


default search action
18th PST 2021: Auckland, New Zealand
- 18th International Conference on Privacy, Security and Trust, PST 2021, Auckland, New Zealand, December 13-15, 2021. IEEE 2021, ISBN 978-1-6654-0184-5

- Matthew Rafuse, Urs Hengartner:

PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication. 1-10 - Guiwen Luo, Shihui Fu, Guang Gong:

Updatable Linear Map Commitments and Their Applications in Elementary Databases. 1-6 - Martha N. Kamkuemah

:
Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN. 1-7 - Randolph Loh, Vrizlynn L. L. Thing:

Data Privacy in Multi-Cloud: An Enhanced Data Fragmentation Framework. 1-5 - K. N. Pavan Kumar, Marina L. Gavrilova:

User Identification in Online Social Networks using Graph Transformer Networks. 1-10 - Yiran Li, Guiqiang Hu, Xiaoyuan Liu, Zuobin Ying

:
Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack. 1-5 - Michele Fontana, Francesca Naretto, Anna Monreale:

A new approach for cross-silo federated learning and its privacy risks. 1-10 - Abdarahmane Wone, Joël Di Manno, Christophe Charrier, Christophe Rosenberger

:
Impact Of Environmental Conditions On Fingerprint Systems Performance. 1-5 - Arthur Drichel, Mehdi Akbari Gurabi

, Tim Amelung, Ulrike Meyer:
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection. 1-10 - Xubin Jiao, Jinguo Li:

An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism. 1-6 - Srinidhi Madabhushi, Rinku Dewri:

Detection of Demand Manipulation Attacks on a Power Grid. 1-7 - Tasnia Heya Ashrafi, Abdul Serwadda, Isaac Griswold-Steiner, Richard Matovu:

A Wearables-Driven Attack on Examination Proctoring. 1-7 - Troya Çagil Köylü, Cezar Rodolfo Wedig Reinbrecht

, Said Hamdioui, Mottaqiallah Taouil:
Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks. 1-10 - Mansour Aldawood, Arshad Jhumka:

Secure Allocation for Graph-Based Virtual Machines in Cloud Environments. 1-7 - Andrick Adhikari, Rinku Dewri:

Towards Change Detection in Privacy Policies with Natural Language Processing. 1-10 - Lav Gupta:

Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks. 1-8 - Miao He, Xiangman Li, Jianbing Ni, Haomiao Yang:

Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks. 1-10 - Wensheng Zhang, Trent Muhr:

TEE-based Selective Testing of Local Workers in Federated Learning Systems. 1-6 - Jonathan Godin, Philippe Lamontagne:

Deletion-Compliance in the Absence of Privacy. 1-10 - Ganyu Wang

, Miguel Vargas Martin:
SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion. 1-12 - Sanaz Nakhodchi, Behrouz Zolfaghari

, Abbas Yazdinejad, Ali Dehghantanha:
SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning. 1-8 - Noreddine Belhadj Cheikh, Abdessamad Imine, Michaël Rusinowitch:

FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media. 1-10 - Atthapan Daramas, Vimal Kumar

:
Searching on Non-Systematic Erasure Codes. 1-8 - Steffen Enders, Mariia Rybalka, Elmar Padilla:

PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms. 1-7 - Farzana Zahid, Matthew M. Y. Kuo, Roopak Sinha:

Light-Weight Active Security for Detecting DDoS Attacks in Containerised ICPS. 1-5 - Kathrin Garb

, Johannes Obermaier
, Elischa Ferres, Martin Künig:
FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor. 1-12 - Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:

Dazed and Confused: What's Wrong with Crypto Libraries? 1-6 - Adrian Wood

, Michael N. Johnstone:
Detection of Induced False Negatives in Malware Samples. 1-6 - Jukka Ruohonen

, Kalle Hjerppe
, Kalle Rindell:
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI. 1-10 - Ayane Sano, Yukiko Sawaya, Akira Yamada, Ayumu Kubota, Takamasa Isohara:

Designing Personalized OS Update Message based on Security Behavior Stage Model. 1-9 - Malte Breuer, Ulrike Meyer, Susanne Wetzel:

Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice. 1-7 - Farzaneh Shoeleh, Masoud Erfani, Saeed Shafiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari

, Adam Frank, Ali A. Ghorbani:
User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security. 1-10 - Florian Skopik

, Maria Leitner
:
Preparing for National Cyber Crises Using Non-linear Cyber Exercises. 1-5 - Kaja Schmidt

, Alexander Mühle, Andreas Grüner, Christoph Meinel:
Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. 1-7 - Christopher Bonk, Zach Parish

, Julie Thorpe, Amirali Salehi-Abari:
Long Passphrases: Potentials and Limits. 1-7 - René Helmke, Eugen Winter, Michael Rademacher

:
EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework. 1-7 - Fuyuan Song, Zheng Qin, Jinwen Liang

, Pulei Xiong, Xiaodong Lin:
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing. 1-9 - Andrés Rainiero Hernández Coronado, Wonjun Lee, Wei-Ming Lin:

The Race-Timing Prototype. 1-10 - Nikesh Lalchandani, Frank Jiang, Jongkil Jay Jeong

, Yevhen Zolotavkin, Robin Doss:
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials. 1-7 - Chia-Yi Wu, Tao Ban, Shin-Ming Cheng

, Bo Sun, Takeshi Takahashi:
IoT Malware Detection Using Function-Call-Graph Embedding. 1-9 - Ehsan Nazari, Paula Branco, Guy-Vincent Jourdan:

Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems. 1-10 - Christian Roth, Ngoc-Thanh Dinh, Marc Roßberger

, Dogan Kesdogan:
DaRoute: Inferring trajectories from zero-permission smartphone sensors. 1-10 - Fok Kar Wai, Vrizlynn L. L. Thing:

Clustering based opcode graph generation for malware variant detection. 1-11 - May Almousa

, Sai Basavaraju, Mohd Anwar:
API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models. 1-7 - Mini Thomas, Reza Samavi, Thomas E. Doyle:

Trust Quantification for Autonomous Medical Advisory Systems. 1-7 - Xinyuan Wang:

Practical Protection of Binary Applications via Transparent Immunization. 1-7 - Wei-Yang Chiu

, Weizhi Meng
, Wenjuan Li:
LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. 1-9 - Rahul Dubey, Miguel Vargas Martin:

Fool Me Once: A Study of Password Selection Evolution over the Past Decade. 1-7 - Kimberly García

, Zaira Zihlmann
, Simon Mayer, Aurelia Tamò-Larrieux
, Johannes Hooss:
Towards Privacy-Friendly Smart Products. 1-7 - Wensheng Zhang:

A Practical Oblivious Cloud Storage System based on TEE and Client Gateway. 1-6 - Martin Kodys, Zhi Lu, Fok Kar Wai, Vrizlynn L. L. Thing:

Intrusion Detection in Internet of Things using Convolutional Neural Networks. 1-10 - Jiacheng Jin, Yandong Zheng, Pulei Xiong:

EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences. 1-10 - Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha:

Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems. 1-6 - Sharmin Afrose

, Danfeng Daphne Yao, Olivera Kotevska:
Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data. 1-10 - Mordechai Guri:

GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication. 1-10 - Yixuan Ren, Yixin Jie, Qingtao Wang, Bingbing Zhang, Chi Zhang, Lingbo Wei:

A Hybrid Secure Computation Framework for Graph Neural Networks. 1-6 - Mohammad Mehdi Yadollahi, Arash Habibi Lashkari

, Ali A. Ghorbani:
Towards Query-efficient Black-box Adversarial Attack on Text Classification Models. 1-7 - Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari

:
A Novel Trust Model In Detecting Final-Phase Attacks in Substations. 1-11 - Pranav Kotak, Shweta Bhandari, Akka Zemmari, Jaykrishna Joshi:

Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions. 1-5 - Shu Hong, Lingjie Duan

, Jianwei Huang:
Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic Approach. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














