| 2022 | Assessing Differentially Private Variational Autoencoders Under Membership Inference. Daniel Bernau, Jonas Robl, Florian Kerschbaum |
| 2022 | Attack-Resilient Blockchain-Based Decentralized Timed Data Release. Jingzhe Wang, Balaji Palanisamy |
| 2022 | Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks. Andrea Milakovic, Rudolf Mayer |
| 2022 | Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings Shamik Sural, Haibing Lu |
| 2022 | End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies. Stefano Berlato, Umberto Morelli, Roberto Carbone, Silvio Ranise |
| 2022 | Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors. Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabaninejad |
| 2022 | Integrating and Evaluating Quantum-safe TLS in Database Applications. Anselme Tueno, David Boehm, Shin Ho Choe |
| 2022 | Knowledge Mining in Cybersecurity: From Attack to Defense. Khandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham |
| 2022 | Liberate Your Servers: A Decentralized Content Compliance Validation Protocol. Bowen Liu, Jianying Zhou |
| 2022 | Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards. Jeroen Weener, Florian Hahn, Andreas Peter |
| 2022 | Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection. Matt Gorbett, Hossein Shirazi, Indrakshi Ray |
| 2022 | MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data. Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham |
| 2022 | Mitigating Privacy Vulnerability Caused by Map Asymmetry. Ryota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao, Sumio Fujita, Hidehito Gomi |
| 2022 | On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps. Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray |
| 2022 | ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. Stanley Clark, Nikolay Yakovets, George Fletcher, Nicola Zannone |
| 2022 | Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption. Anis Bkakria |
| 2022 | Security Operations Center Roles and Skills: A Comparison of Theory and Practice. Andreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul |
| 2022 | Utility and Privacy Assessment of Synthetic Microbiome Data. Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart |
| 2022 | Verification and Validation Methods for a Trust-by-Design Framework for the IoT. Davide Ferraris, M. Carmen Fernández Gago, Javier López |