| 2025 | Automated Privacy Policy Analysis Using Large Language Models. Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu |
| 2025 | Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Vicenç Torra |
| 2025 | Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. Shlomi Dolev, Ehud Gudes, Daniel Shlomo |
| 2025 | Can Differentially Private Fine-Tuning LLMs Protect Against Privacy Attacks? Hao Du, Shang Liu, Yang Cao |
| 2025 | Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE). Sona Alex, Bian Yang |
| 2025 | Data Chameleon: A Self-adaptive Synthetic Data Management System. Qianying Liao, Maarten Kesters, Dimitri Van Landuyt, Wouter Joosen |
| 2025 | Data and Applications Security and Privacy XXXIX - 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings Sokratis K. Katsikas, Basit Shafiq |
| 2025 | Diffusion-Based Adversarial Purification for Intrusion Detection. Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens, Foutse Khomh |
| 2025 | Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains. Anand Manojkumar Parikh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
| 2025 | Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten H. Everts, Florian Hahn, Andreas Peter |
| 2025 | Facility Location Problem Under Local Differential Privacy Without Super-Set Assumption. Kevin Pfisterer, Quentin Hillebrand, Vorapong Suppakitpaisarn |
| 2025 | Feature Identification and Study of Attackers' Behaviours Using Honeypots. Junaid Haseeb, Masood Mansoori, Ian Welch |
| 2025 | Hallucination Detection in Large Language Models Using Diversion Decoding. Basel Abdeen, S. M. Tahmid Siddiqui, Meah Tahmeed Ahmed, Anoop Singhal, Latifur Khan, Punya Parag Modi, Ehab Al-Shaer |
| 2025 | Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. Maxwel Bar-on, Kiley Krosky, Federico Larrieu, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray |
| 2025 | Metadata Assisted Supply-Chain Attack Detection for Ansible. Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge, Junaid Haseeb |
| 2025 | Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. Francis Wanko Naa, Nora Boulahia-Cuppens, Frédéric Cuppens |
| 2025 | P-EDR: Privacy-Preserving Event-Driven Data Release Using Smart Contracts. Jingzhe Wang, Balaji Palanisamy |
| 2025 | Performance-Efficient Anti-fingerprinting for Privacy. Lars Tomer Yavor, Anne V. D. M. Kayem |
| 2025 | Purpose Filter: A Space-efficient Purpose Metadata Storage. Paulo R. P. Amora, Francisco D. B. S. Praciano, Javam C. Machado |
| 2025 | Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. Zahra Ebadi Ansaroudi, Amir Sharif, Giada Sciarretta, Francesco Antonio Marino, Silvio Ranise |
| 2025 | Supporting Delegation in Outsourced ICA Process. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Sara Petrilli, Pierangela Samarati |
| 2025 | The Privacy Impact of Dash Mixing Fee Payments. Michael H. Ziegler, Mariusz Nowostawski, Basel Katt |
| 2025 | Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. Reika Nishimura Arakawa, Yo Kanemoto, Mitsuaki Akiyama |
| 2025 | Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. Sascha Kern, Thomas Baumer, Raphael Neudert, Günther Pernul |
| 2025 | Trusted Platform and Privacy Management in Cyber Physical Systems: The DUCA Framework. Antonio Muñoz, Javier López, Cristina Alcaraz, Fabio Martinelli |