| 2024 | "I was Diagnosed with ...": Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT. Costanza Alfieri, Suriya Ganesh Ayyamperumal, Limin Ge, Jingxin Shi, Norman Sadeh |
| 2024 | 21st Annual International Conference on Privacy, Security and Trust, PST 2024, Sydney, Australia, August 28-30, 2024 |
| 2024 | A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection. Arthur Drichel, Ulrike Meyer |
| 2024 | AI Efficiency in Cybersecurity: Estimating Token Consumption for Optimal Operations. E. Romanous, J. Ginger |
| 2024 | An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum Cryptography. Duc-Thuan Dam, Trong-Hung Nguyen, Thai-Ha Tran, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Cong-Kha Pham |
| 2024 | CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language Model. Saurabh Anand, Shubham Malaviya, Manish Shukla, Sachin Lodha |
| 2024 | Cybersecurity in Industry 5.0: Open Challenges and Future Directions. Bruno Santos, Rogério Luís C. Costa, Leonel Santos |
| 2024 | DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments. Zehui Tang, Shengke Zeng, Song Han, Qi Yu, Shihai Jiang, Peng Chen |
| 2024 | DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials. Sandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler, Daniela Schneider |
| 2024 | DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models. William Aiken, Paula Branco, Guy-Vincent Jourdan |
| 2024 | Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body Postures. Anuradha Mandal, Nitesh Saxena |
| 2024 | Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark Analysis. Jinglin Sun, Basem Suleiman, Imdad Ullah |
| 2024 | Efficient Data Security Using Predictions of File Availability on the Web. Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak, Surya Nepal |
| 2024 | Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange. Malte Breuer, Ulrike Meyer, Susanne Wetzel |
| 2024 | Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data Processing. Abdelfattah Amamra, Rym Khettab, Raissa Mezine |
| 2024 | Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids. Zhibo Zhang, Jiankun Hu, Hemanshu Roy Pota, Shabnam Kasra Kermanshahi, Benjamin P. Turnbull, Ernesto Damiani, Chan Yeob Yeun |
| 2024 | Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities. Ross Porter, Morteza Biglari-Abhari, Benjamin Tan, Duleepa J. Thrimawithana |
| 2024 | Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives. Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa |
| 2024 | Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks. Thai-Ha Tran, Duc-Thuan Dam, Binh Kieu-Do-Nguyen, Van-Phuc Hoang, Trong-Thuc Hoang, Cong-Kha Pham |
| 2024 | Lack of Systematic Approach to Security of IoT Context Sharing Platforms. Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha |
| 2024 | MIKA: A Minimalist Approach to Hybrid Key Exchange. Raymond K. Zhao, Nazatul H. Sultan, Phillip Yialeloglou, Dongxi Liu, David Liebowitz, Josef Pieprzyk |
| 2024 | Malicious Unlearning in Ensemble Models. Huanyi Ye, Ziyao Liu, Yu Jiang, Jiale Guo, Kwok-Yan Lam |
| 2024 | Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge. Ahmed Tanvir Mahdad, Nitesh Saxena |
| 2024 | Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation. Mohamed Abdelsalam, Isaac Mpidi Bita, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier |
| 2024 | Outsourcing vs Insourcing Offensive Security Operations. Jason Ford, Caleb House |
| 2024 | PEL: Privacy Embedded Learning in Smart Healthcare Systems. Mahmuda Akter, Nour Moustafa, Benjamin P. Turnbull |
| 2024 | Pk-Anonymization Meets Differential Privacy. Masaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai, Kan Yasuda |
| 2024 | Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial Attacks. Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani |
| 2024 | Post-Quantum Authentication and Integrity in 3-Layer IoT Architectures. Juliet Samandari, Clémentine Gritti |
| 2024 | Privacy Preservation in Service Operations by Minimizing Sensitive Data Exposure. Rishabh Kumar, Rohit Gupta, Sutapa Mondal, Mangesh S. Gharote, Praveen Gauravaram, Sachin Lodha |
| 2024 | Privbench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android. Mohammed El Amin Tebib, Oum-El-Kheir Aktouf, Pascal André, Mariem Graa |
| 2024 | Proactive Audio Authentication Using Speaker Identity Watermarking. Qi Li, Xiaodong Lin |
| 2024 | Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction. Atthapan Daramas, Vimal Kumar, Marinho P. Barcellos |
| 2024 | Stake-Driven Rewards and Log-Based Free Rider Detection in Federated Learning. Huong Mai Nguyen, Hong-Tri Nguyen, Lauri Lovén, Susanna Pirttikangas |
| 2024 | Synthetic Trajectory Generation Through Convolutional Neural Networks. Jesse Merhi, Erik Buchholz, Salil S. Kanhere |
| 2024 | The Value of Strong Identity and Access Management for ICS/OT Security. Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Praveen Gauravaram, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood, Lei Pan |
| 2024 | Towards SAR Automatic Target Recognition: Multi-Category SAR Image Classification Based on Light Weight Vision Transformer. Guibin Zhao, Pengfei Li, Zhibo Zhang, Fusen Guo, Xueting Huang, Wei Xu, Jinyin Wang, Jianlong Chen |
| 2024 | Towards a Portability Scheme for Decentralized Identifiers in Self-Sovereign Identities. João Pedro Alonso Almeida, Gowri Sankar Ramachandran, Paul Ashley, Raja Jurdak, Steven McCown, Jó Ueyama |
| 2024 | Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and Comprehension. Mst Mahamuda Sarkar Mithila, Fangyi Yu, Miguel Vargas Martin, Shengqian Wang |
| 2024 | can-fp: An Attack-Aware Analysis of False Alarms in Automotive Intrusion Detection Models. Brooke Kidmose, Weizhi Meng |