.- Attacks.
.- How to Design Honey Vault Schemes.
.- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time.
.- Improving Differential-Neural Cryptanalysis for Large-State SPECK.
.- Evasion attempt for the malicious PowerShell detector considering feature weights.
.- A Fast Framework for Efficiently Constructing Valuable Cubes.
.- A Survey on Acoustic Side Channel Attacks on Keyboards.
.- Trust.
.- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics.
.- DMA: Mutual Attestation Framework for Distributed Enclaves.
.- Cabin: Confining Untrusted Programs within Confidential VM.
.- Anomaly detection.
.- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering.
.- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection.
.- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection.
.- Privacy.
.- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource.
.- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption.
.- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems.
.- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments.