


default search action
ACM Transactions on Privacy and Security, Volume 29
Volume 29, Number 1, February 2026
- Jiadi Ma, Tianqi Peng, Bei Gong, Muhammad Waqas, Hisham Alasmary, Sheng Chen:

Efficient Privacy-Preserving Conjunctive Searchable Encryption for Cloud-IoT Healthcare Systems. 1:1-1:27 - Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:

SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting. 2:1-2:35 - Priyabrata Dash, Fagul Pandey, Monalisa Sarma, Debasis Samanta:

Dynamic Privacy-preserving Identity Generation from Fingerprint Sensor Data for Secure Applications. 3:1-3:35 - Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen:

VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain Based Virtual Power Plants. 4:1-4:35 - Yong Cheol Kim, ChanJae Lee, Young Yoon:

Payload-Aware Intrusion Detection with CMAE and Large Language Models. 5:1-5:30 - Rujia Chen, Yi Xie, Minglang Liao, Jiankun Hu, Xingcheng Liu:

Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation. 6:1-6:27 - Joshua Groen, Simone Divalerio, Imtiaz Karim, Davide Villa, Yiwei Zhang, Leonardo Bonati, Michele Polese, Salvo D'Oro, Tommaso Melodia, Elisa Bertino, Francesca Cuomo, Kaushik R. Chowdhury:

TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments. 7:1-7:30 - Yuan Xun, Zilong Zhao, Jiayu Li, Prosanta Gope, Biplab Sikdar:

VFLGAN-TS: Vertical Federated Learning-based Generative Adversarial Networks for Publication of Vertically Partitioned Time-series Data. 8:1-8:34 - Xiaokai Yan, Yunji Liang, Lei Liu, Sagar Samtani, Bin Guo, Zhiwen Yu:

VoiceFormer: Fusing Non-Acoustic Motion Sensors for High-Fidelity Voice Synthesis in Mobile Devices. 9:1-9:25 - Liwei Deng, Yunlong Zhu, Fei Chen, Liangchao Gao:

Deepfake Video Detection Based on Improved EfficientNetV2S and Transformer Network. 10:1-10:19 - Shiyun Wang, Qiang Ye, Yujie Tang:

IEDL-IDS: An Image-Enhanced Encoder-Based Deep Learning Scheme for Intrusion Detection Systems. 11:1-11:35 - Isabella Mastroeni, Michele Pasqua:

Abstract Interpretation-based Verification for Confidentiality: Information Hiding and Code Protection by Abstract Interpretation. 12:1-12:30

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














