default search action
ACM Transactions on Privacy and Security, Volume 27
Volume 27, Number 1, February 2024
- Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. 1:1-1:25 - Jenny Ottmann, Frank Breitinger, Felix C. Freiling:
An Experimental Assessment of Inconsistencies in Memory Forensics. 2:1-2:29 - Erik-Oliver Blass, Guevara Noubir:
Forward Security with Crash Recovery for Secure Logs. 3:1-3:28 - Han Cao, Qindong Sun, Yaqi Li, Rong Geng, Xiaoxiong Wang:
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain. 4:1-4:25 - Prakash Shrestha, Ahmed Tanvir Mahdad, Nitesh Saxena:
Sound-based Two-factor Authentication: Vulnerabilities and Redesign. 5:1-5:27 - Mayank Swarnkar, Neha Sharma:
OptiClass: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures. 6:1-6:23 - Yong Zeng, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma, Yao Liu:
Eyes See Hazy while Algorithms Recognize Who You Are. 7:1-7:23 - Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications. 8:1-8:37 - Li Tang, Qingqing Ye, Haibo Hu, Qiao Xue, Yaxin Xiao, Jin Li:
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection. 9:1-9:26 - Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo:
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. 10:1-10:34 - Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. 11:1-11:35 - Yan Qiao, Kui Wu, Majid Khabbazian:
Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network. 12:1-12:32 - Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, David Starobinski:
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs. 13:1-13:26
Volume 27, Number 2, May 2024
- Ghader Ebrahimpour, Mohammad Sayad Haghighi:
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions. 14 - Federico Concone, Salvatore Gaglio, Andrea Giammanco, Giuseppe Lo Re, Marco Morana:
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks. 15 - Florian Sommer, Mona Gierl, Reiner Kriesten, Frank Kargl, Eric Sax:
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats. 16 - Jiayi Chen, Urs Hengartner, Hassan Khan:
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android. 17 - Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter:
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain. 18 - Julen Bernabé-Rodríguez, Albert Garreta, Oscar Lage:
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation. 19 - Namgyu Park, Jong Kim:
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit. 20
Volume 27, Number 3, August 2024
- Rodolfo Vieira Valentim, Idilio Drago, Marco Mellia, Federico Cerutti:
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting. 21:1-21:27 - Safwa Ameer, Lopamudra Praharaj, Ravi Sandhu, Smriti Bhatt, Maanak Gupta:
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model. 22:1-22:36 - Abu Shohel Ahmed, Aleksi Peltonen, Mohit Sethi, Tuomas Aura:
Security Analysis of the Consumer Remote SIM Provisioning Protocol. 23:1-23:36 - Xinyu He, Fengrui Hao, Tianlong Gu, Liang Chang:
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models. 24:1-24:26 - Hasini Gunasinghe, Mikhail J. Atallah, Elisa Bertino:
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises. 25:1-25:31 - Weihan Ou, Steven H. H. Ding, Mohammad Zulkernine, Li Tao Li, Sarah Labrosse:
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning. 26:1-26:37
Volume 27, Number 4, November 2024
- Vipin N. Sathi, C. Siva Ram Murthy:
Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond. 27:1-27:29 - Haya Schulmann, Shujie Zhao:
ZPredict: ML-Based IPID Side-channel Measurements. 28:1-28:33 - Arish Sateesan, Jo Vliegen, Simon Scherrer, Hsu-Chun Hsiao, Adrian Perrig, Nele Mentens:
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements. 29:1-29:34 - Susil Kumar Mohanty, Somanath Tripathy:
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack. 30:1-30:26 - Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
Specifying and Verifying Information Flow Control in SELinux Configurations. 31:1-31:35 - Mukhtar Ahmed, Jinfu Chen, Ernest Akpaku, Rexford Nii Ayitey Sosu, Ajmal Latif:
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization. 32:1-32:36
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.