| 2025 | 22nd Annual International Conference on Privacy, Security, and Trust, PST 2025, Fredericton, NB, Canada, August 26-28, 2025 |
| 2025 | A Dynamic, Context-Aware Trust Model for Distributed Computing Environments. Divya Bansal, Sabrina Dhalla, Jaspal Kaur Saini |
| 2025 | A Generic Framework for Privacy Risk Assessment of Machine Learning Models. Le Wang, Sonal Allana, Xiaowei Sun, Liang Xue, Xiaodong Lin, Rozita Dara, Pulei Xiong |
| 2025 | A Longitudinal Look at GDPR Compliance. Brian Kim, Yang Trista Cao, K. Suzanne Barber |
| 2025 | A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers. Jimmy Dani, Kalyan Nakka, Nitesh Saxena |
| 2025 | A Modeling and Static Analysis Approach for the Verification of Privacy and Safety Properties in Kotlin Android Apps. Bara' Nazzal, Manar H. Alalfi, James R. Cordy |
| 2025 | A Per-Bag Suspicion-Based Bagging Strategy for Fighting Poisoning Attacks in Classification. Aghoghomena Akasukpe, Tomi Adeyemi, Pooria Madani, Li Yang, Miguel Vargas Martin |
| 2025 | A Static Analysis of Popular C Packages in Linux. Jukka Ruohonen, Mubashrah Saddiqa, Krzysztof Sierszecki |
| 2025 | An Efficient and Privacy-Preserving AdaBoost Federated Learning Framework for AiP System. Zhuliang Jia, Suprio Ray, Rongxing Lu, Mohammad Saiful Islam Mamun |
| 2025 | An Integer Programming Framework for ReBAC Policy Mining and Optimized Conformance Testing. Padmavathi Iyer |
| 2025 | An Intelligent Framework for Deceptive Review Detection Using Advanced Trust Vector Modeling. Lily Dey, Md. Shopon, Marina L. Gavrilova |
| 2025 | Analysis of User-Generated Content to Unfold Privacy Concerns with CBDCs. Arshpreet Singh, Mohamad Sadegh Sangari, Atefeh Mashatan |
| 2025 | Assessing Privacy Practices on Ontario Municipal Websites. Adegboola David Adelabu, Yan Yan, Wenjing Zhang, Sampsa Rauti, Ville Leppänen, Zuhaibuddin Bhutto, Wenjun Lin |
| 2025 | Balancing Trade-offs: Adaptive Differential Privacy in Interpretable Machine Learning Models. Farhin Farhad Riya, Shahinul Hoque, Yingyuan Yang, Jinyuan Sun, Olivera Kotevska |
| 2025 | Beyond SSO: Mobile Money Authentication for Inclusive e-Government in Sub-Saharan Africa. Oluwole Adewusi, Wallace S. Msagusa, Jean Pierre Imanirumva, Okemawo Obadofin, Jema D. Ndibwile |
| 2025 | CHOO-PIR: Hint-Based Private Information Retrieval with Commodity Servers. Kittiphop Phalakarn, Ryuya Hayashi |
| 2025 | Characterizing Event-themed Malicious Web Campaigns: A Case Study on War-themed Websites. Maraz Mia, Mir Mehedi A. Pritom, Tariqul Islam, Shouhuai Xu |
| 2025 | Clustering Algorithms for Anomaly Detection in EVCS Infrastructure using OCPP. Chris Tchimmegne Tchassem, Yendoubé Kombate, Pierre-Martin Tardif |
| 2025 | Comparing Client- & Server-Side AEAD Encryption in Software-Defined Storage Systems. David Mohren, Minh Truong, Brett Kelly, Kenneth B. Kent |
| 2025 | Comparing Macro and Micro Approaches for Detecting Phishing Where It Spreads. Mina Erfan, Paula Branco, Guy-Vincent Jourdan |
| 2025 | Context-Aware Location De-Identification Using Denoising Diffusion. Md. Shopon, Marina L. Gavrilova |
| 2025 | Cross-Boundary Privacy-Preserving Image Learning. Atsuko Miyaji, Tomoshi Yagishita, Yuki Hyohdoh, Pierre Boudvillain |
| 2025 | Cyber Threat Mitigation with Knowledge-Infused Reinforcement Learning and LLM-Guided Policies. Md. Shamim Towhid, Shahrear Iqbal, Euclides Carlos Pinto Neto, Nashid Shahriar, Scott Buffett, Madeena Sultana, Adrian Taylor |
| 2025 | DEDALUS & ICARUS: Image Privacy Classification Systems with Risk Oriented Explanations. Hugo Rocha De Alba, Esma Aïmeur, Mohamed Loutis, Khulud Alqahtani |
| 2025 | DNS Profiler: Quantifying User Browsing Risk from DNS Traffic Patterns. Mahdi Daghmehchi Firoozjaei, Yaser Baseri, Qing Tan |
| 2025 | Database Systems Examination and Digital Forensics Tool: The Progress and Limitations. Oluwasola Mary Adedayo |
| 2025 | Detecting Deepfakes using Temporal Consistency of Facial Expression Transitions. Renjith Eettickal Chacko, Garima Bajwa |
| 2025 | Detecting Ransomware Before It Bites: A Hybrid Model Approach for Early Ransomware Detection. Sk Mahtab Uddin, Saqib Hakak, Miguel Garzón |
| 2025 | Dynamic Decentralized Social Trust for Financial Inclusion with Regulatory Compliance. Suzana Mesquita de Borba Maranhão Moreno, Alessandro Aldini, Paul-Antoine Bisgambiglia, Jean-Marc Seigneur |
| 2025 | Empirical Evaluation and Reclassification of Cryptographic Algorithms for Energy-Efficient Secure Communication in Medical IoT Devices. Sidra Anwar, Jonathan Anderson |
| 2025 | Encryption Struggles Persist: When Tech-Savvy Students Face Challenges with PGP in Thunderbird. Md Imanul Huq, Ahmed Tanvir Mahdad, Nitesh Saxena |
| 2025 | Enhancing Visual Speaker Authentication using Dynamic Lip Movement and Meta-Learning. Pooja Pathare, Garima Bajwa |
| 2025 | Evaluating Efficient Patch-Based Backdoor Attacks in Satellite Image Classification Systems. Ghazal Rahmanian, Pooria Madani |
| 2025 | Exploring the Impact of Feature Selection on Non-Stationary Intrusion Detection Models in IoT Networks. Muaan ur Rehman, Hayretdin Bahsi, Rajesh Kalakoti |
| 2025 | FactCellar: An Evidence-based Dataset for Automated Fact-Checking. Arbaaz Dharmavaram, Farrukh Bin Rashid, Saqib Hakak |
| 2025 | Formal Specification and Verification of Protection in Transit (PIT) Protocol Using UPPAAL. Takwa Rhaimi, Hamed Aghayarzadeh, Rakesh Podder, Indrakshi Ray |
| 2025 | FragmentFool: Fragment-based Adversarial Perturbation for Graph Neural Network-based Vulnerability Detection. Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Hiroaki Inoue, Takeshi Takahashi, Sajjad Dadkhah |
| 2025 | From Birthday Cheers to Privacy Fears: Unraveling the Paradox of Social Media Celebrations in Nigeria. Victor Yisa, Rita Orji |
| 2025 | G-STAR: A Threat Modeling Framework for General-Purpose AI Systems. Pulei Xiong, Saeedeh Lohrasbi, Prini Kotian, Scott Buffett |
| 2025 | Harnessing Language Models to Analyze Android App Permission Fidelity. Yunik Tamrakar, Ritwik Banerjee, Ethan Myers, Lorenzo De Carli, Indrakshi Ray |
| 2025 | Houdini: Benchmarking Container Security Confinement. Huzaifa Patel, David Barrera, Anil Somayaji |
| 2025 | Identifying and Addressing User-level Security Concerns in Smart Homes Using "Smaller" LLMs. Hafijul Hoque Chowdhury, Riad Ahmed Anonto, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab Hossain |
| 2025 | LAID: Lightweight AI-Generated Image Detection in Spatial and Spectral Domains. Nicholas Chivaran, Jianbing Ni |
| 2025 | Legal Retrieval Augmented Generation with Structured Retrieval and Iterative Refinement. Chaitanya Dhananjay Jadhav, Chang Liu, Jun Zhao |
| 2025 | Multilingual Phishing Email Detection Using Lightweight Federated Learning. Dakota Staples, Hung Cao, Saqib Hakak, Paul Cook |
| 2025 | No Safety in Numbers: Traffic Analysis of Sealed-Sender Groups in Signal. Eric Brigham, Nicholas Hopper |
| 2025 | On Feature Selection for Botnet Detection using Adaptive Exploration in Binary Particle Swarm Optimization Algorithm. Syed Tehjeebuzzaman, Mustafa Siam-Ur-Rafique, Ashikur Rahman, Abderrahmane Leshob, Raqeebir Rab |
| 2025 | Per-Attribute Privacy in Large Language Models Using Matrix-Variate Gaussian Mechanism. Islam A. Monir, Gabriel Ghinita |
| 2025 | Piecewise Linear Activations for Efficient and Secure Neural Networks with GPU Acceleration. Hiba Guerrouache, Menatallah Fadoua Slama, Yacine Challal, Karima Benatchba |
| 2025 | Privacy Preservation with Noise in Explainable AI. Sonal Allana, Rozita Dara |
| 2025 | Private Function Evaluation using CKKS-based Homomorphic Encrypted LookUp Tables. Haoyun Zhu, Takuya Suzuki, Hayato Yamana |
| 2025 | Probing AlphaFold's Input Attack Surface via Red-Teaming. Tia Pope, Ahmad Patooghy |
| 2025 | Quantum Computing Threats to Management and Operational Safeguards of IEC 62351. Brian Goncalves, Arash Mahari, Atefeh Mashatan, Reza Arani, Marthe Kassouf |
| 2025 | RF-RADS: A Robust Framework for Risk Assessment in Digital Substations. Mahdi Abrishami, Kwasi Boakye-Boateng, Hossein Shokouhi-Nejad, Emmanuel Dana Buedi, Kishore Sreedharan, Shabnam Saderi Oskouei |
| 2025 | RefPentester: A Knowledge-Informed Self-Reflective Penetration Testing Framework Based on Large Language Models. Hanzheng Dai, Yuanliang Li, Jun Yan, Zhibo Zhang |
| 2025 | Secret Sharing in 5G-MEC: Applicability for joint Security and Dependability. Thilina Pathirana, Ruxandra F. Olimid |
| 2025 | Securing Android Inter-Process Communication (IPC) Using NGAC. Jason Simental, Elmaddin Azizli, Mahmoud Abdelgawad, Indrakshi Ray |
| 2025 | Securing Multi-Domain Systems: Intelligent ABAC Policy Learning for Cross-Domain Access Control. Asmita Biswas, Barsha Mitra, Iqbal Gondal, Qiang Fu |
| 2025 | Semantic and Graph-Based Unsupervised Learning for Insider Threat Detection Using User Activity Sequences. Neda Baghalizadeh-Moghadam, Christopher Neal, Sara Imene Boucetta, Frédéric Cuppens, Nora Boulahia-Cuppens |
| 2025 | Short Training Techniques to Enhance Usability of System-Assigned PINs. Israt Jahan Jui, Amirali Salehi-Abari, Julie Thorpe |
| 2025 | Stateless Decentralized Authentication Using Segmented ZKPs for Microservices Architectures. Vinh Quach, Ram Dantu, Sirisha Talapuru, Apurba Pokharel, Shakila Zaman |
| 2025 | SynQP: A Framework and Metrics for Evaluating the Quality and Privacy Risk of Synthetic Data. Bing Hu, Yixin Li, Asma Bahamyirou, Helen Chen |
| 2025 | TFVDFuzzer: Transformer-based Fuzzing Framework for Vulnerability Detection in Modbus Protocol. Ahmed Reda Aldysty, Nour Moustafa, Erandi Lakshika |
| 2025 | TOM-Net: Few-Shot IoT Malware Classification Via Open-Set Aware Transductive Meta-Learning. Man-Ying Chen, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi |
| 2025 | Temporal-Spatial Feature Modification Attacks Against Machine Learning-Based Network Intrusion Detection Systems. Sohini Pillay, Eeshan Walia, Christopher Yoeurng, Dongfeng Fang, Shengjie Xu |
| 2025 | Toward a Lexicon for Privacy, Security, and Trust: Analysing Digital Identity in Media using NLP. Matthew Comb, Andrew Martin |
| 2025 | TrollSleuth: Behavioral and Linguistic Fingerprinting of State-Sponsored Trolls. Havva Alizadeh Noughabi, Fattane Zarrinkalam, Abbas Yazdinejad, Ali Dehghantanha |
| 2025 | Trust-Aware Federated Defense Against Data Poisoning in ML-Driven IDS For CAVs. Mahsa Tavasoli, Abdolhossein Sarrafzadeh, Ali Karimoddini, Milad Khaleghi, Tienake Phuapaiboon, Amauri Goines, Aiden Harris, Jason Griffith |
| 2025 | Using Counterfactuals for Explainable Android Malware Detection. Maryam Tanha, Winston Zhao, Aaron Hunter, Ashkan Jangodaz |
| 2025 | Verify All: Establish Bidirectional and Provable Trustworthiness in Microservices Architecture. Vinh Quach, Ram Dantu, Sirisha Talapuru, Indravadan Patel, Alexis Blackwell |