega, Anton / Elyashar, Aviad / Puzis, Rami et al. | 2024
- 6
-
User Behavior Analysis for Malware DetectionDumitrasc, Valentina / Serral-Gracià, René et al. | 2024
- 7
-
Balancing XAI with Privacy and Security ConsiderationsSpartalis, Christoforos N. / Semertzidis, Theodoros / Daras, Petros et al. | 2024
- 8
-
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack DetectionKalutharage, Chathuranga Sampath / Liu, Xiaodong / Chrysoulas, Christos / Bamgboye, Oluwaseun et al. | 2024
- 9
-
Digital Twins in Healthcare: Security, Privacy, Trust and Safety ChallengesJørgensen, Cecilie Solberg / Shukla, Ankur / Katt, Basel et al. | 2024
- 10
-
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous DrivingAbdelsalam, Mohamed / Greiner, Simon / Aktouf, Oum-El-Kheir / Mercier, Annabelle et al. | 2024
- 11
-
The VOCODES Kill Chain for Voice Controllable DevicesEsposito, Sergio / Sgandurra, Daniele / Bella, Giampaolo et al. | 2024
- 12
-
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer NetworkBull, Victoria / Finne, Niclas / Agiollo, Andrea / Kaliyar, Pallavi / Pajola, Luca / Voigt, Thiemo / Conti, Mauro et al. | 2024
- 13
-
Firmware-Based DoS Attacks in Wireless Sensor NetworkLau, Phi Tuong / Katzenbeisser, Stefan et al. | 2024
- 14
-
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client LifetimeCrescenzo, Giovanni Di / Khodjaeva, Matluba / Caro, Dilan D. Morales et al. | 2024
- 15
-
SigIL: A Signature-Based Approach of Malware Detection on Intermediate LanguageFortino, Giancarlo / Greco, Claudia / Guzzo, Antonella / Ianni, Michele et al. | 2024
- 16
-
Toward Next-Generation Cyber Range: A Comparative Study of Training PlatformsGrimaldi, Alexandre / Ribiollet, Julien / Nespoli, Pantaleone / Garcia-Alfaro, Joaquin et al. | 2024
- 17
-
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided FuzzingMaugeri, Marcello / Daniele, Cristian / Bella, Giampaolo et al. | 2024
- 18
-
Trust Assumptions in Voting SystemsKrips, Kristjan / Snetkov, Nikita / Vakarjuk, Jelizaveta / Willemson, Jan et al. | 2024
- 19
-
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-CycleKammüller, Florian et al. | 2024
- 20
-
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static AnalysisRajapaksha, Sampath / Senanayake, Janaka / Kalutarage, Harsha / Al-Kadri, Mhd Omar et al. | 2024
- 21
-
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86Zhou, Yuanding et al. | 2024
- 22
-
Execution at RISC: Stealth JOP Attacks on RISC-V ApplicationsBuckwell, Loïc / Gilles, Olivier / Pérez, Daniel Gracia / Kosmatov, Nikolai et al. | 2024
- 23
-
Modeling Obfuscation Stealth Through Code ComplexitySchrittwieser, Sebastian / Wimmer, Elisabeth / Mallinger, Kevin / Kochberger, Patrick / Lawitschka, Caroline / Raubitzek, Sebastian / Weippl, Edgar R. et al. | 2024
- 24
-
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal ApproachGiagkos, Dimitrios / Kompougias, Orestis / Litke, Antonis / Papadakis, Nikolaos et al. | 2024
- 25
-
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAISenanayake, Janaka / Kalutarage, Harsha / Petrovski, Andrei / Al-Kadri, Mhd Omar / Piras, Luca et al. | 2024
- 26
-
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScriptSigalov, Daniil / Gamayunov, Dennis et al. | 2024
- 27
-
The Nonce-nce of Web Security: An Investigation of CSP Nonces ReuseGolinelli, Matteo / Bonomi, Francesco / Crispo, Bruno et al. | 2024
- 28
-
Internet Transparency Through Multi-party ComputationMaćkowiak, Paweł / Kuipers, Fernando et al. | 2024
- 29
-
DNS Dependencies as an Expression of the Digital Divide: The Example of AustraliaNazemi, Niousha / Tavallaie, Omid / Zomaya, Albert Y. / Holz, Ralph et al. | 2024
- 30
-
Towards Security Transparency of Autonomous Systems on the InternetKhadka, Shyam Krishna / Holz, Ralph / Hesselman, Cristian et al. | 2024
- 31
-
Privacy-Preserving Object Recognition with Explainability in Smart SystemsAbbasi, Wisam / Mori, Paolo / Saracino, Andrea et al. | 2024
- 32
-
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference FrameworkLiu, Tzu-Li / Ku, Yu-Te / Ho, Ming-Chien / Liu, Feng-Hao / Chang, Ming-Ching / Hsu, Chih-Fan / Chen, Wei-Chao / Hung, Shih-Hao et al. | 2024
- 33
-
Pixels Who Violate Our Privacy! Deep Learning for Identifying Images’ Key PixelsVeenker, Carmen / Opdam, Danny / Alishahi, Mina et al. | 2024
- 34
-
Verifiable Fairness: Privacy–preserving Computation of Fairness for Machine Learning SystemsToreini, Ehsan / Mehrnezhad, Maryam / van Moorsel, Aad et al. | 2024
- 35
-
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel ScenariosJanisch, Jaromír / Pevný, Tomáš / Lisý, Viliam et al. | 2024
- 36
-
On the Use of AutoML for Combating Alert Fatigue in Security Operations CentersPreuveneers, Davy / Llamas, Javier Martínez / Bulut, Irfan / Rúa, Enrique Argones / Verfaillie, Pieter / Demortier, Vince / Surinx, Dimitri / Joosen, Wouter et al. | 2024
- 37
-
CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement LearningCheah, Madeline / Stone, Jack / Haubrick, Peter / Bailey, Samuel / Rimmer, David / Till, Demian / Lacey, Matt / Kruczynska, Jo / Dorn, Mark et al. | 2024
- 38
-
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network ModelsHector, Kevin / Moëllic, Pierre-Alain / Dutertre, Jean-Max / Dumont, Mathieu et al. | 2024
- 39
-
Can Inputs’ Reconstruction Information Be Coded into Machine Learning Model’s Outputs?Iwahana, Kazuki / Saisho, Osamu / Miura, Takayuki / Ito, Akira et al. | 2024
- 40
-
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized SmoothingGibert, Daniel / Zizzo, Giulio / Le, Quan et al. | 2024
- 41
-
Backdoor Attacks Leveraging Latent Representation in Competitive LearningIwahana, Kazuki / Yanai, Naoto / Fujiwara, Toru et al. | 2024
- 42
-
Simulating Deception for Web Applications Using Reinforcement LearningKvasov, Andrei / Sahin, Merve / Hebert, Cedric / De Oliveira, Anderson Santana et al. | 2024
- 43
-
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation EnvironmentsDrašar, Martin / Ruman, Ádám / Čeleda, Pavel / Yang, Shanchieh Jay et al. | 2024
- 44
-
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency TransformationPalihawadana, Chamath / Wiratunga, Nirmalie / Kalutarage, Harsha / Wijekoon, Anjana et al. | 2024
- 45
-
Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture ClusteringHong, Xin / Papazachos, Zafeirios / del Rincon, Jesus Martinez / Miller, Paul et al. | 2024