


default search action
ACM Transactions on Privacy and Security, Volume 28
Volume 28, Number 1, February 2025
- Blake Hayden

, Timothy Walsh
, Armon Barton
:
Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples. 1:1-1:23 - Huan Dai

, Yuefeng Chen
, Yicong Du
, Luping Wang
, Ziyu Shao
, Hongbo Liu
, Yanzhi Ren
, Jiadi Yu
, Bo Liu
:
ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis. 2:1-2:26 - Clara Bertolissi

, Maribel Fernández
, Bhavani Thuraisingham
:
Category-Based Administrative Access Control Policies. 3:1-3:35 - Pedram Hosseyni

, Ralf Küsters
, Tim Würtele
:
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process. 4:1-4:36 - Jason Crampton

, Eduard Eiben
, Gregory Z. Gutin
, Daniel Karapetyan
, Diptapriyo Majumdar
:
Bi-objective Optimization in Role Mining. 5:1-5:22 - Björn Bjurling

, Shahid Raza
:
Cyber Threat Intelligence meets the Analytic Tradecraft. 6:1-6:37 - Haibin Zheng

, Jinyin Chen
, Tao Liu
, Yao Cheng
, Zhao Wang
, Yun Wang
, Lan Gao
, Shouling Ji
, Xuhong Zhang
:
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy. 7:1-7:28 - Georgios Syros

, Gökberk Yar
, Simona Boboila
, Cristina Nita-Rotaru
, Alina Oprea
:
Backdoor Attacks in Peer-to-Peer Federated Learning. 8:1-8:28 - Yubing Bao

, Jianping Zeng
, Jirui Yang
, Ruining Yang
, Zhihui Lu
:
The Effect of Domain Terms on Password Security. 9:1-9:29 - Xuejing Yuan

, Jiangshan Zhang
, Kai Chen
, Cheng'an Wei
, Ruiyuan Li
, Zhenkun Ma
, Xinqi Ling
:
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems. 10:1-10:27 - Hieu Le

, Salma Elmalaki
, Athina Markopoulou
, Zubair Shafiq
:
AutoFR: Automated Filter Rule Generation for Adblocking. 11:1-11:36 - Alessandro N. Baccarini

, Marina Blanton
, Shaofeng Zou
:
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation. 12:1-12:36
Volume 28, Number 2, May 2025
- Antonio Ruggia

, Andrea Possemato
, Savino Dambra
, Alessio Merlo
, Simone Aonzo
, Davide Balzarotti
:
The Dark Side of Native Code on Android. 13:1-13:33 - Long Chen

, Ya-Nan Li
, Qiang Tang
, Moti Yung
:
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. 14:1-14:35 - Soumyadeep Hore

, Jalal Ghadermazi
, Diwas Paudel
, Ankit Shah
, Tapas K. Das
, Nathaniel D. Bastian
:
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation. 15:1-15:33 - Srivathsan G. Morkonda

, Sonia Chiasson
, Paul C. van Oorschot
:
"Sign in with ... Privacy": Timely Disclosure of Privacy Differences among Web SSO Login Options. 16:1-16:28 - Hamid Bostani

, Zhengyu Zhao
, Zhuoran Liu
, Veelasha Moonsamy
:
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection. 17:1-17:32 - Liang Wang

, Zhuangkun Wei
, Weisi Guo
:
Multi-agent Deep Reinforcement Learning-based Key Generation for Graph Layer Security. 18:1-18:18 - Yingkai Dong

, Li Wang
, Zheng Li
, Hao Li
, Peng Tang
, Chengyu Hu
, Shanqing Guo
:
Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module. 19:1-19:28 - Danushka Bollegala

, Shuichi Otake
, Tomoya Machide
, Ken-ichi Kawarabayashi
:
A Metric Differential Privacy Mechanism for Sentence Embeddings. 20:1-20:34 - Shuaijv Fang

, Zhiyong Zhang
, Bin Song
:
Deepfake Detection Model Combining Texture Differences and Frequency Domain Information. 21:1-21:16 - Jeyamohan Neera

, Xiaomin Chen
, Nauman Aslam
, Biju Issac
:
A Trustworthy and Untraceable Centralised Payment Protocol for Mobile Payment. 22:1-22:29 - Charalampos Katsis

, Elisa Bertino
:
ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined Networks. 23:1-23:35 - Naveen Karunanayake

, Bhanuka Silva
, Yasod Ginige
, Suranga Seneviratne
, Sanjay Chawla
:
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks. 24:1-24:30 - Sulthana Shams

, Douglas J. Leith
:
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders. 25:1-25:22 - Chunghyo Kim

, Juhwan Noh
, Esmaeil Ghahremani
, Yongdae Kim
:
Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids. 26:1-26:27 - Yuxin Yang

, Qiang Li
, Yuede Ji
, Binghui Wang
:
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning. 27:1-27:19
Volume 28, Number 3, August 2025
- Sami Ullah

, Awais Rashid
:
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis. 28:1-28:41 - Jean Mouchotte

, Maxence Delong
, Layth Sliman
:
Beyond the Screen: Exploring Privacy Boundaries through Automated User Profiling. 29:1-29:32 - Malek Al-Zewairi

, Sufyan Almajali
, Moussa Ayyash
, Mohamed Rahouti
, Fernando Martinez
, Nordine Quadar
:
Multi-Stage Enhanced Zero Trust Intrusion Detection System for Unknown Attack Detection in Internet of Things and Traditional Networks. 30:1-30:28 - Mohammad Ryiad Al-Eiadeh

, Mustafa Abdallah
:
CBDRA-IS: Centrality-Based Defense Resource Allocation for Securing Interdependent Systems. 31:1-31:44 - Oumaima Lifandali

, Zouhair Chiba
, Noreddine Abghour
, Khalid Moussaid
, Mounia Miyara
, Abdellah Ouaguid
:
Performance Enhancement of Intrusion Detection System in Cloud by Using Boruta Algorithm. 32:1-32:33 - Jerre Starink

, Marieke Huisman
, Andreas Peter
, Andrea Continella
:
Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware. 33:1-33:29 - Eric Spero

, Robert Biddle
:
Site Inspector: Improving Browser Communication of Website Security Information. 34:1-34:31 - Armon Barton

, Timothy Walsh
, Mohsen Imani
, Jiang Ming
, Matthew Wright
:
PredicTor: A Global, Machine Learning Approach to Tor Path Selection. 35:1-35:31 - Danushka Senarathna

, Spyros Tragoudas
, Jason Wibbenmeyer
, Nasser Khdeer
:
Time Series Analysis Neural Networks for Detecting False Data Injection Attacks of Different Rates on Power Grid State Estimation. 36:1-36:29 - Jinyin Chen

, Zhiqi Cao
, Xiaojuan Wang
, Haibin Zheng
, Zhaoyan Ming
, Yayu Zheng
:
FairQuanti: Enhancing Fairness in Deep Neural Network Quantization via Neuron Role Contribution. 37:1-37:28 - Noora Alsakar

, Norah Mohsen T. Alotaibi
, Mohamed Khamis
, Simone Stumpf
:
Assessing and Mitigating the Privacy Implications of Eye Tracking on Handheld Mobile Devices. 38:1-38:36 - Davide Davoli

, Martin Avanzini
, Tamara Rezk
:
Comprehensive Kernel Safety in the Spectre Era: Mitigations and Performance Evaluation. 39:1-39:39 - Mengdie Huang

, Yingjun Lin
, Xiaofeng Chen
, Elisa Bertino
:
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems. 40:1-40:33 - Evans Owusu

, Mohamed Rahouti
, Dinesh C. Verma
, Yufeng Xin
, D. Frank Hsu
, Christina Schweikert
:
Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis. 41:1-41:37
Volume 28, Number 4, November 2025
- Jacopo Cortellazzi

, Erwin Quiring
, Daniel Arp
, Feargus Pendlebury
, Fabio Pierazzi
, Lorenzo Cavallaro
:
Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]. 42:1-42:37 - Daniel Cabarcas Jaramillo

, Hernán Darío Vanegas Madrigal
, Daniel Escudero
, Fernando Alberto Morales Jauregui
:
Privacy-Preserving Training of Support Vector Machines via Secure Multiparty Computation. 43:1-43:27 - Gabriele Digregorio, Edoardo Saputelli, Stefano Longari, Michele Carminati

, Stefano Zanero:
Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol. 44:1-44:35 - Ernest Akpaku

, Jinfu Chen
, Mukhtar Ahmed
, Francis Kwadzo Agbenyegah
, Joshua Ofoeda
:
MGAN: A Multi-view Graph Adaptive Network for Robust Malicious Traffic Detection. 45:1-45:35 - Santiago Cuéllar, Bill Harris

, James Parker
, Stuart Pernsteiner
, Ian Sweet
, Eran Tromer
:
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. 46:1-46:35 - Aodi Hu

, Zhiyong Zhang
, Gaoyuan Quan
, Xinxin Yue
:
IDPA: Indiscriminate Data Poisoning Attacks Targeting Pre-trained Encoder Based on Contrastive Learning. 47:1-47:22 - Akshaya Suresh

, Arun Cyril Jose
:
Adaptive Network Intrusion Detection Using Reinforcement Learning with Proximal Policy Optimization. 48:1-48:24 - Yue Zhang

, Zhiqiang Lin
:
Breaking BLE MAC Address Randomization with Allowlist-Based Side Channels and its Countermeasure. 49:1-49:33 - Ziyuan Huang

, Gergely Biczók
, Mingyan Liu
:
Incentivizing Secure Software Development: The Role of Voluntary Audit and Liability Waiver. 50:1-50:30 - Lorenzo Dall'Aglio

, Lorenzo Binosi
, Michele Carminati
, Stefano Zanero
, Mario Polino
:
Highliner: Enhancing Binary Analysis through NLP-Based Instruction-Level Detection of C++ Inline Functions. 51:1-51:22 - Yulong Wang

, Jiaxuan Song
, Tianxiang Li
, Yuan Xin
, Hong Li
, Ni Wei
:
Rectifying Multi-Attack Adversarial Perturbations in Deep Neural Network based Image Classifier. 52:1-52:28 - Jingjing Zheng

, Kai Li
, Xin Yuan
, Wei Ni
, Eduardo Tovar
, Özgür B. Akan:
GradCAM-AE: A New Shield Defense against Poisoning Attacks on Federated Learning. 53:1-53:23 - Roelien C. Timmer

, David Liebowitz
, Surya Nepal
, Salil S. Kanhere
:
Evaluating Honeyfile Realism and Enticement Metrics. 54:1-54:34 - Zhiwei Fu

, Leo Song
, Steven H. H. Ding, Furkan Alaca
, Sudipta Acharya
:
Toward a Robust Detection of PowerShell Malware against Code Mixing and Obfuscation by Using Sentence Transformer and Similarity Learning. 55:1-55:23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














