| 2023 | Agnostic Label-Only Membership Inference Attack. Anna Monreale, Francesca Naretto, Simone Rizzo |
| 2023 | Decentralized SGX-Based Cloud Key Management. Yunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou |
| 2023 | Detection of Malware Using Self-Attention Mechanism and Strings. Satoki Kanno, Mamoru Mimura |
| 2023 | Evaluating Rule-Based Global XAI Malware Detection Methods. Rui Li, Olga Gadyatskaya |
| 2023 | Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai |
| 2023 | KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack. Hiroki Kuzuno, Toshihiro Yamauchi |
| 2023 | Modular Polynomial Multiplication Using RSA/ECC Coprocessor. Aurélien Greuet, Simon Montoya, Clémence Vermeersch |
| 2023 | Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings Shujun Li, Mark Manulis, Atsuko Miyaji |
| 2023 | New LDP Approach Using VAE. Andres Hernandez-Matamoros, Hiroaki Kikuchi |
| 2023 | On the Design of a Misinformation Widget (MsW) Against Cloaked Science. David Arroyo, Sara Degli-Esposti, Alberto Gómez-Espés, Santiago Palmero Muñoz, Luis Pérez-Miguel |
| 2023 | Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data. Songwei Luo, Shaojing Fu, Yuchuan Luo, Lin Liu, Yanxiang Deng, Shixiong Wang |
| 2023 | Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning. Xiangyu Su, Mario Larangeira, Keisuke Tanaka |
| 2023 | RRML: Privacy Preserving Machine Learning Based on Random Response Technology. Jia Wang, Shiqing He, Qiuzhen Lin |
| 2023 | Resilience of Blockchain Overlay Networks. Aristodemos Paphitis, Nicolas Kourtellis, Michael Sirivianos |
| 2023 | SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning. Zhuotao Lian, Chen Zhang, Kaixi Nan, Chunhua Su |
| 2023 | Security Analysis of Mobile Point-of-Sale Terminals. Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao |
| 2023 | Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Mayank Raikwar, Shuang Wu, Kristian Gjøsteen |
| 2023 | Spying on the Spy: Security Analysis of Hidden Cameras. Samuel Herodotou, Feng Hao |
| 2023 | T3E: A Practical Solution to Trusted Time in Secure Enclaves. Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen |
| 2023 | The Effectiveness of Transformer-Based Models for BEC Attack Detection. Amirah Almutairi, BooJoong Kang, Nawfal F. Fadhel |
| 2023 | Whitelisting for Characterizing and Monitoring Process Control Communication. Andreas Paul, Franka Schuster, Hartmut König |
| 2023 | ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves. Ali Burak Ünal, Nico Pfeifer, Mete Akgün |