


default search action
ACM Transactions on Privacy and Security, Volume 28
Volume 28, Number 1, February 2025
- Blake Hayden
, Timothy Walsh
, Armon Barton
:
Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples. 1:1-1:23 - Huan Dai
, Yuefeng Chen
, Yicong Du
, Luping Wang
, Ziyu Shao
, Hongbo Liu
, Yanzhi Ren
, Jiadi Yu
, Bo Liu
:
ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis. 2:1-2:26 - Clara Bertolissi
, Maribel Fernández
, Bhavani Thuraisingham
:
Category-Based Administrative Access Control Policies. 3:1-3:35 - Pedram Hosseyni
, Ralf Küsters
, Tim Würtele
:
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process. 4:1-4:36 - Jason Crampton
, Eduard Eiben
, Gregory Z. Gutin
, Daniel Karapetyan
, Diptapriyo Majumdar
:
Bi-objective Optimization in Role Mining. 5:1-5:22 - Björn Bjurling, Shahid Raza
:
Cyber Threat Intelligence meets the Analytic Tradecraft. 6:1-6:37 - Haibin Zheng
, Jinyin Chen
, Tao Liu
, Yao Cheng
, Zhao Wang
, Yun Wang
, Lan Gao
, Shouling Ji
, Xuhong Zhang
:
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy. 7:1-7:28 - Georgios Syros
, Gökberk Yar
, Simona Boboila
, Cristina Nita-Rotaru
, Alina Oprea
:
Backdoor Attacks in Peer-to-Peer Federated Learning. 8:1-8:28 - Yubing Bao
, Jianping Zeng
, Jirui Yang
, Ruining Yang
, Zhihui Lu
:
The Effect of Domain Terms on Password Security. 9:1-9:29 - Xuejing Yuan
, Jiangshan Zhang
, Kai Chen
, Cheng'an Wei
, Ruiyuan Li
, Zhenkun Ma
, Xinqi Ling
:
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems. 10:1-10:27 - Hieu Le
, Salma Elmalaki
, Athina Markopoulou
, Zubair Shafiq
:
AutoFR: Automated Filter Rule Generation for Adblocking. 11:1-11:36 - Alessandro N. Baccarini
, Marina Blanton
, Shaofeng Zou
:
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation. 12:1-12:36
Volume 28, Number 2, May 2025
- Antonio Ruggia
, Andrea Possemato
, Savino Dambra
, Alessio Merlo
, Simone Aonzo
, Davide Balzarotti
:
The Dark Side of Native Code on Android. 13:1-13:33 - Long Chen
, Ya-Nan Li
, Qiang Tang
, Moti Yung
:
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. 14:1-14:35 - Soumyadeep Hore
, Jalal Ghadermazi
, Diwas Paudel
, Ankit Shah
, Tapas K. Das
, Nathaniel D. Bastian
:
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation. 15:1-15:33 - Srivathsan G. Morkonda
, Sonia Chiasson
, Paul C. van Oorschot
:
"Sign in with ... Privacy": Timely Disclosure of Privacy Differences among Web SSO Login Options. 16:1-16:28 - Hamid Bostani
, Zhengyu Zhao
, Zhuoran Liu
, Veelasha Moonsamy
:
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection. 17:1-17:32 - Liang Wang
, Zhuangkun Wei
, Weisi Guo
:
Multi-agent Deep Reinforcement Learning-based Key Generation for Graph Layer Security. 18:1-18:18 - Yingkai Dong
, Li Wang
, Zheng Li
, Hao Li
, Peng Tang
, Chengyu Hu
, Shanqing Guo
:
Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module. 19:1-19:28 - Danushka Bollegala
, Shuichi Otake
, Tomoya Machide
, Ken-ichi Kawarabayashi
:
A Metric Differential Privacy Mechanism for Sentence Embeddings. 20:1-20:34 - Shuaijv Fang
, Zhiyong Zhang
, Bin Song
:
Deepfake Detection Model Combining Texture Differences and Frequency Domain Information. 21:1-21:16 - Jeyamohan Neera
, Xiaomin Chen
, Nauman Aslam
, Biju Issac
:
A Trustworthy and Untraceable Centralised Payment Protocol for Mobile Payment. 22:1-22:29 - Charalampos Katsis
, Elisa Bertino
:
ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined Networks. 23:1-23:35 - Naveen Karunanayake
, Bhanuka Silva
, Yasod Ginige
, Suranga Seneviratne
, Sanjay Chawla
:
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks. 24:1-24:30 - Sulthana Shams
, Douglas J. Leith
:
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders. 25:1-25:22 - Chunghyo Kim
, Juhwan Noh
, Esmaeil Ghahremani
, Yongdae Kim
:
Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids. 26:1-26:27 - Yuxin Yang
, Qiang Li
, Yuede Ji
, Binghui Wang
:
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning. 27:1-27:19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.