PST C

70 papers

YearTitle / Authors
202522nd Annual International Conference on Privacy, Security, and Trust, PST 2025, Fredericton, NB, Canada, August 26-28, 2025
2025A Dynamic, Context-Aware Trust Model for Distributed Computing Environments.
Divya Bansal, Sabrina Dhalla, Jaspal Kaur Saini
2025A Generic Framework for Privacy Risk Assessment of Machine Learning Models.
Le Wang, Sonal Allana, Xiaowei Sun, Liang Xue, Xiaodong Lin, Rozita Dara, Pulei Xiong
2025A Longitudinal Look at GDPR Compliance.
Brian Kim, Yang Trista Cao, K. Suzanne Barber
2025A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers.
Jimmy Dani, Kalyan Nakka, Nitesh Saxena
2025A Modeling and Static Analysis Approach for the Verification of Privacy and Safety Properties in Kotlin Android Apps.
Bara' Nazzal, Manar H. Alalfi, James R. Cordy
2025A Per-Bag Suspicion-Based Bagging Strategy for Fighting Poisoning Attacks in Classification.
Aghoghomena Akasukpe, Tomi Adeyemi, Pooria Madani, Li Yang, Miguel Vargas Martin
2025A Static Analysis of Popular C Packages in Linux.
Jukka Ruohonen, Mubashrah Saddiqa, Krzysztof Sierszecki
2025An Efficient and Privacy-Preserving AdaBoost Federated Learning Framework for AiP System.
Zhuliang Jia, Suprio Ray, Rongxing Lu, Mohammad Saiful Islam Mamun
2025An Integer Programming Framework for ReBAC Policy Mining and Optimized Conformance Testing.
Padmavathi Iyer
2025An Intelligent Framework for Deceptive Review Detection Using Advanced Trust Vector Modeling.
Lily Dey, Md. Shopon, Marina L. Gavrilova
2025Analysis of User-Generated Content to Unfold Privacy Concerns with CBDCs.
Arshpreet Singh, Mohamad Sadegh Sangari, Atefeh Mashatan
2025Assessing Privacy Practices on Ontario Municipal Websites.
Adegboola David Adelabu, Yan Yan, Wenjing Zhang, Sampsa Rauti, Ville Leppänen, Zuhaibuddin Bhutto, Wenjun Lin
2025Balancing Trade-offs: Adaptive Differential Privacy in Interpretable Machine Learning Models.
Farhin Farhad Riya, Shahinul Hoque, Yingyuan Yang, Jinyuan Sun, Olivera Kotevska
2025Beyond SSO: Mobile Money Authentication for Inclusive e-Government in Sub-Saharan Africa.
Oluwole Adewusi, Wallace S. Msagusa, Jean Pierre Imanirumva, Okemawo Obadofin, Jema D. Ndibwile
2025CHOO-PIR: Hint-Based Private Information Retrieval with Commodity Servers.
Kittiphop Phalakarn, Ryuya Hayashi
2025Characterizing Event-themed Malicious Web Campaigns: A Case Study on War-themed Websites.
Maraz Mia, Mir Mehedi A. Pritom, Tariqul Islam, Shouhuai Xu
2025Clustering Algorithms for Anomaly Detection in EVCS Infrastructure using OCPP.
Chris Tchimmegne Tchassem, Yendoubé Kombate, Pierre-Martin Tardif
2025Comparing Client- & Server-Side AEAD Encryption in Software-Defined Storage Systems.
David Mohren, Minh Truong, Brett Kelly, Kenneth B. Kent
2025Comparing Macro and Micro Approaches for Detecting Phishing Where It Spreads.
Mina Erfan, Paula Branco, Guy-Vincent Jourdan
2025Context-Aware Location De-Identification Using Denoising Diffusion.
Md. Shopon, Marina L. Gavrilova
2025Cross-Boundary Privacy-Preserving Image Learning.
Atsuko Miyaji, Tomoshi Yagishita, Yuki Hyohdoh, Pierre Boudvillain
2025Cyber Threat Mitigation with Knowledge-Infused Reinforcement Learning and LLM-Guided Policies.
Md. Shamim Towhid, Shahrear Iqbal, Euclides Carlos Pinto Neto, Nashid Shahriar, Scott Buffett, Madeena Sultana, Adrian Taylor
2025DEDALUS & ICARUS: Image Privacy Classification Systems with Risk Oriented Explanations.
Hugo Rocha De Alba, Esma Aïmeur, Mohamed Loutis, Khulud Alqahtani
2025DNS Profiler: Quantifying User Browsing Risk from DNS Traffic Patterns.
Mahdi Daghmehchi Firoozjaei, Yaser Baseri, Qing Tan
2025Database Systems Examination and Digital Forensics Tool: The Progress and Limitations.
Oluwasola Mary Adedayo
2025Detecting Deepfakes using Temporal Consistency of Facial Expression Transitions.
Renjith Eettickal Chacko, Garima Bajwa
2025Detecting Ransomware Before It Bites: A Hybrid Model Approach for Early Ransomware Detection.
Sk Mahtab Uddin, Saqib Hakak, Miguel Garzón
2025Dynamic Decentralized Social Trust for Financial Inclusion with Regulatory Compliance.
Suzana Mesquita de Borba Maranhão Moreno, Alessandro Aldini, Paul-Antoine Bisgambiglia, Jean-Marc Seigneur
2025Empirical Evaluation and Reclassification of Cryptographic Algorithms for Energy-Efficient Secure Communication in Medical IoT Devices.
Sidra Anwar, Jonathan Anderson
2025Encryption Struggles Persist: When Tech-Savvy Students Face Challenges with PGP in Thunderbird.
Md Imanul Huq, Ahmed Tanvir Mahdad, Nitesh Saxena
2025Enhancing Visual Speaker Authentication using Dynamic Lip Movement and Meta-Learning.
Pooja Pathare, Garima Bajwa
2025Evaluating Efficient Patch-Based Backdoor Attacks in Satellite Image Classification Systems.
Ghazal Rahmanian, Pooria Madani
2025Exploring the Impact of Feature Selection on Non-Stationary Intrusion Detection Models in IoT Networks.
Muaan ur Rehman, Hayretdin Bahsi, Rajesh Kalakoti
2025FactCellar: An Evidence-based Dataset for Automated Fact-Checking.
Arbaaz Dharmavaram, Farrukh Bin Rashid, Saqib Hakak
2025Formal Specification and Verification of Protection in Transit (PIT) Protocol Using UPPAAL.
Takwa Rhaimi, Hamed Aghayarzadeh, Rakesh Podder, Indrakshi Ray
2025FragmentFool: Fragment-based Adversarial Perturbation for Graph Neural Network-based Vulnerability Detection.
Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Hiroaki Inoue, Takeshi Takahashi, Sajjad Dadkhah
2025From Birthday Cheers to Privacy Fears: Unraveling the Paradox of Social Media Celebrations in Nigeria.
Victor Yisa, Rita Orji
2025G-STAR: A Threat Modeling Framework for General-Purpose AI Systems.
Pulei Xiong, Saeedeh Lohrasbi, Prini Kotian, Scott Buffett
2025Harnessing Language Models to Analyze Android App Permission Fidelity.
Yunik Tamrakar, Ritwik Banerjee, Ethan Myers, Lorenzo De Carli, Indrakshi Ray
2025Houdini: Benchmarking Container Security Confinement.
Huzaifa Patel, David Barrera, Anil Somayaji
2025Identifying and Addressing User-level Security Concerns in Smart Homes Using "Smaller" LLMs.
Hafijul Hoque Chowdhury, Riad Ahmed Anonto, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab Hossain
2025LAID: Lightweight AI-Generated Image Detection in Spatial and Spectral Domains.
Nicholas Chivaran, Jianbing Ni
2025Legal Retrieval Augmented Generation with Structured Retrieval and Iterative Refinement.
Chaitanya Dhananjay Jadhav, Chang Liu, Jun Zhao
2025Multilingual Phishing Email Detection Using Lightweight Federated Learning.
Dakota Staples, Hung Cao, Saqib Hakak, Paul Cook
2025No Safety in Numbers: Traffic Analysis of Sealed-Sender Groups in Signal.
Eric Brigham, Nicholas Hopper
2025On Feature Selection for Botnet Detection using Adaptive Exploration in Binary Particle Swarm Optimization Algorithm.
Syed Tehjeebuzzaman, Mustafa Siam-Ur-Rafique, Ashikur Rahman, Abderrahmane Leshob, Raqeebir Rab
2025Per-Attribute Privacy in Large Language Models Using Matrix-Variate Gaussian Mechanism.
Islam A. Monir, Gabriel Ghinita
2025Piecewise Linear Activations for Efficient and Secure Neural Networks with GPU Acceleration.
Hiba Guerrouache, Menatallah Fadoua Slama, Yacine Challal, Karima Benatchba
2025Privacy Preservation with Noise in Explainable AI.
Sonal Allana, Rozita Dara
2025Private Function Evaluation using CKKS-based Homomorphic Encrypted LookUp Tables.
Haoyun Zhu, Takuya Suzuki, Hayato Yamana
2025Probing AlphaFold's Input Attack Surface via Red-Teaming.
Tia Pope, Ahmad Patooghy
2025Quantum Computing Threats to Management and Operational Safeguards of IEC 62351.
Brian Goncalves, Arash Mahari, Atefeh Mashatan, Reza Arani, Marthe Kassouf
2025RF-RADS: A Robust Framework for Risk Assessment in Digital Substations.
Mahdi Abrishami, Kwasi Boakye-Boateng, Hossein Shokouhi-Nejad, Emmanuel Dana Buedi, Kishore Sreedharan, Shabnam Saderi Oskouei
2025RefPentester: A Knowledge-Informed Self-Reflective Penetration Testing Framework Based on Large Language Models.
Hanzheng Dai, Yuanliang Li, Jun Yan, Zhibo Zhang
2025Secret Sharing in 5G-MEC: Applicability for joint Security and Dependability.
Thilina Pathirana, Ruxandra F. Olimid
2025Securing Android Inter-Process Communication (IPC) Using NGAC.
Jason Simental, Elmaddin Azizli, Mahmoud Abdelgawad, Indrakshi Ray
2025Securing Multi-Domain Systems: Intelligent ABAC Policy Learning for Cross-Domain Access Control.
Asmita Biswas, Barsha Mitra, Iqbal Gondal, Qiang Fu
2025Semantic and Graph-Based Unsupervised Learning for Insider Threat Detection Using User Activity Sequences.
Neda Baghalizadeh-Moghadam, Christopher Neal, Sara Imene Boucetta, Frédéric Cuppens, Nora Boulahia-Cuppens
2025Short Training Techniques to Enhance Usability of System-Assigned PINs.
Israt Jahan Jui, Amirali Salehi-Abari, Julie Thorpe
2025Stateless Decentralized Authentication Using Segmented ZKPs for Microservices Architectures.
Vinh Quach, Ram Dantu, Sirisha Talapuru, Apurba Pokharel, Shakila Zaman
2025SynQP: A Framework and Metrics for Evaluating the Quality and Privacy Risk of Synthetic Data.
Bing Hu, Yixin Li, Asma Bahamyirou, Helen Chen
2025TFVDFuzzer: Transformer-based Fuzzing Framework for Vulnerability Detection in Modbus Protocol.
Ahmed Reda Aldysty, Nour Moustafa, Erandi Lakshika
2025TOM-Net: Few-Shot IoT Malware Classification Via Open-Set Aware Transductive Meta-Learning.
Man-Ying Chen, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi
2025Temporal-Spatial Feature Modification Attacks Against Machine Learning-Based Network Intrusion Detection Systems.
Sohini Pillay, Eeshan Walia, Christopher Yoeurng, Dongfeng Fang, Shengjie Xu
2025Toward a Lexicon for Privacy, Security, and Trust: Analysing Digital Identity in Media using NLP.
Matthew Comb, Andrew Martin
2025TrollSleuth: Behavioral and Linguistic Fingerprinting of State-Sponsored Trolls.
Havva Alizadeh Noughabi, Fattane Zarrinkalam, Abbas Yazdinejad, Ali Dehghantanha
2025Trust-Aware Federated Defense Against Data Poisoning in ML-Driven IDS For CAVs.
Mahsa Tavasoli, Abdolhossein Sarrafzadeh, Ali Karimoddini, Milad Khaleghi, Tienake Phuapaiboon, Amauri Goines, Aiden Harris, Jason Griffith
2025Using Counterfactuals for Explainable Android Malware Detection.
Maryam Tanha, Winston Zhao, Aaron Hunter, Ashkan Jangodaz
2025Verify All: Establish Bidirectional and Provable Trustworthiness in Microservices Architecture.
Vinh Quach, Ram Dantu, Sirisha Talapuru, Indravadan Patel, Alexis Blackwell