| 2022 | 19th Annual International Conference on Privacy, Security & Trust, PST 2022, Fredericton, NB, Canada, August 22-24, 2022 |
| 2022 | A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces. Shaveta Dandyan, Habib Louafi, Samira Sadaoui |
| 2022 | A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System. Xiaodong Qu, Qinglei Kong, Feng Yin, Leixi Xu |
| 2022 | A Semantic-based Approach to Reduce the Reading Time of Privacy Policies. Jasmin Kaur, Rozita Dara, Ritu Chaturvedi |
| 2022 | A Vulnerability in Video Anonymization - Privacy Disclosure from Face-obfuscated video. Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros |
| 2022 | Achieving Efficient and Secure Query in Blockchain-based Traceability Systems. Chengzhe Lai, Yinzhen Wang |
| 2022 | An Analytical Study of Selfish Mining Attacks on Chainweb Blockchain. Suyang Wang, Bo Yin, Shuai Zhang, Yu Cheng |
| 2022 | An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data. Wentao Wang, Yuxuan Jin, Bin Cao |
| 2022 | An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy. Khosro Salmani |
| 2022 | Balancing privacy and accountability in digital payment methods using zk-SNARKs. Tariq Bontekoe, Maarten H. Everts, Andreas Peter |
| 2022 | Careful What You Wish For: on the Extraction of Adversarially Trained Models. Kacem Khaled, Gabriela Nicolescu, Felipe Göhring de Magalhães |
| 2022 | Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning. Euclides Carlos Pinto Neto, Sajjad Dadkhah, Ali A. Ghorbani |
| 2022 | Content Analysis of Privacy Policies Before and After GDPR. Nastaran Bateni, Jasmin Kaur, Rozita Dara, Fei Song |
| 2022 | Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. Yiming Sun, Weizhi Meng, Wenjuan Li |
| 2022 | Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets. Laurens D'hooge, Miel Verkerken, Tim Wauters, Bruno Volckaert, Filip De Turck |
| 2022 | Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application. Kun Peng |
| 2022 | Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories. Xichen Zhang, Songnian Zhang, Suprio Ray, Ali A. Ghorbani |
| 2022 | Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers. Huang Lin |
| 2022 | Garage Door Openers: A Rolling Code Protocol Case Study. Ahmed Ghanem, Riham AlTawy |
| 2022 | Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. Cagri Arisoy, Anuradha Mandal, Nitesh Saxena |
| 2022 | LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach. Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy |
| 2022 | Mobile Mental Health Apps: Alternative Intervention or Intrusion? Shalini Saini, Dhiral Panjwani, Nitesh Saxena |
| 2022 | Privacy Policy Analysis with Sentence Classification. Andrick Adhikari, Sanchari Das, Rinku Dewri |
| 2022 | Privacy-Preserving Detection of Poisoning Attacks in Federated Learning. Trent Muhr, Wensheng Zhang |
| 2022 | Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree. Xueqin Gao, Tao Shang, Da Li, Jianwei Liu |
| 2022 | SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables. Mordechai Guri |
| 2022 | Security Analysis in Satellite Communication based on Geostationary Orbit. Jacob Krabbe Pedersen, Mikkel Bøchman, Weizhi Meng |
| 2022 | Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming. Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel |
| 2022 | Towards the Development of a Realistic Multidimensional IoT Profiling Dataset. Sajjad Dadkhah, Hassan Mahdikhani, Priscilla Kyei Danso, Alireza Zohourian, Kevin Anh Truong, Ali A. Ghorbani |
| 2022 | Usability of Paper Audit Trails in Electronic Voting Machines. Saul Hughes, Sana Maqsood |
| 2022 | User Behavior Simulation in ICS Cyber Ranges. Chuhan Liu, Wei Yan, Fengkai Xu, Wenlong Yang, Beibei Li |
| 2022 | Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs. Weifeng Xu, Dianxiang Xu |