![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
ACM Transactions on Privacy and Security, Volume 26
Volume 26, Number 1, February 2023
- Xueru Zhang
, Mohammad Mahdi Khalili
, Mingyan Liu
:
Differentially Private Real-Time Release of Sequential Data. 1:1-1:29 - Christoph Hagen, Christian Weinert
, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. 2:1-2:44 - Shaharyar Khan
, Ilya Kabanov
, Yunke Hua
, Stuart E. Madnick
:
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. 3:1-3:29 - Ruggero Lanotte
, Massimo Merro
, Andrei Munteanu
:
Industrial Control Systems Security via Runtime Enforcement. 4:1-4:41 - Kopo Marvin Ramokapane
, Jose M. Such
, Awais Rashid
:
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study. 5:1-5:34 - Stephan Wiefling
, Paul René Jørgensen
, Sigurd Thunem
, Luigi Lo Iacono
:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. 6:1-6:36 - Huanran Wang
, Wu Yang
, Wei Wang
, Dapeng Man
, Jiguang Lv
:
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks. 7:1-7:32 - James Lembke
, Srivatsan Ravi
, Pierre-Louis Roman
, Patrick Eugster
:
Secure and Reliable Network Updates. 8:1-8:41 - Euijin Choo
, Mohamed Nabeel
, Mashael AlSabah
, Issa Khalil
, Ting Yu
, Wei Wang
:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. 9:1-9:32 - Gonzalo Gil
, Aitor Arnaiz
, Marivi Higuero
, Francisco Javier Díez
:
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions. 10:1-10:28
Volume 26, Number 2, May 2023
- Lesly-Ann Daniel
, Sébastien Bardin
, Tamara Rezk
:
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure. 11:1-11:42 - Norah Mohsen T. Alotaibi
, John Williamson
, Mohamed Khamis
:
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards. 12:1-12:24 - David Barrera
, Christopher Bellman
, Paul C. van Oorschot
:
Security Best Practices: A Critical Analysis Using IoT as a Case Study. 13:1-13:30 - Rodrigo Otoni
, Matteo Marescotti
, Leonardo Alt
, Patrick Eugster
, Antti E. J. Hyvärinen, Natasha Sharygina
:
A Solicitous Approach to Smart Contract Verification. 15:1-15:28 - Savino Dambra, Leyla Bilge, Davide Balzarotti:
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. 16:1-16:30 - Farzana Ahamed Bhuiyan
, Akond Rahman
:
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. 17:1-17:24 - Giorgio Di Tizio
, Patrick Speicher
, Milivoj Simeonovski
, Michael Backes
, Ben Stock
, Robert Künnemann
:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. 18:1-18:36 - Ranya Aloufi
, Hamed Haddadi
, David Boyle
:
Paralinguistic Privacy Protection at the Edge. 19:1-19:27 - Viktor Engström
, Pontus Johnson
, Robert Lagerström
, Erik Ringdahl
, Max Wällstedt
:
Automated Security Assessments of Amazon Web Services Environments. 20:1-20:31 - Sohail Habib
, Hassan Khan
, Andrew Hamilton-Wright
, Urs Hengartner
:
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks. 21:1-21:30 - Ahmed Amro
, Vasileios Gkioulos
, Sokratis K. Katsikas
:
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework. 22:1-22:33
Volume 26, Number 3, August 2023
- Seoyeon Hwang
, Ercan Ozturk
, Gene Tsudik
:
Balancing Security and Privacy in Genomic Range Queries. 23:1-23:28 - Sijie Zhuo
, Robert Biddle
, Yun Sing Koh
, Danielle M. Lottridge
, Giovanni Russello
:
SoK: Human-centered Phishing Susceptibility. 24:1-24:27 - Andreas V. Hess
, Sebastian Alexander Mödersheim
, Achim D. Brucker
:
Stateful Protocol Composition in Isabelle/HOL. 25:1-25:36 - Patricia Arias Cabarcos
, Matin Fallahi
, Thilo Habrich
, Karen Schulze
, Christian Becker
, Thorsten Strufe
:
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices. 26:1-26:36 - Nada Lachtar
, Duha Ibdah
, Hamza Khan
, Anys Bacha
:
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. 27:1-27:30 - Litao Li
, Steven H. H. Ding
, Yuan Tian
, Benjamin C. M. Fung
, Philippe Charland
, Weihan Ou
, Leo Song
, Congwei Chen
:
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution. 28:1-28:25 - Sona Alex
, Dhanaraj K. J.
, Deepthi P. P.
:
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network. 29:1-29:27 - Hazel Murray
, David Malone
:
Costs and Benefits of Authentication Advice. 30:1-30:35 - Tom Bolton
, Tooska Dargahi
, Sana Belguith
, Carsten Maple
:
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. 31:1-31:29 - Isabel Wagner
:
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021. 32:1-32:32 - Yang Lu
, Zhengxin Yu
, Neeraj Suri
:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. 33:1-33:39 - Jian Hou
, Jing Wang
, Mingyue Zhang
, Zhi Jin
, Chunlin Wei
, Zuohua Ding
:
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure. 34:1-34:22 - Isaiah J. King
, H. Howie Huang
:
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction. 35:1-35:36 - Anushka Vidanage
, Peter Christen
, Thilina Ranbaduge
, Rainer Schnell
:
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage. 36:1-36:31 - Chun Guo
, Xiao Wang
, Xiang Xie
, Yu Yu
:
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets. 37:1-37:38 - Dmitrii Usynin
, Daniel Rueckert
, Georgios Kaissis
:
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks. 38:1-38:30 - Gianluca Scopelliti
, Sepideh Pouyanrad
, Job Noorman
, Fritz Alder
, Christoph Baumann
, Frank Piessens
, Jan Tobias Mühlberg
:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. 39:1-39:46 - Ranwa Al Mallah
, Talal Halabi
, Bilal Farooq
:
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems. 40:1-40:27 - Manuel Barbosa
, Gilles Barthe
, Benjamin Grégoire
, Adrien Koutsos
, Pierre-Yves Strub
:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 41:1-41:34 - Rajagopal Venkatesaramani
, Zhiyu Wan
, Bradley A. Malin
, Yevgeniy Vorobeychik
:
Defending Against Membership Inference Attacks on Beacon Services. 42:1-42:32
Volume 26, Number 4, November 2023
- Xueluan Gong
, Yanjiao Chen
, Wenbin Yang
, Huayang Huang
, Qian Wang
:
B3: Backdoor Attacks against Black-box Machine Learning Models. 43:1-43:24 - Jinfu Chen
, Luo Song
, Saihua Cai
, Haodi Xie
, Shang Yin
, Bilal Ahmad
:
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. 44:1-44:21 - Tommaso Paladini
, Francesco Monti
, Mario Polino
, Michele Carminati
, Stefano Zanero
:
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies. 45:1-45:35 - Dohyun Kim
, ManGi Cho
, Hocheol Shin
, Jaehoon Kim
, Juhwan Noh
, Yongdae Kim
:
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting. 46:1-46:30 - Shahnewaz Karim Sakib
, George T. Amariucai
, Yong Guan
:
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism. 47:1-47:31 - Maksim Ekin Eren
, Manish Bhattarai
, Robert J. Joyce
, Edward Raff
, Charles Nicholas
, Boian S. Alexandrov
:
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. 48:1-48:27 - Chenhan Zhang
, Shiyao Zhang
, James J. Q. Yu
, Shui Yu
:
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks. 49:1-49:19 - Ayoosh Bansal
, Anant Kandikuppa
, Monowar Hasan
, Chien-Ying Chen
, Adam Bates
, Sibin Mohan
:
System Auditing for Real-Time Systems. 50:1-50:37 - Md Sajidul Islam Sajid
, Jinpeng Wei
, Ehab Al-Shaer
, Qi Duan
, Basel Abdeen
, Latifur Khan
:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. 51:1-51:36
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.