| 2021 | 18th International Conference on Privacy, Security and Trust, PST 2021, Auckland, New Zealand, December 13-15, 2021 |
| 2021 | A Hybrid Secure Computation Framework for Graph Neural Networks. Yixuan Ren, Yixin Jie, Qingtao Wang, Bingbing Zhang, Chi Zhang, Lingbo Wei |
| 2021 | A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI. Jukka Ruohonen, Kalle Hjerppe, Kalle Rindell |
| 2021 | A Novel Trust Model In Detecting Final-Phase Attacks in Substations. Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari |
| 2021 | A Practical Oblivious Cloud Storage System based on TEE and Client Gateway. Wensheng Zhang |
| 2021 | A Wearables-Driven Attack on Examination Proctoring. Tasnia Heya Ashrafi, Abdul Serwadda, Isaac Griswold-Steiner, Richard Matovu |
| 2021 | A new approach for cross-silo federated learning and its privacy risks. Michele Fontana, Francesca Naretto, Anna Monreale |
| 2021 | API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models. May Almousa, Sai Basavaraju, Mohd Anwar |
| 2021 | An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism. Xubin Jiao, Jinguo Li |
| 2021 | Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks. Miao He, Xiangman Li, Jianbing Ni, Haomiao Yang |
| 2021 | Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. Kaja Schmidt, Alexander Mühle, Andreas Grüner, Christoph Meinel |
| 2021 | Clustering based opcode graph generation for malware variant detection. Fok Kar Wai, Vrizlynn L. L. Thing |
| 2021 | Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack. Yiran Li, Guiqiang Hu, Xiaoyuan Liu, Zuobin Ying |
| 2021 | DaRoute: Inferring trajectories from zero-permission smartphone sensors. Christian Roth, Ngoc-Thanh Dinh, Marc Roßberger, Dogan Kesdogan |
| 2021 | Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation Framework. Randolph Loh, Vrizlynn L. L. Thing |
| 2021 | Dazed and Confused: What's Wrong with Crypto Libraries? Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari |
| 2021 | Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems. Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha |
| 2021 | Deletion-Compliance in the Absence of Privacy. Jonathan Godin, Philippe Lamontagne |
| 2021 | Designing Personalized OS Update Message based on Security Behavior Stage Model. Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota, Takamasa Isohara |
| 2021 | Detection of Demand Manipulation Attacks on a Power Grid. Srinidhi Madabhushi, Rinku Dewri |
| 2021 | Detection of Induced False Negatives in Malware Samples. Adrian Wood, Michael N. Johnstone |
| 2021 | Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks. Troya Çagil Köylü, Cezar Rodolfo Wedig Reinbrecht, Said Hamdioui, Mottaqiallah Taouil |
| 2021 | EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework. René Helmke, Eugen Winter, Michael Rademacher |
| 2021 | EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences. Jiacheng Jin, Yandong Zheng, Pulei Xiong |
| 2021 | Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN. Martha N. Kamkuemah |
| 2021 | Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials. Nikesh Lalchandani, Frank Jiang, Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss |
| 2021 | FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor. Kathrin Garb, Johannes Obermaier, Elischa Ferres, Martin Künig |
| 2021 | FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media. Noreddine Belhadj Cheikh, Abdessamad Imine, Michaël Rusinowitch |
| 2021 | Fool Me Once: A Study of Password Selection Evolution over the Past Decade. Rahul Dubey, Miguel Vargas Martin |
| 2021 | GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication. Mordechai Guri |
| 2021 | Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic Approach. Shu Hong, Lingjie Duan, Jianwei Huang |
| 2021 | Impact Of Environmental Conditions On Fingerprint Systems Performance. Abdarahmane Wone, Joël Di Manno, Christophe Charrier, Christophe Rosenberger |
| 2021 | Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice. Malte Breuer, Ulrike Meyer, Susanne Wetzel |
| 2021 | Intrusion Detection in Internet of Things using Convolutional Neural Networks. Martin Kodys, Zhi Lu, Fok Kar Wai, Vrizlynn L. L. Thing |
| 2021 | IoT Malware Detection Using Function-Call-Graph Embedding. Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi |
| 2021 | LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. Wei-Yang Chiu, Weizhi Meng, Wenjuan Li |
| 2021 | Light-Weight Active Security for Detecting DDoS Attacks in Containerised ICPS. Farzana Zahid, Matthew M. Y. Kuo, Roopak Sinha |
| 2021 | Long Passphrases: Potentials and Limits. Christopher Bonk, Zach Parish, Julie Thorpe, Amirali Salehi-Abari |
| 2021 | Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data. Sharmin Afrose, Danfeng Daphne Yao, Olivera Kotevska |
| 2021 | PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms. Steffen Enders, Mariia Rybalka, Elmar Padilla |
| 2021 | PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication. Matthew Rafuse, Urs Hengartner |
| 2021 | Practical Protection of Binary Applications via Transparent Immunization. Xinyuan Wang |
| 2021 | Preparing for National Cyber Crises Using Non-linear Cyber Exercises. Florian Skopik, Maria Leitner |
| 2021 | Searching on Non-Systematic Erasure Codes. Atthapan Daramas, Vimal Kumar |
| 2021 | Secure Allocation for Graph-Based Virtual Machines in Cloud Environments. Mansour Aldawood, Arshad Jhumka |
| 2021 | Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks. Lav Gupta |
| 2021 | SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion. Ganyu Wang, Miguel Vargas Martin |
| 2021 | SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning. Sanaz Nakhodchi, Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha |
| 2021 | TEE-based Selective Testing of Local Workers in Federated Learning Systems. Wensheng Zhang, Trent Muhr |
| 2021 | The Race-Timing Prototype. Andrés Rainiero Hernández Coronado, Wonjun Lee, Wei-Ming Lin |
| 2021 | Towards Change Detection in Privacy Policies with Natural Language Processing. Andrick Adhikari, Rinku Dewri |
| 2021 | Towards Privacy-Friendly Smart Products. Kimberly García, Zaira Zihlmann, Simon Mayer, Aurelia Tamò-Larrieux, Johannes Hooss |
| 2021 | Towards Privacy-Preserving Classification-as-a-Service for DGA Detection. Arthur Drichel, Mehdi Akbari Gurabi, Tim Amelung, Ulrike Meyer |
| 2021 | Towards Query-efficient Black-box Adversarial Attack on Text Classification Models. Mohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani |
| 2021 | Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing. Fuyuan Song, Zheng Qin, Jinwen Liang, Pulei Xiong, Xiaodong Lin |
| 2021 | Trust Quantification for Autonomous Medical Advisory Systems. Mini Thomas, Reza Samavi, Thomas E. Doyle |
| 2021 | Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions. Pranav Kotak, Shweta Bhandari, Akka Zemmari, Jaykrishna Joshi |
| 2021 | Updatable Linear Map Commitments and Their Applications in Elementary Databases. Guiwen Luo, Shihui Fu, Guang Gong |
| 2021 | User Identification in Online Social Networks using Graph Transformer Networks. K. N. Pavan Kumar, Marina L. Gavrilova |
| 2021 | User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security. Farzaneh Shoeleh, Masoud Erfani, Saeed Shafiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani |
| 2021 | Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems. Ehsan Nazari, Paula Branco, Guy-Vincent Jourdan |