PST C

40 papers

YearTitle / Authors
2024"I was Diagnosed with ...": Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT.
Costanza Alfieri, Suriya Ganesh Ayyamperumal, Limin Ge, Jingxin Shi, Norman Sadeh
202421st Annual International Conference on Privacy, Security and Trust, PST 2024, Sydney, Australia, August 28-30, 2024
2024A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection.
Arthur Drichel, Ulrike Meyer
2024AI Efficiency in Cybersecurity: Estimating Token Consumption for Optimal Operations.
E. Romanous, J. Ginger
2024An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum Cryptography.
Duc-Thuan Dam, Trong-Hung Nguyen, Thai-Ha Tran, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Cong-Kha Pham
2024CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language Model.
Saurabh Anand, Shubham Malaviya, Manish Shukla, Sachin Lodha
2024Cybersecurity in Industry 5.0: Open Challenges and Future Directions.
Bruno Santos, Rogério Luís C. Costa, Leonel Santos
2024DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments.
Zehui Tang, Shengke Zeng, Song Han, Qi Yu, Shihai Jiang, Peng Chen
2024DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials.
Sandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler, Daniela Schneider
2024DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models.
William Aiken, Paula Branco, Guy-Vincent Jourdan
2024Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body Postures.
Anuradha Mandal, Nitesh Saxena
2024Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark Analysis.
Jinglin Sun, Basem Suleiman, Imdad Ullah
2024Efficient Data Security Using Predictions of File Availability on the Web.
Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak, Surya Nepal
2024Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange.
Malte Breuer, Ulrike Meyer, Susanne Wetzel
2024Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data Processing.
Abdelfattah Amamra, Rym Khettab, Raissa Mezine
2024Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids.
Zhibo Zhang, Jiankun Hu, Hemanshu Roy Pota, Shabnam Kasra Kermanshahi, Benjamin P. Turnbull, Ernesto Damiani, Chan Yeob Yeun
2024Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities.
Ross Porter, Morteza Biglari-Abhari, Benjamin Tan, Duleepa J. Thrimawithana
2024Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives.
Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
2024Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks.
Thai-Ha Tran, Duc-Thuan Dam, Binh Kieu-Do-Nguyen, Van-Phuc Hoang, Trong-Thuc Hoang, Cong-Kha Pham
2024Lack of Systematic Approach to Security of IoT Context Sharing Platforms.
Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha
2024MIKA: A Minimalist Approach to Hybrid Key Exchange.
Raymond K. Zhao, Nazatul H. Sultan, Phillip Yialeloglou, Dongxi Liu, David Liebowitz, Josef Pieprzyk
2024Malicious Unlearning in Ensemble Models.
Huanyi Ye, Ziyao Liu, Yu Jiang, Jiale Guo, Kwok-Yan Lam
2024Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge.
Ahmed Tanvir Mahdad, Nitesh Saxena
2024Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation.
Mohamed Abdelsalam, Isaac Mpidi Bita, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier
2024Outsourcing vs Insourcing Offensive Security Operations.
Jason Ford, Caleb House
2024PEL: Privacy Embedded Learning in Smart Healthcare Systems.
Mahmuda Akter, Nour Moustafa, Benjamin P. Turnbull
2024Pk-Anonymization Meets Differential Privacy.
Masaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai, Kan Yasuda
2024Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial Attacks.
Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani
2024Post-Quantum Authentication and Integrity in 3-Layer IoT Architectures.
Juliet Samandari, Clémentine Gritti
2024Privacy Preservation in Service Operations by Minimizing Sensitive Data Exposure.
Rishabh Kumar, Rohit Gupta, Sutapa Mondal, Mangesh S. Gharote, Praveen Gauravaram, Sachin Lodha
2024Privbench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android.
Mohammed El Amin Tebib, Oum-El-Kheir Aktouf, Pascal André, Mariem Graa
2024Proactive Audio Authentication Using Speaker Identity Watermarking.
Qi Li, Xiaodong Lin
2024Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction.
Atthapan Daramas, Vimal Kumar, Marinho P. Barcellos
2024Stake-Driven Rewards and Log-Based Free Rider Detection in Federated Learning.
Huong Mai Nguyen, Hong-Tri Nguyen, Lauri Lovén, Susanna Pirttikangas
2024Synthetic Trajectory Generation Through Convolutional Neural Networks.
Jesse Merhi, Erik Buchholz, Salil S. Kanhere
2024The Value of Strong Identity and Access Management for ICS/OT Security.
Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Praveen Gauravaram, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood, Lei Pan
2024Towards SAR Automatic Target Recognition: Multi-Category SAR Image Classification Based on Light Weight Vision Transformer.
Guibin Zhao, Pengfei Li, Zhibo Zhang, Fusen Guo, Xueting Huang, Wei Xu, Jinyin Wang, Jianlong Chen
2024Towards a Portability Scheme for Decentralized Identifiers in Self-Sovereign Identities.
João Pedro Alonso Almeida, Gowri Sankar Ramachandran, Paul Ashley, Raja Jurdak, Steven McCown, Jó Ueyama
2024Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and Comprehension.
Mst Mahamuda Sarkar Mithila, Fangyi Yu, Miguel Vargas Martin, Shengqian Wang
2024can-fp: An Attack-Aware Analysis of False Alarms in Automotive Intrusion Detection Models.
Brooke Kidmose, Weizhi Meng