


default search action
ACM Transactions on Privacy and Security, Volume 28
Volume 28, Number 1, February 2025
- Blake Hayden

, Timothy Walsh
, Armon Barton
:
Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples. 1:1-1:23 - Huan Dai

, Yuefeng Chen
, Yicong Du
, Luping Wang
, Ziyu Shao
, Hongbo Liu
, Yanzhi Ren
, Jiadi Yu
, Bo Liu
:
ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis. 2:1-2:26 - Clara Bertolissi

, Maribel Fernández
, Bhavani Thuraisingham
:
Category-Based Administrative Access Control Policies. 3:1-3:35 - Pedram Hosseyni

, Ralf Küsters
, Tim Würtele
:
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process. 4:1-4:36 - Jason Crampton

, Eduard Eiben
, Gregory Z. Gutin
, Daniel Karapetyan
, Diptapriyo Majumdar
:
Bi-objective Optimization in Role Mining. 5:1-5:22 - Björn Bjurling

, Shahid Raza
:
Cyber Threat Intelligence meets the Analytic Tradecraft. 6:1-6:37 - Haibin Zheng

, Jinyin Chen
, Tao Liu
, Yao Cheng
, Zhao Wang
, Yun Wang
, Lan Gao
, Shouling Ji
, Xuhong Zhang
:
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy. 7:1-7:28 - Georgios Syros

, Gökberk Yar
, Simona Boboila
, Cristina Nita-Rotaru
, Alina Oprea
:
Backdoor Attacks in Peer-to-Peer Federated Learning. 8:1-8:28 - Yubing Bao

, Jianping Zeng
, Jirui Yang
, Ruining Yang
, Zhihui Lu
:
The Effect of Domain Terms on Password Security. 9:1-9:29 - Xuejing Yuan

, Jiangshan Zhang
, Kai Chen
, Cheng'an Wei
, Ruiyuan Li
, Zhenkun Ma
, Xinqi Ling
:
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems. 10:1-10:27 - Hieu Le

, Salma Elmalaki
, Athina Markopoulou
, Zubair Shafiq
:
AutoFR: Automated Filter Rule Generation for Adblocking. 11:1-11:36 - Alessandro N. Baccarini

, Marina Blanton
, Shaofeng Zou
:
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation. 12:1-12:36
Volume 28, Number 2, May 2025
- Antonio Ruggia

, Andrea Possemato
, Savino Dambra
, Alessio Merlo
, Simone Aonzo
, Davide Balzarotti
:
The Dark Side of Native Code on Android. 13:1-13:33 - Long Chen

, Ya-Nan Li
, Qiang Tang
, Moti Yung
:
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. 14:1-14:35 - Soumyadeep Hore

, Jalal Ghadermazi
, Diwas Paudel
, Ankit Shah
, Tapas K. Das
, Nathaniel D. Bastian
:
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation. 15:1-15:33 - Srivathsan G. Morkonda

, Sonia Chiasson
, Paul C. van Oorschot
:
"Sign in with ... Privacy": Timely Disclosure of Privacy Differences among Web SSO Login Options. 16:1-16:28 - Hamid Bostani

, Zhengyu Zhao
, Zhuoran Liu
, Veelasha Moonsamy
:
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection. 17:1-17:32 - Liang Wang

, Zhuangkun Wei
, Weisi Guo
:
Multi-agent Deep Reinforcement Learning-based Key Generation for Graph Layer Security. 18:1-18:18 - Yingkai Dong

, Li Wang
, Zheng Li
, Hao Li
, Peng Tang
, Chengyu Hu
, Shanqing Guo
:
Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module. 19:1-19:28 - Danushka Bollegala

, Shuichi Otake
, Tomoya Machide
, Ken-ichi Kawarabayashi
:
A Metric Differential Privacy Mechanism for Sentence Embeddings. 20:1-20:34 - Shuaijv Fang

, Zhiyong Zhang
, Bin Song
:
Deepfake Detection Model Combining Texture Differences and Frequency Domain Information. 21:1-21:16 - Jeyamohan Neera

, Xiaomin Chen
, Nauman Aslam
, Biju Issac
:
A Trustworthy and Untraceable Centralised Payment Protocol for Mobile Payment. 22:1-22:29 - Charalampos Katsis

, Elisa Bertino
:
ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined Networks. 23:1-23:35 - Naveen Karunanayake

, Bhanuka Silva
, Yasod Ginige
, Suranga Seneviratne
, Sanjay Chawla
:
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks. 24:1-24:30 - Sulthana Shams

, Douglas J. Leith
:
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders. 25:1-25:22 - Chunghyo Kim

, Juhwan Noh
, Esmaeil Ghahremani
, Yongdae Kim
:
Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids. 26:1-26:27 - Yuxin Yang

, Qiang Li
, Yuede Ji
, Binghui Wang
:
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning. 27:1-27:19
Volume 28, Number 3, August 2025
- Sami Ullah

, Awais Rashid
:
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis. 28:1-28:41 - Jean Mouchotte

, Maxence Delong
, Layth Sliman
:
Beyond the Screen: Exploring Privacy Boundaries through Automated User Profiling. 29:1-29:32 - Malek Al-Zewairi

, Sufyan Almajali
, Moussa Ayyash
, Mohamed Rahouti
, Fernando Martinez
, Nordine Quadar
:
Multi-Stage Enhanced Zero Trust Intrusion Detection System for Unknown Attack Detection in Internet of Things and Traditional Networks. 30:1-30:28 - Mohammad Ryiad Al-Eiadeh

, Mustafa Abdallah
:
CBDRA-IS: Centrality-Based Defense Resource Allocation for Securing Interdependent Systems. 31:1-31:44 - Oumaima Lifandali

, Zouhair Chiba
, Noreddine Abghour
, Khalid Moussaid
, Mounia Miyara
, Abdellah Ouaguid
:
Performance Enhancement of Intrusion Detection System in Cloud by Using Boruta Algorithm. 32:1-32:33 - Jerre Starink

, Marieke Huisman
, Andreas Peter
, Andrea Continella
:
Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware. 33:1-33:29 - Eric Spero

, Robert Biddle
:
Site Inspector: Improving Browser Communication of Website Security Information. 34:1-34:31 - Armon Barton

, Timothy Walsh
, Mohsen Imani
, Jiang Ming
, Matthew Wright
:
PredicTor: A Global, Machine Learning Approach to Tor Path Selection. 35:1-35:31 - Danushka Senarathna

, Spyros Tragoudas
, Jason Wibbenmeyer
, Nasser Khdeer
:
Time Series Analysis Neural Networks for Detecting False Data Injection Attacks of Different Rates on Power Grid State Estimation. 36:1-36:29 - Jinyin Chen

, Zhiqi Cao
, Xiaojuan Wang
, Haibin Zheng
, Zhaoyan Ming
, Yayu Zheng
:
FairQuanti: Enhancing Fairness in Deep Neural Network Quantization via Neuron Role Contribution. 37:1-37:28 - Noora Alsakar

, Norah Mohsen T. Alotaibi
, Mohamed Khamis
, Simone Stumpf
:
Assessing and Mitigating the Privacy Implications of Eye Tracking on Handheld Mobile Devices. 38:1-38:36 - Davide Davoli

, Martin Avanzini
, Tamara Rezk
:
Comprehensive Kernel Safety in the Spectre Era: Mitigations and Performance Evaluation. 39:1-39:39 - Mengdie Huang

, Yingjun Lin
, Xiaofeng Chen
, Elisa Bertino
:
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems. 40:1-40:33 - Evans Owusu

, Mohamed Rahouti
, Dinesh C. Verma
, Yufeng Xin
, D. Frank Hsu
, Christina Schweikert
:
Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis. 41:1-41:37

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














