.- Security, Privacy and Trust.
.- Privacy-Preserving k-core Decomposition For Graphs.
.- Anomaly Detection in Log Streams based on Time-Contextual Models.
.- Enhancing Open-Set Recognition with Global Feature Representation.
.- Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data Publishing.
.- A Graph-Based Approach for Software Functionality Classification on the Web.
.- FUD-LDP: Fully User Driven Local Differential Privacy.
.- A Privacy-Preserving Encryption framework for Big data analysis.
.- Location nearest neighbor query scheme in edge computing based on differential privacy.
.- Open Research Challenges for Private Advertising Systems under Local Differential Privacy.
.- Industry-Specific Vulnerability Assessment.
.- Blockchain-Driven Medical Data Shamir Threshold Encryption with Attribute-Based Access Control Scheme.
.- Smart Contracts Vulnerability Detection Using Transformers.
.- Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo Platform.
.- More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps.
.- Synthetic Data Generation: Limits and Improvement of Avatar Data.
.- A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks.
.- Detection and Mitigation of Backdoor Attacks on x-Apps.
.- Cohesive database neighborhoods for differential privacy: mapping relational databases to RDF.
.- i-Right: Identifying and classifying GDPR user rights in fitness tracker and smart home privacy policie.
.- AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset.
.- R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients.
.- Privacy Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card Transactions.
.- Online Safety and Wellbeing through AI.
.- DisCo-FEND: Social Context Veracity Dissemination Consistency-Guided Case Reasoning for Few-Shot Fake News Detection.
.- NLWM: a Robust, Efficient and High-quality Watermark for Large Language Models.
.- Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets.
.- Rumor Alteration for Improving Rumor Generation.
.- Generating Effective Answers to People’s Everyday Cybersecurity Questions: An Initial Study.
.- Propaganda to Hate: A Multimodal Analysis of Arabic Memes with Multi-Agent LLMs.
.- Did You Tell a Deadly Lie? Evaluating Large Language Models for Health Misinformation Identification.
.- Native vs Non-Native Language Prompting: A Comparative Analysis.
.- DisFact: Fact-Checking Disaster Claims.
.- Web Technologies.
.- Multi-Perspective Conformance Checking For Email-driven Processes.
.- Progressive Server-Side Rendering with Suspendable Web Templates.
.- HMSC-LLMs: A Hierarchical Multi-Agent Service Composition Method Based on Large Language Models.
.- Enhancing Web Spam Detection through a Blockchain-Enabled Crowdsourcing Mechanism.
.- WNSWE: Web-based Network Simulator for Web Engineering Education.