


default search action
18th PST 2021: Auckland, New Zealand
- 18th International Conference on Privacy, Security and Trust, PST 2021, Auckland, New Zealand, December 13-15, 2021. IEEE 2021, ISBN 978-1-6654-0184-5
- Matthew Rafuse, Urs Hengartner:
PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication. 1-10 - Guiwen Luo, Shihui Fu, Guang Gong:
Updatable Linear Map Commitments and Their Applications in Elementary Databases. 1-6 - Martha N. Kamkuemah
:
Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN. 1-7 - Randolph Loh, Vrizlynn L. L. Thing:
Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation Framework. 1-5 - K. N. Pavan Kumar, Marina L. Gavrilova:
User Identification in Online Social Networks using Graph Transformer Networks. 1-10 - Yiran Li, Guiqiang Hu, Xiaoyuan Liu, Zuobin Ying:
Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack. 1-5 - Michele Fontana, Francesca Naretto, Anna Monreale:
A new approach for cross-silo federated learning and its privacy risks. 1-10 - Abdarahmane Wone, Joël Di Manno, Christophe Charrier, Christophe Rosenberger
:
Impact Of Environmental Conditions On Fingerprint Systems Performance. 1-5 - Arthur Drichel, Mehdi Akbari Gurabi
, Tim Amelung, Ulrike Meyer:
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection. 1-10 - Xubin Jiao, Jinguo Li:
An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism. 1-6 - Srinidhi Madabhushi, Rinku Dewri:
Detection of Demand Manipulation Attacks on a Power Grid. 1-7 - Tasnia Heya Ashrafi, Abdul Serwadda, Isaac Griswold-Steiner, Richard Matovu:
A Wearables-Driven Attack on Examination Proctoring. 1-7 - Troya Çagil Köylü, Cezar Rodolfo Wedig Reinbrecht
, Said Hamdioui, Mottaqiallah Taouil:
Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks. 1-10 - Mansour Aldawood, Arshad Jhumka:
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments. 1-7 - Andrick Adhikari, Rinku Dewri:
Towards Change Detection in Privacy Policies with Natural Language Processing. 1-10 - Lav Gupta:
Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks. 1-8 - Miao He, Xiangman Li, Jianbing Ni, Haomiao Yang:
Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks. 1-10 - Wensheng Zhang, Trent Muhr:
TEE-based Selective Testing of Local Workers in Federated Learning Systems. 1-6 - Jonathan Godin, Philippe Lamontagne:
Deletion-Compliance in the Absence of Privacy. 1-10 - Ganyu Wang
, Miguel Vargas Martin:
SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion. 1-12 - Sanaz Nakhodchi, Behrouz Zolfaghari
, Abbas Yazdinejad, Ali Dehghantanha:
SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning. 1-8 - Noreddine Belhadj Cheikh, Abdessamad Imine, Michaël Rusinowitch:
FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media. 1-10 - Atthapan Daramas, Vimal Kumar:
Searching on Non-Systematic Erasure Codes. 1-8 - Steffen Enders, Mariia Rybalka, Elmar Padilla:
PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms. 1-7 - Farzana Zahid, Matthew M. Y. Kuo, Roopak Sinha:
Light-Weight Active Security for Detecting DDoS Attacks in Containerised ICPS. 1-5 - Kathrin Garb
, Johannes Obermaier
, Elischa Ferres, Martin Künig:
FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor. 1-12 - Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Dazed and Confused: What's Wrong with Crypto Libraries? 1-6 - Adrian Wood
, Michael N. Johnstone:
Detection of Induced False Negatives in Malware Samples. 1-6 - Jukka Ruohonen
, Kalle Hjerppe
, Kalle Rindell:
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI. 1-10 - Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota, Takamasa Isohara:
Designing Personalized OS Update Message based on Security Behavior Stage Model. 1-9 - Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice. 1-7 - Farzaneh Shoeleh, Masoud Erfani, Saeed Shafiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari
, Adam Frank, Ali A. Ghorbani:
User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security. 1-10 - Florian Skopik
, Maria Leitner
:
Preparing for National Cyber Crises Using Non-linear Cyber Exercises. 1-5 - Kaja Schmidt
, Alexander Mühle, Andreas Grüner, Christoph Meinel:
Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. 1-7 - Christopher Bonk, Zach Parish, Julie Thorpe, Amirali Salehi-Abari:
Long Passphrases: Potentials and Limits. 1-7 - René Helmke, Eugen Winter, Michael Rademacher
:
EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework. 1-7 - Fuyuan Song, Zheng Qin, Jinwen Liang
, Pulei Xiong, Xiaodong Lin:
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing. 1-9 - Andrés Rainiero Hernández Coronado, Wonjun Lee, Wei-Ming Lin:
The Race-Timing Prototype. 1-10 - Nikesh Lalchandani, Frank Jiang, Jongkil Jay Jeong
, Yevhen Zolotavkin, Robin Doss:
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials. 1-7 - Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi:
IoT Malware Detection Using Function-Call-Graph Embedding. 1-9 - Ehsan Nazari, Paula Branco, Guy-Vincent Jourdan:
Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems. 1-10 - Christian Roth, Ngoc-Thanh Dinh, Marc Roßberger, Dogan Kesdogan:
DaRoute: Inferring trajectories from zero-permission smartphone sensors. 1-10 - Fok Kar Wai, Vrizlynn L. L. Thing:
Clustering based opcode graph generation for malware variant detection. 1-11 - May Almousa
, Sai Basavaraju, Mohd Anwar:
API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models. 1-7 - Mini Thomas, Reza Samavi, Thomas E. Doyle:
Trust Quantification for Autonomous Medical Advisory Systems. 1-7 - Xinyuan Wang:
Practical Protection of Binary Applications via Transparent Immunization. 1-7 - Wei-Yang Chiu
, Weizhi Meng
, Wenjuan Li:
LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. 1-9 - Rahul Dubey, Miguel Vargas Martin:
Fool Me Once: A Study of Password Selection Evolution over the Past Decade. 1-7 - Kimberly García
, Zaira Zihlmann, Simon Mayer, Aurelia Tamò-Larrieux
, Johannes Hooss:
Towards Privacy-Friendly Smart Products. 1-7 - Wensheng Zhang:
A Practical Oblivious Cloud Storage System based on TEE and Client Gateway. 1-6 - Martin Kodys, Zhi Lu, Fok Kar Wai, Vrizlynn L. L. Thing:
Intrusion Detection in Internet of Things using Convolutional Neural Networks. 1-10 - Jiacheng Jin, Yandong Zheng, Pulei Xiong:
EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences. 1-10 - Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha:
Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems. 1-6 - Sharmin Afrose, Danfeng Daphne Yao, Olivera Kotevska:
Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data. 1-10 - Mordechai Guri:
GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication. 1-10 - Yixuan Ren, Yixin Jie, Qingtao Wang, Bingbing Zhang, Chi Zhang, Lingbo Wei:
A Hybrid Secure Computation Framework for Graph Neural Networks. 1-6 - Mohammad Mehdi Yadollahi, Arash Habibi Lashkari
, Ali A. Ghorbani:
Towards Query-efficient Black-box Adversarial Attack on Text Classification Models. 1-7 - Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari
:
A Novel Trust Model In Detecting Final-Phase Attacks in Substations. 1-11 - Pranav Kotak, Shweta Bhandari, Akka Zemmari, Jaykrishna Joshi:
Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions. 1-5 - Shu Hong, Lingjie Duan
, Jianwei Huang:
Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic Approach. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.