


default search action
25th WISE 2024: Doha, Qatar - Part V
- Mahmoud Barhamgi

, Hua Wang
, Xin Wang
:
Web Information Systems Engineering - WISE 2024 - 25th International Conference, Doha, Qatar, December 2-5, 2024, Proceedings, Part V. Lecture Notes in Computer Science 15440, Springer 2025, ISBN 978-981-96-0575-0
Security, Privacy and Trust
- Xuyang Liu

, Rong Zhao
, Bingwen Feng
, Jilian Zhang
:
Privacy-Preserving k-core Decomposition for Graphs. 3-18 - Daniil Fedotov

, Jaroslav Kuchar, Tomas Vitvar:
Anomaly Detection in Log Streams Based on Time-Contextual Models. 19-29 - Guolou Ping:

Enhancing Open-Set Recognition with Global Feature Representation. 30-45 - Samsad Jahan, Yong-Feng Ge, Hua Wang, Md. Enamul Kabir:

Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data Publishing. 46-57 - Yinhao Jiang

, Michael Bewong
, Arash Mahboubi
, Sajal Halder
, Md. Rafiqul Islam
, Md Zahidul Islam
, Ryan H. L. Ip
, Praveen Gauravaram, Jason Xue:
A Graph-Based Approach for Software Functionality Classification on the Web. 58-73 - Gnanakumar Thedchanamoorthy

, Michael Bewong
, Meisam Mohammady
, Tanveer A. Zia
, Md Zahidul Islam
:
FUD-LDP: Fully User Driven Local Differential Privacy. 74-83 - Taslima Khanam, Siuly Siuly, Kate N. Wang, Zhonglong Zheng:

A Privacy-Preserving Encryption Framework for Big Data Analysis. 84-94 - Yanni Han, Zhuoqun Li, Jian Zhang, Zhen Wu, Ying Ding:

Location Nearest Neighbor Query Scheme in Edge Computing Based on Differential Privacy. 95-106 - Matilde Tullii, Solenne Gaucher, Hugo Richard, Eustache Diemert, Vianney Perchet, Alain Rakotomamonjy, Clément Calauzènes, Maxime Vono:

Open Research Challenges for Private Advertising Systems Under Local Differential Privacy. 107-122 - Mohammed Alkinoon, Hattan Althebeiti, Ali Alkinoon, Manar Mohaisen

, Saeed Salem, David Mohaisen:
Industry-Specific Vulnerability Assessment. 123-139 - Wei Shen, Qian Zhou

, Jiayang Wu
:
Blockchain-Driven Medical Data Shamir Threshold Encryption with Attribute-Based Access Control Scheme. 140-150 - Riham Badra

, Layth Sliman
, Amine Dhraief
:
Smart Contracts Vulnerability Detection Using Transformers. 151-165 - Zhiqi Li

, Weidong Fang
, Wuxiong Zhang
:
Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo Platform. 166-176 - Muhammad Ikram

, I Wayan Budi Sentana
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Michal Kepkowski:
More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps. 177-192 - Thomas Lebrun

, Louis Béziaud
, Tristan Allard
, Antoine Boutet
, Sébastien Gambs
, Mohamed Maouche
:
Synthetic Data: Generate Avatar Data on Demand. 193-203 - Arash Mahboubi

, Hang Thanh Bui
, Hamed Aboutorab
, Khanh Luong
, Seyit Camtepe
, Keyvan Ansari
:
A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks. 204-215 - Rouaa Naim, Hams Gelban, Ahmed Badawy:

Detection and Mitigation of Backdoor Attacks on x-Apps. 216-230 - Sara Taki, Adrien Boiret, Cédric Eichler, Benjamin Nguyen:

Cohesive Database Neighborhoods for Differential Privacy: Mapping Relational Databases to RDF. 231-242 - Alexia Dini Kounoudes

, Georgia M. Kapitsaki
, Ioannis Katakis
:
i-Right: Identifying and Classifying GDPR User Rights in Fitness Tracker and Smart Home Privacy Policies. 243-254 - Pritam Deka, Sampath Rajapaksha, Ruby Rani

, Amirah Almutairi
, Erisa Karafili
:
AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset. 255-270 - Tamer Ahmed Eltaras

, Qutaibah M. Malluhi
, Alessandro Savino
, Stefano Di Carlo
, Adnan Qayyum:
R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients. 271-285 - Farouk Damoun

, Hamida Seba
, Radu State
:
Privacy-Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card Transactions. 286-301
Online Safety and Wellbeing Through AI
- Weiqiang Jin

, Ningwei Wang, Tao Tao, Mengying Jiang, Xiaotian Wang, Biao Zhao, Hao Wu, Haibin Duan, Guang Yang:
DisCo-FEND: Social Context Veracity Dissemination Consistency-Guided Case Reasoning for Few-Shot Fake News Detection. 305-319 - Mengting Song

, Ziyuan Li, Kai Liu, Min Peng, Gang Tian:
NLWM: A Robust, Efficient and High-Quality Watermark for Large Language Models. 320-335 - Larry Huynh

, Andrew Gansemer, Hyoungshick Kim
, Jin B. Hong
:
Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets. 336-351 - Larry Huynh

, Jesse Kilcullen, Jin B. Hong
:
Rumor Alteration for Improving Rumor Generation. 352-362 - Ananya Balaji

, Lea Duesterwald
, Ian Yang
, Aman Priyanshu
, Costanza Alfieri
, Norman M. Sadeh
:
Generating Effective Answers to People's Everyday Cybersecurity Questions: An Initial Study. 363-379 - Firoj Alam

, Md. Rafiul Biswas
, Uzair Shah
, Wajdi Zaghouani
, Georgios Mikros
:
Propaganda to Hate: A Multimodal Analysis of Arabic Memes with Multi-agent LLMs. 380-390 - Surendrabikram Thapa

, Kritesh Rauniyar, Hariram Veeramani, Aditya Shah, Imran Razzak, Usman Naseem
:
Did You Tell a Deadly Lie? Evaluating Large Language Models for Health Misinformation Identification. 391-405 - Mohamed Bayan Kmainasi

, Rakif Khan
, Ali Ezzat Shahroor
, Boushra Bendou
, Maram Hasanain
, Firoj Alam
:
Native vs Non-native Language Prompting: A Comparative Analysis. 406-420 - Ademola Adesokan

, Haiwei Hu
, Sanjay Madria
:
DisFact: Fact-Checking Disaster Claims. 421-437
Web Technologies
- Ralph Bou Nader, Ikram Garfatta

, Marwa Elleuch, Walid Gaaloul, Yehia Taher:
Multi-perspective Conformance Checking for Email-Driven Processes. 441-457 - Fernando Miguel Carvalho

:
Progressive Server-Side Rendering with Suspendable Web Templates. 458-473 - Xingchuang Liao, Wenjun Wu, Xiaoming Yu, Xin Ji, Yiting Chen, Junting Li:

HMSC-LLMs: A Hierarchical Multi-agent Service Composition Method Based on Large Language Models. 474-484 - Noah Kader

, Inwon Kang
, Oshani Seneviratne
:
Enhancing Web Spam Detection Through a Blockchain-Enabled Crowdsourcing Mechanism. 485-499 - Sebastian Heil

, Lucas Schröder
, Martin Gaedke
:
WNSWE: Web-Based Network Simulator for Web Engineering Education. 500-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














