| 2022 | A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial Domain. Denghao Li, Jianzong Wang, Lingwei Kong, Shijing Si, Zhangcheng Huang, Chenyu Huang, Jing Xiao |
| 2022 | AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation. Zhijun Wu, Junjun Guo |
| 2022 | BlindSpot: Watermarking Through Fairness. Sofiane Lounici, Melek Önen, Orhan Ermis, Slim Trabelsi |
| 2022 | Capacity Laws for Steganography in a Crowd. Andrew D. Ker |
| 2022 | Collusion-resistant Fingerprinting of Parallel Content Channels. Basheer Joudeh, Boris Skoric |
| 2022 | Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption. Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen |
| 2022 | Covert Channels in Network Time Security. Kevin Lamshöft, Jana Dittmann |
| 2022 | Covert Communications through Imperfect Cancellation. Daniel Chew, Christine Nguyen, Samuel Berhanu, Chris Baumgart, A. Brinton Cooper |
| 2022 | Detector-Informed Batch Steganography and Pooled Steganalysis. Yassine Yousfi, Eli Dworetzky, Jessica J. Fridrich |
| 2022 | Domain Adaptational Text Steganalysis Based on Transductive Learning. Yiming Xue, Boya Yang, Yaqian Deng, Wanli Peng, Juan Wen |
| 2022 | FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection. Gen Li, Xianfeng Zhao, Yun Cao, Pengfei Pei, Jinchuan Li, Zeyu Zhang |
| 2022 | Few-shot Text Steganalysis Based on Attentional Meta-learner. Juan Wen, Ziwei Zhang, Yu Yang, Yiming Xue |
| 2022 | Fighting the Reverse JPEG Compatibility Attack: Pick your Side. Jan Butora, Patrick Bas |
| 2022 | Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics. Stefan Kiltz, Robert Altschaffel, Jana Dittmann |
| 2022 | Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification. Árpád Berta, Gábor Danner, István Hegedüs, Márk Jelasity |
| 2022 | IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022 B. S. Manjunath, Jan Butora, Benedetta Tondi, Claus Vielhauer |
| 2022 | Identity-Referenced Deepfake Detection with Contrastive Learning. Dongyao Shen, Youjian Zhao, Chengbin Quan |
| 2022 | Intellectual Property (IP) Protection for Deep Learning and Federated Learning Models. Farinaz Koushanfar |
| 2022 | Know Your Library: How the libjpeg Version Influences Compression and Decompression Results. Martin Benes, Nora Hofer, Rainer Böhme |
| 2022 | Looking for Signals: A Systems Security Perspective. Christopher Kruegel |
| 2022 | Sparse Trigger Pattern Guided Deep Learning Model Watermarking. Chun-Shien Lu |
| 2022 | Towards Generalization in Deepfake Detection. Luisa Verdoliva |