DBSec B

25 papers

YearTitle / Authors
2025Automated Privacy Policy Analysis Using Large Language Models.
Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu
2025Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding.
Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Vicenç Torra
2025Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3.
Shlomi Dolev, Ehud Gudes, Daniel Shlomo
2025Can Differentially Private Fine-Tuning LLMs Protect Against Privacy Attacks?
Hao Du, Shang Liu, Yang Cao
2025Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
Sona Alex, Bian Yang
2025Data Chameleon: A Self-adaptive Synthetic Data Management System.
Qianying Liao, Maarten Kesters, Dimitri Van Landuyt, Wouter Joosen
2025Data and Applications Security and Privacy XXXIX - 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings
Sokratis K. Katsikas, Basit Shafiq
2025Diffusion-Based Adversarial Purification for Intrusion Detection.
Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens, Foutse Khomh
2025Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains.
Anand Manojkumar Parikh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
2025Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning.
Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten H. Everts, Florian Hahn, Andreas Peter
2025Facility Location Problem Under Local Differential Privacy Without Super-Set Assumption.
Kevin Pfisterer, Quentin Hillebrand, Vorapong Suppakitpaisarn
2025Feature Identification and Study of Attackers' Behaviours Using Honeypots.
Junaid Haseeb, Masood Mansoori, Ian Welch
2025Hallucination Detection in Large Language Models Using Diversion Decoding.
Basel Abdeen, S. M. Tahmid Siddiqui, Meah Tahmeed Ahmed, Anoop Singhal, Latifur Khan, Punya Parag Modi, Ehab Al-Shaer
2025Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications.
Maxwel Bar-on, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray
2025Metadata Assisted Supply-Chain Attack Detection for Ansible.
Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge, Junaid Haseeb
2025Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management.
Francis Wanko Naa, Nora Boulahia-Cuppens, Frédéric Cuppens
2025P-EDR: Privacy-Preserving Event-Driven Data Release Using Smart Contracts.
Jingzhe Wang, Balaji Palanisamy
2025Performance-Efficient Anti-fingerprinting for Privacy.
Lars Tomer Yavor, Anne V. D. M. Kayem
2025Purpose Filter: A Space-efficient Purpose Metadata Storage.
Paulo R. P. Amora, Francisco D. B. S. Praciano, Javam C. Machado
2025Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0.
Zahra Ebadi Ansaroudi, Amir Sharif, Giada Sciarretta, Francesco Antonio Marino, Silvio Ranise
2025Supporting Delegation in Outsourced ICA Process.
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Sara Petrilli, Pierangela Samarati
2025The Privacy Impact of Dash Mixing Fee Payments.
Michael H. Ziegler, Mariusz Nowostawski, Basel Katt
2025Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs.
Reika Nishimura Arakawa, Yo Kanemoto, Mitsuaki Akiyama
2025Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source.
Sascha Kern, Thomas Baumer, Raphael Neudert, Günther Pernul
2025Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA Framework.
Antonio Muñoz, Javier López, Cristina Alcaraz, Fabio Martinelli