Sign in
ACM Trans. Priv. Secur.
2016
2019
2021
2024
2016
2024
Keyphrases
Publications
volume 27, number 1, 2024
Yan Qiao
,
Kui Wu
,
Majid Khabbazian
Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network.
ACM Trans. Priv. Secur.
27 (1) (2024)
Li Wang
,
Xiangtao Meng
,
Dan Li
,
Xuhong Zhang
,
Shouling Ji
,
Shanqing Guo
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.
ACM Trans. Priv. Secur.
27 (1) (2024)
Liqun Chen
,
Changyu Dong
,
Christopher J. P. Newton
,
Yalan Wang
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives.
ACM Trans. Priv. Secur.
27 (1) (2024)
Shen Wang
,
Mahshid Delavar
,
Muhammad Ajmal Azad
,
Farshad Nabizadeh
,
Steve Smith
,
Feng Hao
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur.
27 (1) (2024)
Erik-Oliver Blass
,
Guevara Noubir
Forward Security with Crash Recovery for Secure Logs.
ACM Trans. Priv. Secur.
27 (1) (2024)
Li Tang
,
Qingqing Ye
,
Haibo Hu
,
Qiao Xue
,
Yaxin Xiao
,
Jin Li
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection.
ACM Trans. Priv. Secur.
27 (1) (2024)
Jenny Ottmann
,
Frank Breitinger
,
Felix C. Freiling
An Experimental Assessment of Inconsistencies in Memory Forensics.
ACM Trans. Priv. Secur.
27 (1) (2024)
Yong Zeng
,
Jiale Liu
,
Tong Dong
,
Qingqi Pei
,
Jianfeng Ma
,
Yao Liu
Eyes See Hazy while Algorithms Recognize Who You Are.
ACM Trans. Priv. Secur.
27 (1) (2024)
Mayank Swarnkar
,
Neha Sharma
: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures.
ACM Trans. Priv. Secur.
27 (1) (2024)
Maryna Kluban
,
Mohammad Mannan
,
Amr M. Youssef
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.
ACM Trans. Priv. Secur.
27 (1) (2024)
Zhenpeng Shi
,
Nikolay Matyunin
,
Kalman Graffi
,
David Starobinski
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs.
ACM Trans. Priv. Secur.
27 (1) (2024)
Han Cao
,
Qindong Sun
,
Yaqi Li
,
Rong Geng
,
Xiaoxiong Wang
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain.
ACM Trans. Priv. Secur.
27 (1) (2024)
Prakash Shrestha
,
Ahmed Tanvir Mahdad
,
Nitesh Saxena
Sound-based Two-factor Authentication: Vulnerabilities and Redesign.
ACM Trans. Priv. Secur.
27 (1) (2024)
volume 26, number 2, 2023
Sohail Habib
,
Hassan Khan
,
Andrew Hamilton-Wright
,
Urs Hengartner
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks.
ACM Trans. Priv. Secur.
26 (2) (2023)
David Barrera
,
Christopher Bellman
,
Paul C. van Oorschot
Security Best Practices: A Critical Analysis Using IoT as a Case Study.
ACM Trans. Priv. Secur.
26 (2) (2023)
Savino Dambra
,
Leyla Bilge
,
Davide Balzarotti
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments.
ACM Trans. Priv. Secur.
26 (2) (2023)
Farzana Ahamed Bhuiyan
,
Akond Rahman
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects.
ACM Trans. Priv. Secur.
26 (2) (2023)
Lesly-Ann Daniel
,
Sébastien Bardin
,
Tamara Rezk
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure.
ACM Trans. Priv. Secur.
26 (2) (2023)
Giorgio Di Tizio
,
Patrick Speicher
,
Milivoj Simeonovski
,
Michael Backes
,
Ben Stock
,
Robert Künnemann
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice.
ACM Trans. Priv. Secur.
26 (2) (2023)
Ranya Aloufi
,
Hamed Haddadi
,
David Boyle
Paralinguistic Privacy Protection at the Edge.
ACM Trans. Priv. Secur.
26 (2) (2023)
Ahmed Amro
,
Vasileios Gkioulos
,
Sokratis K. Katsikas
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework.
ACM Trans. Priv. Secur.
26 (2) (2023)
volume 26, number 3, 2023
Ranwa Al Mallah
,
Talal Halabi
,
Bilal Farooq
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems.
ACM Trans. Priv. Secur.
26 (3) (2023)
Sijie Zhuo
,
Robert Biddle
,
Yun Sing Koh
,
Danielle M. Lottridge
,
Giovanni Russello
SoK: Human-centered Phishing Susceptibility.
ACM Trans. Priv. Secur.
26 (3) (2023)
Nada Lachtar
,
Duha Ibdah
,
Hamza Khan
,
Anys Bacha
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware.
ACM Trans. Priv. Secur.
26 (3) (2023)
Rajagopal Venkatesaramani
,
Zhiyu Wan
,
Bradley A. Malin
,
Yevgeniy Vorobeychik
Defending Against Membership Inference Attacks on Beacon Services.
ACM Trans. Priv. Secur.
26 (3) (2023)
Patricia Arias Cabarcos
,
Matin Fallahi
,
Thilo Habrich
,
Karen Schulze
,
Christian Becker
,
Thorsten Strufe
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices.
ACM Trans. Priv. Secur.
26 (3) (2023)
Anushka Vidanage
,
Peter Christen
,
Thilina Ranbaduge
,
Rainer Schnell
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage.
ACM Trans. Priv. Secur.
26 (3) (2023)
Gianluca Scopelliti
,
Sepideh Pouyanrad
,
Job Noorman
,
Fritz Alder
,
Christoph Baumann
,
Frank Piessens
,
Jan Tobias Mühlberg
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur.
26 (3) (2023)
Manuel Barbosa
,
Gilles Barthe
,
Benjamin Grégoire
,
Adrien Koutsos
,
Pierre-Yves Strub
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
ACM Trans. Priv. Secur.
26 (3) (2023)
Tom Bolton
,
Tooska Dargahi
,
Sana Belguith
,
Carsten Maple
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.
ACM Trans. Priv. Secur.
26 (3) (2023)
Litao Li
,
Steven H. H. Ding
,
Yuan Tian
,
Benjamin C. M. Fung
,
Philippe Charland
,
Weihan Ou
,
Leo Song
,
Congwei Chen
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur.
26 (3) (2023)
Isaiah J. King
,
H. Howie Huang
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction.
ACM Trans. Priv. Secur.
26 (3) (2023)
Yang Lu
,
Zhengxin Yu
,
Neeraj Suri
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph.
ACM Trans. Priv. Secur.
26 (3) (2023)
Chun Guo
,
Xiao Wang
,
Xiang Xie
,
Yu Yu
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur.
26 (3) (2023)
Jian Hou
,
Jing Wang
,
Mingyue Zhang
,
Zhi Jin
,
Chunlin Wei
,
Zuohua Ding
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure.
ACM Trans. Priv. Secur.
26 (3) (2023)
Isabel Wagner
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021.
ACM Trans. Priv. Secur.
26 (3) (2023)
Sona Alex
,
Dhanaraj K. J.
,
Deepthi P. P.
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network.
ACM Trans. Priv. Secur.
26 (3) (2023)
Dmitrii Usynin
,
Daniel Rueckert
,
Georgios Kaissis
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks.
ACM Trans. Priv. Secur.
26 (3) (2023)
Seoyeon Hwang
,
Ercan Ozturk
,
Gene Tsudik
Balancing Security and Privacy in Genomic Range Queries.
ACM Trans. Priv. Secur.
26 (3) (2023)
Andreas V. Hess
,
Sebastian Alexander Mödersheim
,
Achim D. Brucker
Stateful Protocol Composition in Isabelle/HOL.
ACM Trans. Priv. Secur.
26 (3) (2023)
Hazel Murray
,
David Malone
Costs and Benefits of Authentication Advice.
ACM Trans. Priv. Secur.
26 (3) (2023)
volume 26, number 4, 2023
Jinfu Chen
,
Luo Song
,
Saihua Cai
,
Haodi Xie
,
Shang Yin
,
Bilal Ahmad
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.
ACM Trans. Priv. Secur.
26 (4) (2023)
Shahnewaz Karim Sakib
,
George T. Amariucai
,
Yong Guan
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism.
ACM Trans. Priv. Secur.
26 (4) (2023)
Tommaso Paladini
,
Francesco Monti
,
Mario Polino
,
Michele Carminati
,
Stefano Zanero
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies.
ACM Trans. Priv. Secur.
26 (4) (2023)
Ayoosh Bansal
,
Anant Kandikuppa
,
Monowar Hasan
,
Chien-Ying Chen
,
Adam Bates
,
Sibin Mohan
System Auditing for Real-Time Systems.
ACM Trans. Priv. Secur.
26 (4) (2023)
Chenhan Zhang
,
Shiyao Zhang
,
James J. Q. Yu
,
Shui Yu
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks.
ACM Trans. Priv. Secur.
26 (4) (2023)
Dohyun Kim
,
ManGi Cho
,
Hocheol Shin
,
Jaehoon Kim
,
Juhwan Noh
,
Yongdae Kim
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting.
ACM Trans. Priv. Secur.
26 (4) (2023)
Maksim Ekin Eren
,
Manish Bhattarai
,
Robert J. Joyce
,
Edward Raff
,
Charles Nicholas
,
Boian S. Alexandrov
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection.
ACM Trans. Priv. Secur.
26 (4) (2023)
Md Sajidul Islam Sajid
,
Jinpeng Wei
,
Ehab Al-Shaer
,
Qi Duan
,
Basel Abdeen
,
Latifur Khan
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception.
ACM Trans. Priv. Secur.
26 (4) (2023)
Xueluan Gong
,
Yanjiao Chen
,
Wenbin Yang
,
Huayang Huang
,
Qian Wang
: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur.
26 (4) (2023)