


default search action
ACM Transactions on Privacy and Security, Volume 27
Volume 27, Number 1, February 2024
- Shen Wang
, Mahshid Delavar
, Muhammad Ajmal Azad
, Farshad Nabizadeh
, Steve Smith
, Feng Hao
:
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. 1:1-1:25 - Jenny Ottmann
, Frank Breitinger
, Felix C. Freiling
:
An Experimental Assessment of Inconsistencies in Memory Forensics. 2:1-2:29 - Erik-Oliver Blass
, Guevara Noubir
:
Forward Security with Crash Recovery for Secure Logs. 3:1-3:28 - Han Cao
, Qindong Sun
, Yaqi Li
, Rong Geng
, Xiaoxiong Wang
:
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain. 4:1-4:25 - Prakash Shrestha, Ahmed Tanvir Mahdad
, Nitesh Saxena
:
Sound-based Two-factor Authentication: Vulnerabilities and Redesign. 5:1-5:27 - Mayank Swarnkar
, Neha Sharma
:
OptiClass: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures. 6:1-6:23 - Yong Zeng
, Jiale Liu
, Tong Dong
, Qingqi Pei
, Jianfeng Ma
, Yao Liu
:
Eyes See Hazy while Algorithms Recognize Who You Are. 7:1-7:23 - Maryna Kluban
, Mohammad Mannan
, Amr M. Youssef
:
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications. 8:1-8:37 - Li Tang
, Qingqing Ye
, Haibo Hu
, Qiao Xue
, Yaxin Xiao
, Jin Li
:
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection. 9:1-9:26 - Li Wang
, Xiangtao Meng
, Dan Li
, Xuhong Zhang
, Shouling Ji
, Shanqing Guo
:
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. 10:1-10:34 - Liqun Chen
, Changyu Dong
, Christopher J. P. Newton
, Yalan Wang
:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. 11:1-11:35 - Yan Qiao
, Kui Wu
, Majid Khabbazian
:
Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network. 12:1-12:32 - Zhenpeng Shi
, Nikolay Matyunin
, Kalman Graffi
, David Starobinski
:
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs. 13:1-13:26
Volume 27, Number 2, May 2024
- Ghader Ebrahimpour
, Mohammad Sayad Haghighi
:
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions. 14 - Federico Concone
, Salvatore Gaglio
, Andrea Giammanco
, Giuseppe Lo Re
, Marco Morana
:
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks. 15 - Florian Sommer
, Mona Gierl
, Reiner Kriesten
, Frank Kargl
, Eric Sax
:
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats. 16 - Jiayi Chen
, Urs Hengartner
, Hassan Khan
:
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android. 17 - Markus Bayer
, Philipp Kuehn
, Ramin Shanehsaz
, Christian Reuter
:
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain. 18 - Julen Bernabé-Rodríguez
, Albert Garreta
, Oscar Lage
:
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation. 19 - Namgyu Park
, Jong Kim
:
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit. 20
Volume 27, Number 3, August 2024
- Rodolfo Vieira Valentim
, Idilio Drago
, Marco Mellia
, Federico Cerutti
:
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting. 21:1-21:27 - Safwa Ameer
, Lopamudra Praharaj
, Ravi Sandhu
, Smriti Bhatt
, Maanak Gupta
:
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model. 22:1-22:36 - Abu Shohel Ahmed
, Aleksi Peltonen
, Mohit Sethi
, Tuomas Aura
:
Security Analysis of the Consumer Remote SIM Provisioning Protocol. 23:1-23:36 - Xinyu He
, Fengrui Hao
, Tianlong Gu
, Liang Chang
:
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models. 24:1-24:26 - Hasini Gunasinghe
, Mikhail J. Atallah
, Elisa Bertino
:
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises. 25:1-25:31 - Weihan Ou
, Steven H. H. Ding, Mohammad Zulkernine
, Li Tao Li
, Sarah Labrosse
:
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning. 26:1-26:37
Volume 27, Number 4, November 2024
- Vipin N. Sathi
, C. Siva Ram Murthy
:
Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond. 27:1-27:29 - Haya Schulmann
, Shujie Zhao
:
ZPredict: ML-Based IPID Side-channel Measurements. 28:1-28:33 - Arish Sateesan
, Jo Vliegen
, Simon Scherrer
, Hsu-Chun Hsiao
, Adrian Perrig
, Nele Mentens
:
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements. 29:1-29:34 - Susil Kumar Mohanty
, Somanath Tripathy
:
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack. 30:1-30:26 - Lorenzo Ceragioli
, Letterio Galletta
, Pierpaolo Degano
, David A. Basin
:
Specifying and Verifying Information Flow Control in SELinux Configurations. 31:1-31:35 - Mukhtar Ahmed
, Jinfu Chen
, Ernest Akpaku
, Rexford Nii Ayitey Sosu
, Ajmal Latif
:
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization. 32:1-32:36

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.