History
PST 2023, DenmarkPST 2022, Canada
PST 2021, New Zealand
PST 2019, Canada
PST 2018, UK
PST 2017, Canada
PST 2016, New Zealand
PST 2015, Turkey
PST 2014, Canada
PST 2013, Catalonia
PST 2012, France
PST 2011, Canada
PST 2010, Canada
PST 2009, Canada
PST 2008, Canada
PST 2007, Canada
PST 2006, Canada
PST 2005, Canada
PST 2004, Canada
Accepted Papers:
Track: Privacy
- Mst Mahamuda Sarkar Mithila, Fangyi Yu, Miguel Vargas Martin and Shengqian Wang - Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and Comprehension
- Costanza Alfieri, Suryia Ganesh, Limin Ge, Jingxin Shi and Norman Sadeh - Exploring Sensitivity in Amazon Reviews: Detection and Rephrasing with ChatGPT
- Malte Breuer, Ulrike Meyer and Susanne Wetzel - Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange
- Jesse Merhi, Erik Buchholz and Salil S. Kanhere - Synthetic Trajectory Generation Through Convolutional Neural Networks
- Atthapan Daramas, Vimal Kumar and Marinho Barcellos - Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction
- Jinglin Sun, Basem Suleiman and Imdad Ullah - Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark Analysis
- Masaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai and Kan Yasuda - $Pk$-Anonymization Meets Differential Privacy
- Huanyi Ye, Ziyao Liu, Yu Jiang, Jiale Guo and Kwok-Yan Lam - Malicious Unlearning in Ensemble Models
- Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa - Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives
- Mahmuda Akter, Nour Moustafa and Benjamin Turnbull - PEL: Privacy Embedded Learning in Smart Healthcare Systems
- Juliet Samandari and Clémentine Gritti - Post Quantum Authentication and Integrity in 3-Layer IoT Architectures
- Duc-Thuan Dam, Trong-Hung Nguyen, Thai-Ha Tran, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang and Cong-Kha Pham - An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum Cryptography
- Sandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler and Daniela Schneider - DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials
- Ahmed Tanvir Mahdad and Nitesh Saxena - Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge
- Mohammed-El-Amin Tebib, Oum-El-Kheir Aktouf, Pascal André and Mariem Graa - XXXBench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android
- Mohamed Abdelsalam, Isaac Mpidi Bita, Simon Greiner, Oum-El-Kheir Aktouf and Annabelle Mercier - Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation
- Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak and Surya Nepal - Efficient Data Security Using Predictions of File Availability on the Web
- William Aiken, Paula Branco and Guy-Vincent Jourdan - DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models
- Anuradha Mandal and Nitesh Saxena - Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body Postures
- Zehui Tang, Shengke Zeng, Song Han, Qi Yu, Shihai Jiang and Peng Chen - DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments
- Ross Porter, Morteza Biglari-Abhari, Duleepa Thrimawithana and Benjamin Tan - Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities
- Hesamodin Mohammadian, Arash Habibi Lashkari and Ali Ghorbani - Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial Attacks
- Saurabh Anand, Shubham Malaviya, Manish Shukla and Sachin Lodha - CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language Model
- Abdelfattah Amamra, Rym Khettab and Raissa Mezine - Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data Processing
- Brooke Kidmose and Weizhi Meng - can-fp: An attack-aware analysis of false alarms in automotive intrusion detection models
- Arthur Drichel and Ulrike Meyer - A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection
- Huong Nguyen, Hong-Tri Nguyen, Lauri Loven and Susanna Pirttikangas - Stake-Driven Rewards and Log-Based Free Rider Detection in Federated Learning
- Qi Li and Xiaodong Lin - Proactive Audio Authentication using Speaker Identity Watermarking
- Raymond K. Zhao, Nazatul H. Sultan, Phillip Yialeloglou, Dongxi Liu, David Liebowitz and Josef Pieprzyk - MIKA: A Minimalist Approach to Hybrid Key Exchange
- Guibin Zhao, Pengfei Li, Zhibo Zhang, Fusen Guo, Xueting Huang, Wei Xu, Jinyin Wang and Jianlong Chen - Towards SAR Automatic Target Recognition Multi- Category SAR Image Classification Based on Light Weight Vision Transformer
- Mohammad Goudarzi, Arash Shaghaghi, Simon Finn and Sanjay Jha - Lack of Systematic Approach to Security of IoT Context Sharing Platforms
- Emma Romanous and Jeremy Ginger - AI Efficiency in Cybersecurity: Estimating Token Consumption for Optimal Operations
- Bruno Santos, Rogério Costa and Leonel Santos - Cybersecurity in Industry 5.0: Open Challenges and Future Direction
- Rishabh Kumar, Rohit Gupta, Sutapa Mondal, Mangesh Gharote, Praveen Gauravaram and Sachin Lodha - Privacy Preservation in Service Operations by Minimizing Sensitive Data Exposure
- Mohammad Nosouhi, Zubair Baig, Robin Doss, Praveen Gauravaram, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood and Lei Pan - The Value of Strong Identity and Access Management for ICS/OT Security
- Joao Pedro Alonso Almeida, Gowri Ramachandran, Paul Ashley, Raja Jurdak, Steven McCown and Jo Ueyama - Towards a Portability Scheme for Decentralized Identifiers in Self-Sovereign Identities
- Zhibo Zhang, Jiankun Hu, Hemanshu Pota, Shabnam Kasra Kermanshahi, Benjamin Turnbull, Ernesto Damiani, Chan Yeob Yeun - Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids
- Jason Ford and Caleb House - Insource vs Outsourcing Offensive Security Operations
- Thai-Ha Tran, Duc-Thuan Dam, Binh Kieu-Do-Nguyen, Van-Phuc Hoang, Trong-Thuc Hoang and Cong-Kha Pham - Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks
Important Dates
Paper Submission:May 18, 2024, 11:59pm (AoE)
Acceptance Notification:
July 1, 2024
Camera-Ready:
July 17, 2024
Conference Date:
August 28-30, 2024