Login / Signup
ACM Trans. Priv. Secur.
2016
2019
2024
2016
2024
Keyphrases
Publications
volume 27, number 1, 2024
Maryna Kluban
,
Mohammad Mannan
,
Amr M. Youssef
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.
ACM Trans. Priv. Secur.
27 (1) (2024)
Li Tang
,
Qingqing Ye
,
Haibo Hu
,
Qiao Xue
,
Yaxin Xiao
,
Jin Li
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.
ACM Trans. Priv. Secur.
27 (1) (2024)
Jenny Ottmann
,
Frank Breitinger
,
Felix C. Freiling
An Experimental Assessment of Inconsistencies in Memory Forensics.
ACM Trans. Priv. Secur.
27 (1) (2024)
Li Wang
,
Xiangtao Meng
,
Dan Li
,
Xuhong Zhang
,
Shouling Ji
,
Shanqing Guo
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.
ACM Trans. Priv. Secur.
27 (1) (2024)
Yong Zeng
,
Jiale Liu
,
Tong Dong
,
Qingqi Pei
,
Jianfeng Ma
,
Yao Liu
Eyes See Hazy while Algorithms Recognize Who You Are.
ACM Trans. Priv. Secur.
27 (1) (2024)
Mayank Swarnkar
,
Neha Sharma
: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures.
ACM Trans. Priv. Secur.
27 (1) (2024)
Zhenpeng Shi
,
Nikolay Matyunin
,
Kalman Graffi
,
David Starobinski
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs.
ACM Trans. Priv. Secur.
27 (1) (2024)
Erik-Oliver Blass
,
Guevara Noubir
Forward Security with Crash Recovery for Secure Logs.
ACM Trans. Priv. Secur.
27 (1) (2024)
Prakash Shrestha
,
Ahmed Tanvir Mahdad
,
Nitesh Saxena
Sound-based Two-factor Authentication: Vulnerabilities and Redesign.
ACM Trans. Priv. Secur.
27 (1) (2024)
Han Cao
,
Qindong Sun
,
Yaqi Li
,
Rong Geng
,
Xiaoxiong Wang
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain.
ACM Trans. Priv. Secur.
27 (1) (2024)
Liqun Chen
,
Changyu Dong
,
Christopher J. P. Newton
,
Yalan Wang
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives.
ACM Trans. Priv. Secur.
27 (1) (2024)
Shen Wang
,
Mahshid Delavar
,
Muhammad Ajmal Azad
,
Farshad Nabizadeh
,
Steve Smith
,
Feng Hao
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur.
27 (1) (2024)
Yan Qiao
,
Kui Wu
,
Majid Khabbazian
Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network.
ACM Trans. Priv. Secur.
27 (1) (2024)
volume 27, number 2, 2024
Florian Sommer
,
Mona Gierl
,
Reiner Kriesten
,
Frank Kargl
,
Eric Sax
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats.
ACM Trans. Priv. Secur.
27 (2) (2024)
Jiayi Chen
,
Urs Hengartner
,
Hassan Khan
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android.
ACM Trans. Priv. Secur.
27 (2) (2024)
Julen Bernabé-Rodríguez
,
Albert Garreta
,
Oscar Lage
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation.
ACM Trans. Priv. Secur.
27 (2) (2024)
Namgyu Park
,
Jong Kim
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit.
ACM Trans. Priv. Secur.
27 (2) (2024)
Federico Concone
,
Salvatore Gaglio
,
Andrea Giammanco
,
Giuseppe Lo Re
,
Marco Morana
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks.
ACM Trans. Priv. Secur.
27 (2) (2024)
Markus Bayer
,
Philipp Kuehn
,
Ramin Shanehsaz
,
Christian Reuter
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain.
ACM Trans. Priv. Secur.
27 (2) (2024)
Ghader Ebrahimpour
,
Mohammad Sayad Haghighi
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions.
ACM Trans. Priv. Secur.
27 (2) (2024)
volume 26, number 2, 2023
Sohail Habib
,
Hassan Khan
,
Andrew Hamilton-Wright
,
Urs Hengartner
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks.
ACM Trans. Priv. Secur.
26 (2) (2023)
volume 26, number 3, 2023
Sijie Zhuo
,
Robert Biddle
,
Yun Sing Koh
,
Danielle M. Lottridge
,
Giovanni Russello
SoK: Human-centered Phishing Susceptibility.
ACM Trans. Priv. Secur.
26 (3) (2023)
Nada Lachtar
,
Duha Ibdah
,
Hamza Khan
,
Anys Bacha
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware.
ACM Trans. Priv. Secur.
26 (3) (2023)
Patricia Arias Cabarcos
,
Matin Fallahi
,
Thilo Habrich
,
Karen Schulze
,
Christian Becker
,
Thorsten Strufe
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices.
ACM Trans. Priv. Secur.
26 (3) (2023)
Anushka Vidanage
,
Peter Christen
,
Thilina Ranbaduge
,
Rainer Schnell
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage.
ACM Trans. Priv. Secur.
26 (3) (2023)
Gianluca Scopelliti
,
Sepideh Pouyanrad
,
Job Noorman
,
Fritz Alder
,
Christoph Baumann
,
Frank Piessens
,
Jan Tobias Mühlberg
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur.
26 (3) (2023)
Manuel Barbosa
,
Gilles Barthe
,
Benjamin Grégoire
,
Adrien Koutsos
,
Pierre-Yves Strub
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
ACM Trans. Priv. Secur.
26 (3) (2023)
Tom Bolton
,
Tooska Dargahi
,
Sana Belguith
,
Carsten Maple
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.
ACM Trans. Priv. Secur.
26 (3) (2023)
Litao Li
,
Steven H. H. Ding
,
Yuan Tian
,
Benjamin C. M. Fung
,
Philippe Charland
,
Weihan Ou
,
Leo Song
,
Congwei Chen
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur.
26 (3) (2023)
Isaiah J. King
,
H. Howie Huang
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction.
ACM Trans. Priv. Secur.
26 (3) (2023)
Yang Lu
,
Zhengxin Yu
,
Neeraj Suri
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph.
ACM Trans. Priv. Secur.
26 (3) (2023)
Chun Guo
,
Xiao Wang
,
Xiang Xie
,
Yu Yu
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur.
26 (3) (2023)
Jian Hou
,
Jing Wang
,
Mingyue Zhang
,
Zhi Jin
,
Chunlin Wei
,
Zuohua Ding
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure.
ACM Trans. Priv. Secur.
26 (3) (2023)
Isabel Wagner
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021.
ACM Trans. Priv. Secur.
26 (3) (2023)
Ranwa Al Mallah
,
Talal Halabi
,
Bilal Farooq
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems.
ACM Trans. Priv. Secur.
26 (3) (2023)
Rajagopal Venkatesaramani
,
Zhiyu Wan
,
Bradley A. Malin
,
Yevgeniy Vorobeychik
Defending Against Membership Inference Attacks on Beacon Services.
ACM Trans. Priv. Secur.
26 (3) (2023)
Sona Alex
,
Dhanaraj K. J.
,
Deepthi P. P.
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network.
ACM Trans. Priv. Secur.
26 (3) (2023)
Dmitrii Usynin
,
Daniel Rueckert
,
Georgios Kaissis
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks.
ACM Trans. Priv. Secur.
26 (3) (2023)
Seoyeon Hwang
,
Ercan Ozturk
,
Gene Tsudik
Balancing Security and Privacy in Genomic Range Queries.
ACM Trans. Priv. Secur.
26 (3) (2023)
Andreas V. Hess
,
Sebastian Alexander Mödersheim
,
Achim D. Brucker
Stateful Protocol Composition in Isabelle/HOL.
ACM Trans. Priv. Secur.
26 (3) (2023)
Hazel Murray
,
David Malone
Costs and Benefits of Authentication Advice.
ACM Trans. Priv. Secur.
26 (3) (2023)
volume 26, number 4, 2023
Shahnewaz Karim Sakib
,
George T. Amariucai
,
Yong Guan
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism.
ACM Trans. Priv. Secur.
26 (4) (2023)
Jinfu Chen
,
Luo Song
,
Saihua Cai
,
Haodi Xie
,
Shang Yin
,
Bilal Ahmad
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.
ACM Trans. Priv. Secur.
26 (4) (2023)
Dohyun Kim
,
ManGi Cho
,
Hocheol Shin
,
Jaehoon Kim
,
Juhwan Noh
,
Yongdae Kim
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting.
ACM Trans. Priv. Secur.
26 (4) (2023)
Tommaso Paladini
,
Francesco Monti
,
Mario Polino
,
Michele Carminati
,
Stefano Zanero
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies.
ACM Trans. Priv. Secur.
26 (4) (2023)
Ayoosh Bansal
,
Anant Kandikuppa
,
Monowar Hasan
,
Chien-Ying Chen
,
Adam Bates
,
Sibin Mohan
System Auditing for Real-Time Systems.
ACM Trans. Priv. Secur.
26 (4) (2023)
Chenhan Zhang
,
Shiyao Zhang
,
James J. Q. Yu
,
Shui Yu
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks.
ACM Trans. Priv. Secur.
26 (4) (2023)
Maksim Ekin Eren
,
Manish Bhattarai
,
Robert J. Joyce
,
Edward Raff
,
Charles Nicholas
,
Boian S. Alexandrov
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection.
ACM Trans. Priv. Secur.
26 (4) (2023)
Md Sajidul Islam Sajid
,
Jinpeng Wei
,
Ehab Al-Shaer
,
Qi Duan
,
Basel Abdeen
,
Latifur Khan
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception.
ACM Trans. Priv. Secur.
26 (4) (2023)
Xueluan Gong
,
Yanjiao Chen
,
Wenbin Yang
,
Huayang Huang
,
Qian Wang
: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur.
26 (4) (2023)