default search action
20th PST 2023: Copenhagen, Denmark
- 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Copenhagen, Denmark, August 21-23, 2023. IEEE 2023, ISBN 979-8-3503-1387-1
- Gaoning Pan, Tianxiang Luo, Yiming Tao, Xiao Lei, Shuangxi Chen, Hui Liu, Chunming Wu:
AMF: Efficient Browser Interprocess Communication Fuzzing. 1-6 - Mordechai Guri:
EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer. 1-11 - Sonia Kawish, Habib Louafi, Yiyu Yao:
An Instance-based Transfer Learning Approach, Applied to Intrusion Detection. 1-7 - Liang Chen, Stilianos Vidalis, Su Yang:
A Trust-Based Approach for Data Sharing in the MQTT Environment. 1-5 - Alessandro Aldini, Suzana Mesquita de Borba Maranhão Moreno, Jean-Marc Seigneur:
A Rule-Language Tailored for Financial Inclusion and KYC/AML Compliance. 1-10 - Masaya Kobayashi, Atsushi Fujioka, Koji Chida:
Extended km-Anonymity for Randomization Applied to Binary Data. 1-7 - Andres Hernandez-Matamoros, Hiroaki Kikuchi:
An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression. 1-7 - Olufunsho I. Falowo, Izunna Okpala, Emmanuel Kojo, Sylvia Worlali Azumah, Chengcheng Li:
Exploration of Various Machine Learning Techniques for Identifying and Mitigating DDoS Attacks. 1-7 - Shafayat H. Majumder, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab Hossain:
Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment Scanning. 1-10 - Tanveer Khan, Khoa Nguyen, Antonis Michalas, Alexandros Bakas:
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption. 1-7 - Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach. 1-12 - Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou:
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. 1-7 - Atsuko Miyaji, Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita, Tomoaki Mimoto:
Re-visited Privacy-Preserving Machine Learning. 1-10 - Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. 1-11 - Matthew Roffel, Xiaodong Lin:
Write Blocker for Internet of Things Flash Technologies. 1-10 - Akito Yamamoto, Tetsuo Shibuya:
Privacy-Preserving Publication of GWAS Statistics using Smooth Sensitivity. 1-12 - Kittiphop Phalakarn, Toru Nakamura, Takamasa Isohara:
Privacy-Preserving Reputation System Against Dishonest Queries. 1-9 - Fabian Willems, Carlisle Adams:
GhostBuy : An All-Steps Anonymous Purchase Platform (ASAPP) based on Separation of Data. 1-12 - Yakov Mallah, Yuval Elovici, Asaf Shabtai:
Risk Oriented Resource Allocation in Robotic Swarm. 1-7 - Ahmed Haj Abdel Khaleq, Miguel A. Garzón:
Improving Malicious PDF Detection with a Robust Stacking Ensemble Approach. 1-5 - Brennan Mosher, Xiangman Li, Yuanyuan He, Jianbing Ni:
Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted Advertising. 1-9 - Girijesh Singh, Palak Patel, Muhammad Asaduzzaman, Garima Bajwa:
Selective EEG Signal Anonymization using Multi-Objective Autoencoders. 1-7 - Simon Bertrand, Josée Desharnais, Nadia Tawbi:
Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models. 1-10 - Leila Rashidi, Windhya Hansinie Rankothge, Hesamodin Mohammadian, Rashid Hussain Khokhar, Brian Frei, Shawn Ellis, Lago Freitas, Ali Akbar Ghorbani:
Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment. 1-10 - Xiaoyuan Liu, Hongwei Li, Qinyuan Qian, Hao Ren:
Efficient Homomorphic Convolution for Secure Deep Learning Inference. 1-6 - Nuray Baltaci Akhuseyinoglu, Usman Anjum:
Geodemographic Profiling of Malicious IP addresses. 1-11 - Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Yang Liu, Kwok-Yan Lam:
ThreatLand: Extracting Intelligence from Audit Logs via NLP methods. 1-6 - Paulina Chametka, Sana Maqsood, Sonia Chiasson:
Security and Privacy Perceptions of Mental Health Chatbots. 1-7 - David W. Kravitz, Mollie Z. Halverson:
Course-Correct to DeFi Lacking Default Deficiency. 1-12 - Stephen Ly, Yuan Cheng, Haiquan Chen, Ted Krovetz:
A Secure Distributed Learning Framework Using Homomorphic Encryption. 1-9 - Dakota Staples, Saqib Hakak, Paul Cook:
A Comparison of Machine Learning Algorithms for Multilingual Phishing Detection. 1-6 - Bang Tran, Sai Harshavardhan Reddy Kona, Xiaohui Liang, Gabriel Ghinita, Caroline Summerour, John A. Batsis:
VPASS: Voice Privacy Assistant System for Monitoring In-home Voice Commands. 1-10 - Piero Romare, Victor Morel, Farzaneh Karegar, Simone Fischer-Hübner:
Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms. 1-12 - Feiyang Tang, Bjarte M. Østvold:
Transparency in App Analytics: Analyzing the Collection of User Interaction Data. 1-10 - Sigurd Eskeland:
Private set intersection using RSA subgroups with constant-size encryptions. 1-7 - Amani Mohammed Alqarni, Daniel Timko, Muhammad Lutfor Rahman:
Saudi Arabian Perspective of Security, Privacy, and Attitude of Using Facial Recognition Technology. 1-12 - Anisha Mitra, Dipanwita Roy Chowdhury:
Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter Defibrillators. 1-7 - Sascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, Toru Nakamura:
Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning. 1-7 - Alireza Parvizimosaed, Hamid Azad, Daniel Amyot, John Mylopoulos:
Protection against Ransomware in Industrial Control Systems through Decentralization using Blockchain. 1-5 - Changjin Wang, Hamid R. Sharifzadeh, Soheil Varastehpour, Iman Ardekani:
Analysis and Comparison of Deepfakes Detection Methods for Cross-Library Generalisation. 1-7 - David Hasselquist, Jacob Wahlman, Niklas Carlsson:
PET-Exchange: A Privacy Enhanced Trading Exchange using Homomorphic Encryption. 1-12 - Weimin Zhao, Qusay H. Mahmoud, Sanaa A. Alwidian:
Building Trust in Deep Learning Models via a Self- Interpretable Visual Architecture. 1-10 - Ayush Kumar, Vrizlynn L. L. Thing:
RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation. 1-12 - Guoqiang Chen, Han Gao, Jie Zhang, Yanru He, Shaoyin Cheng, Weiming Zhang:
Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation. 1-11 - Rashid Hussain Khokhar, Sajjad Dadkhah, Tianhao Zhao, Xichen Zhang, Ali A. Ghorbani:
UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor. 1-11 - Arnaud Grivet Sébert, Marina Checri, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler:
Combining homomorphic encryption and differential privacy in federated learning. 1-7 - Benjamin Fenelon, Saeede Enayati, Hossein Pishro-Nik:
Private UAV-Assisted IoT Data Collection: An Energy-Privacy Trade-off. 1-5 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner, Frédéric Tronnier:
Effectiveness and Information Quality Perception of an AI Model Card: A Study Among Non-Experts. 1-7 - Rongquan Shi, Lifei Wei, Lei Zhang:
An Efficient Federated Learning Framework for Privacy-Preserving Data Aggregation in IoT. 1-7 - Nan Cheng, Feng Zhang, Aikaterini Mitrokotsa:
Efficient Three-party Boolean-to-Arithmetic Share Conversion. 1-6 - Rim Ben Salem, Esma Aïmeur, Hicham Hage:
User modelling for privacy-aware self-disclosure. 1-8 - Haoran Deng, Xianghui Cao, Yu Cheng:
Attention in Differential Cryptanalysis on Lightweight Block Cipher SPECK. 1-9 - Yoonjib Kim, Saqib Hakak, Ali A. Ghorbani:
DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure. 1-9 - Furqan Rustam, Anca Delia Jurcut, Wajdi Aljedaani, Imran Ashraf:
Securing Multi-Environment Networks using Versatile Synthetic Data Augmentation Technique and Machine Learning Algorithms. 1-10 - Stefano Bistarelli, Andrea Imparato, Francesco Santini:
A TCP-based Covert Channel with Integrity Check and Retransmission. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.