![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
21st PST 2024: Sydney, Australia
- 21st Annual International Conference on Privacy, Security and Trust, PST 2024, Sydney, Australia, August 28-30, 2024. IEEE 2024, ISBN 979-8-3503-6709-6
- Masaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai, Kan Yasuda:
Pk-Anonymization Meets Differential Privacy. 1-11 - Qi Li, Xiaodong Lin:
Proactive Audio Authentication Using Speaker Identity Watermarking. 1-10 - Mahmuda Akter
, Nour Moustafa
, Benjamin P. Turnbull
:
PEL: Privacy Embedded Learning in Smart Healthcare Systems. 1-10 - Juliet Samandari, Clémentine Gritti:
Post-Quantum Authentication and Integrity in 3-Layer IoT Architectures. 1-11 - Sandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler, Daniela Schneider:
DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials. 1-11 - Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa:
Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives. 1-9 - João Pedro Alonso Almeida, Gowri Sankar Ramachandran, Paul Ashley, Raja Jurdak, Steven McCown, Jó Ueyama:
Towards a Portability Scheme for Decentralized Identifiers in Self-Sovereign Identities. 1-4 - Jinglin Sun, Basem Suleiman, Imdad Ullah:
Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark Analysis. 1-8 - Huong Nguyen, Tri Hong Nguyen, Lauri Lovén, Susanna Pirttikangas:
Stake-Driven Rewards and Log-Based Free Rider Detection in Federated Learning. 1-10 - Jason Ford, Caleb House:
Outsourcing vs Insourcing Offensive Security Operations. 1-4 - Zehui Tang, Shengke Zeng, Song Han, Qi Yu, Shihai Jiang, Peng Chen:
DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments. 1-11 - Rishabh Kumar, Rohit Gupta, Sutapa Mondal, Mangesh S. Gharote, Praveen Gauravaram, Sachin Lodha:
Privacy Preservation in Service Operations by Minimizing Sensitive Data Exposure. 1-5 - Huanyi Ye, Ziyao Liu, Yu Jiang, Jiale Guo, Kwok-Yan Lam:
Malicious Unlearning in Ensemble Models. 1-6 - Guibin Zhao, Pengfei Li, Zhibo Zhang, Fusen Guo, Xueting Huang, Wei Xu, Jinyin Wang, Jianlong Chen:
Towards SAR Automatic Target Recognition: Multi-Category SAR Image Classification Based on Light Weight Vision Transformer. 1-6 - Anuradha Mandal
, Nitesh Saxena
:
Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body Postures. 1-12 - Mohammed El Amin Tebib, Oum-El-Kheir Aktouf, Pascal André, Mariem Graa:
Privbench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android. 1-12 - Mst Mahamuda Sarkar Mithila, Fangyi Yu, Miguel Vargas Martin, Shengqian Wang:
Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and Comprehension. 1-13 - Duc-Thuan Dam, Trong-Hung Nguyen, Thai-Ha Tran, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Cong-Kha Pham:
An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum Cryptography. 1-5 - Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial Attacks. 1-9 - Raymond K. Zhao, Nazatul H. Sultan, Phillip Yialeloglou, Dongxi Liu, David Liebowitz, Josef Pieprzyk:
MIKA: A Minimalist Approach to Hybrid Key Exchange. 1-11 - Ahmed Tanvir Mahdad, Nitesh Saxena:
Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge. 1-12 - Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak, Surya Nepal:
Efficient Data Security Using Predictions of File Availability on the Web. 1-12 - Bruno Santos, Rogério Luís C. Costa, Leonel Santos:
Cybersecurity in Industry 5.0: Open Challenges and Future Directions. 1-6 - Costanza Alfieri, Suriya Ganesh Ayyamperumal, Limin Ge, Jingxin Shi, Norman Sadeh:
"I was Diagnosed with ...": Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT. 1-12 - Mohamed Abdelsalam, Isaac Mpidi Bita, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier:
Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation. 1-11 - Atthapan Daramas, Vimal Kumar, Marinho P. Barcellos:
Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction. 1-10 - Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Praveen Gauravaram, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood, Lei Pan:
The Value of Strong Identity and Access Management for ICS/OT Security. 1-5 - Jesse Merhi, Erik Buchholz, Salil S. Kanhere:
Synthetic Trajectory Generation Through Convolutional Neural Networks. 1-12 - Abdelfattah Amamra
, Rym Khettab, Raissa Mezine:
Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data Processing. 1-10 - E. Romanous, J. Ginger:
AI Efficiency in Cybersecurity: Estimating Token Consumption for Optimal Operations. 1-5 - Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha:
Lack of Systematic Approach to Security of IoT Context Sharing Platforms. 1-4 - Ross Porter, Morteza Biglari-Abhari, Benjamin Tan, Duleepa J. Thrimawithana:
Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities. 1-9 - Thai-Ha Tran, Duc-Thuan Dam, Binh Kieu-Do-Nguyen, Van-Phuc Hoang, Trong-Thuc Hoang, Cong-Kha Pham:
Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks. 1-5 - Zhibo Zhang, Jiankun Hu, Hemanshu Roy Pota, Shabnam Kasra Kermanshahi, Benjamin P. Turnbull, Ernesto Damiani, Chan Yeob Yeun:
Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids. 1-5 - Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange. 1-10 - William Aiken, Paula Branco, Guy-Vincent Jourdan:
DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models. 1-11 - Saurabh Anand, Shubham Malaviya, Manish Shukla, Sachin Lodha:
CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language Model. 1-9 - Brooke Kidmose, Weizhi Meng:
can-fp: An Attack-Aware Analysis of False Alarms in Automotive Intrusion Detection Models. 1-12 - Arthur Drichel, Ulrike Meyer:
A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection. 1-10
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.