


default search action
20th PST 2023: Copenhagen, Denmark
- 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Copenhagen, Denmark, August 21-23, 2023. IEEE 2023, ISBN 979-8-3503-1387-1

- Gaoning Pan, Tianxiang Luo, Yiming Tao, Xiao Lei, Shuangxi Chen, Hui Liu, Chunming Wu:

AMF: Efficient Browser Interprocess Communication Fuzzing. 1-6 - Mordechai Guri:

EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer. 1-11 - Sonia Kawish, Habib Louafi, Yiyu Yao:

An Instance-based Transfer Learning Approach, Applied to Intrusion Detection. 1-7 - Liang Chen

, Stilianos Vidalis, Su Yang:
A Trust-Based Approach for Data Sharing in the MQTT Environment. 1-5 - Alessandro Aldini

, Suzana Mesquita de Borba Maranhão Moreno, Jean-Marc Seigneur
:
A Rule-Language Tailored for Financial Inclusion and KYC/AML Compliance. 1-10 - Masaya Kobayashi, Atsushi Fujioka, Koji Chida:

Extended km-Anonymity for Randomization Applied to Binary Data. 1-7 - Andres Hernandez-Matamoros, Hiroaki Kikuchi:

An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression. 1-7 - Olufunsho I. Falowo

, Izunna Okpala, Emmanuel Kojo
, Sylvia Worlali Azumah, Chengcheng Li:
Exploration of Various Machine Learning Techniques for Identifying and Mitigating DDoS Attacks. 1-7 - Shafayat H. Majumder, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab Hossain:

Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment Scanning. 1-10 - Tanveer Khan, Khoa Nguyen, Antonis Michalas

, Alexandros Bakas:
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption. 1-7 - Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari

:
Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach. 1-12 - Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou:

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. 1-7 - Atsuko Miyaji

, Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita, Tomoaki Mimoto:
Re-visited Privacy-Preserving Machine Learning. 1-10 - Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. 1-11 - Matthew Roffel, Xiaodong Lin:

Write Blocker for Internet of Things Flash Technologies. 1-10 - Akito Yamamoto

, Tetsuo Shibuya:
Privacy-Preserving Publication of GWAS Statistics using Smooth Sensitivity. 1-12 - Kittiphop Phalakarn, Toru Nakamura, Takamasa Isohara:

Privacy-Preserving Reputation System Against Dishonest Queries. 1-9 - Fabian Willems, Carlisle Adams:

GhostBuy : An All-Steps Anonymous Purchase Platform (ASAPP) based on Separation of Data. 1-12 - Yakov Mallah, Yuval Elovici, Asaf Shabtai:

Risk Oriented Resource Allocation in Robotic Swarm. 1-7 - Ahmed Haj Abdel Khaleq, Miguel A. Garzón:

Improving Malicious PDF Detection with a Robust Stacking Ensemble Approach. 1-5 - Brennan Mosher, Xiangman Li, Yuanyuan He, Jianbing Ni:

Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted Advertising. 1-9 - Girijesh Singh, Palak Patel, Muhammad Asaduzzaman, Garima Bajwa:

Selective EEG Signal Anonymization using Multi-Objective Autoencoders. 1-7 - Simon Bertrand, Josée Desharnais, Nadia Tawbi

:
Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models. 1-10 - Leila Rashidi, Windhya Hansinie Rankothge, Hesamodin Mohammadian, Rashid Hussain Khokhar, Brian Frei, Shawn Ellis, Lago Freitas, Ali Akbar Ghorbani:

Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment. 1-10 - Xiaoyuan Liu, Hongwei Li, Qinyuan Qian, Hao Ren:

Efficient Homomorphic Convolution for Secure Deep Learning Inference. 1-6 - Nuray Baltaci Akhuseyinoglu, Usman Anjum:

Geodemographic Profiling of Malicious IP addresses. 1-11 - Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Yang Liu

, Kwok-Yan Lam:
ThreatLand: Extracting Intelligence from Audit Logs via NLP methods. 1-6 - Paulina Chametka, Sana Maqsood, Sonia Chiasson:

Security and Privacy Perceptions of Mental Health Chatbots. 1-7 - David W. Kravitz, Mollie Z. Halverson:

Course-Correct to DeFi Lacking Default Deficiency. 1-12 - Stephen Ly, Yuan Cheng

, Haiquan Chen, Ted Krovetz:
A Secure Distributed Learning Framework Using Homomorphic Encryption. 1-9 - Dakota Staples

, Saqib Hakak, Paul Cook:
A Comparison of Machine Learning Algorithms for Multilingual Phishing Detection. 1-6 - Bang Tran, Sai Harshavardhan Reddy Kona, Xiaohui Liang

, Gabriel Ghinita, Caroline Summerour, John A. Batsis:
VPASS: Voice Privacy Assistant System for Monitoring In-home Voice Commands. 1-10 - Piero Romare

, Victor Morel, Farzaneh Karegar, Simone Fischer-Hübner:
Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms. 1-12 - Feiyang Tang

, Bjarte M. Østvold:
Transparency in App Analytics: Analyzing the Collection of User Interaction Data. 1-10 - Sigurd Eskeland:

Private set intersection using RSA subgroups with constant-size encryptions. 1-7 - Amani Mohammed Alqarni, Daniel Timko, Muhammad Lutfor Rahman:

Saudi Arabian Perspective of Security, Privacy, and Attitude of Using Facial Recognition Technology. 1-12 - Anisha Mitra, Dipanwita Roy Chowdhury:

Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter Defibrillators. 1-7 - Sascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, Toru Nakamura:

Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning. 1-7 - Alireza Parvizimosaed, Hamid Azad, Daniel Amyot, John Mylopoulos:

Protection against Ransomware in Industrial Control Systems through Decentralization using Blockchain. 1-5 - Changjin Wang, Hamid R. Sharifzadeh, Soheil Varastehpour, Iman Ardekani

:
Analysis and Comparison of Deepfakes Detection Methods for Cross-Library Generalisation. 1-7 - David Hasselquist, Jacob Wahlman, Niklas Carlsson:

PET-Exchange: A Privacy Enhanced Trading Exchange using Homomorphic Encryption. 1-12 - Weimin Zhao, Qusay H. Mahmoud, Sanaa A. Alwidian:

Building Trust in Deep Learning Models via a Self- Interpretable Visual Architecture. 1-10 - Ayush Kumar, Vrizlynn L. L. Thing:

RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation. 1-12 - Guoqiang Chen, Han Gao, Jie Zhang, Yanru He, Shaoyin Cheng, Weiming Zhang:

Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation. 1-11 - Rashid Hussain Khokhar, Sajjad Dadkhah, Tianhao Zhao, Xichen Zhang, Ali A. Ghorbani:

UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor. 1-11 - Arnaud Grivet Sébert

, Marina Checri, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler
:
Combining homomorphic encryption and differential privacy in federated learning. 1-7 - Benjamin Fenelon, Saeede Enayati, Hossein Pishro-Nik:

Private UAV-Assisted IoT Data Collection: An Energy-Privacy Trade-off. 1-5 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner, Frédéric Tronnier:

Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts. 1-7 - Rongquan Shi, Lifei Wei, Lei Zhang:

An Efficient Federated Learning Framework for Privacy-Preserving Data Aggregation in IoT. 1-7 - Nan Cheng, Feng Zhang, Aikaterini Mitrokotsa:

Efficient Three-party Boolean-to-Arithmetic Share Conversion. 1-6 - Rim Ben Salem, Esma Aïmeur, Hicham Hage:

User modelling for privacy-aware self-disclosure. 1-8 - Haoran Deng, Xianghui Cao, Yu Cheng:

Attention in Differential Cryptanalysis on Lightweight Block Cipher SPECK. 1-9 - Yoonjib Kim, Saqib Hakak, Ali A. Ghorbani:

DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure. 1-9 - Furqan Rustam, Anca Delia Jurcut

, Wajdi Aljedaani, Imran Ashraf:
Securing Multi-Environment Networks using Versatile Synthetic Data Augmentation Technique and Machine Learning Algorithms. 1-10 - Stefano Bistarelli, Andrea Imparato, Francesco Santini:

A TCP-based Covert Channel with Integrity Check and Retransmission. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














