Social Engineering Attacks in Industrial Internet of Things and Smart Industry: Detection and Prevention

MM Aslam, K Kalinaki, A Tufail… - Emerging Threats …, 2025 - Wiley Online Library
Technological progress has bridged the gap between humans and machines. However, this
rapid advancement has brought new challenges due to the rising wave of cyberattacks in …

The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

M Shariatnasab, F Shirani… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Dataset obfuscation refers to techniques in which random noise is added to the entries of a
given dataset, prior to its public release, to protect against leakage of private information. In …

Novel FDP mechanisms for releasing bipartite graph data on fixed and infinite intervals

Y Hou, J Fei, X **a, J Cui - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
As data collection increases, more and more sensitive data is being used to publish query
results. This creates a significant risk of privacy disclosure. As a mathematically provable …

Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks

M Shariatnasab, F Shirani… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
This work considers necessary conditions for privacy guarantees under active fingerprinting
attacks in power-law bipartite networks. The scenario arises naturally in social network …

[PDF][PDF] An Information Theoretic Perspective on Database and Graph Matching

E Erkip, P Lecture - nasit-2022.seas.ucla.edu
An Information Theoretic Perspective on Database and Graph Matching Page 1 An
Information Theoretic Perspective on Database and Graph Matching Elza Erkip Department …