Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyJanuary 2025
An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools
ACM Computing Surveys (CSUR), Volume 57, Issue 5Article No.: 128, Pages 1–32https://doi.org/10.1145/3711117Passwords remain the primary authentication method in online services, a domain increasingly crucial in our digital age. However, passwords suffer from several well-documented security and usability issues. Addressing these concerns, password managers and ...
- research-articleJanuary 2025
Biodigital Literacy through Intimate Data: User Perceptions of FemTech and Pelvic Floor Training Devices
Communication Design Quarterly (SIGDOC-CDQ), Volume 12, Issue 2Pages 74–85https://doi.org/10.1145/3655727.3655735The FemTech industry, a booming segment of the health technology market, trades in feminist empowerment largely by data tracking and collection. As issues of privacy and surveillance related to users' data collection have grown, scholars in health, ...
- research-articleJanuary 2025
Crumbled Cookies: Exploring E-commerce Websites’ Cookie Policies with Data Protection Regulations
ACM Transactions on the Web (TWEB), Volume 19, Issue 1Article No.: 5, Pages 1–24https://doi.org/10.1145/3708515Despite stringent data protection regulations, such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other country-specific laws, numerous websites continue to use cookies to track user activities, raising ...
- research-articleJanuary 2025
The Influence of Anonymity and Social Ties on Personal Experience Sharing: A Comprehensive Mixed-Methods Study
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 9, Issue 1Article No.: GROUP31, Pages 1–22https://doi.org/10.1145/3701210Personal experiences are widely shared and varied among types of social media. This study aims to understand how social ties (acquaintance & stranger) and anonymity (real-name & anonymous) of social platforms affect users' willingness to share and post ...
- research-articleJanuary 2025
Playing with Privacy: Exploring the Social Construction of Privacy Norms Through a Card Game
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 9, Issue 1Article No.: GROUP23, Pages 1–23https://doi.org/10.1145/3701202Investigating digital privacy behavior requires consideration of its contextual nuances and the underlying social norms. This study delves into users' joint articulation of such norms by probing their implicit assumptions and "common sense" surrounding ...
-
- ArticleJanuary 2025
Training a Segmentation-Based Visual Anonymization Service for Street Scenes
AbstractIn order to share image and video datasets for training and validation of machine learning, personal identifiable information (PII) of natural persons needs to be removed. Street scenes are widely used in computer vision research, and ...
- research-articleDecember 2024
Recommendation Unlearning via Influence Function
ACM Transactions on Recommender Systems (TORS), Volume 3, Issue 2Article No.: 22, Pages 1–23https://doi.org/10.1145/3701763Recommendation unlearning is an emerging task to serve users for erasing unusable data (e.g., some historical behaviors) from a well-trained recommender model. Existing methods process unlearning requests by fully or partially retraining the model after ...
- research-articleDecember 2024
Disclosure-Compliant Query Answering
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 6Article No.: 233, Pages 1–28https://doi.org/10.1145/3698808In today's data-driven world, organizations face increasing pressure to comply with data disclosure policies, which require data masking measures and robust access control mechanisms. This paper presents Mascara, a middleware for specifying and enforcing ...
- research-articleDecember 2024
Optimizing Privacy, Utility, and Efficiency in a Constrained Multi-Objective Federated Learning Framework
- Yan Kang,
- Hanlin Gu,
- Xingxing Tang,
- Yuanqin He,
- Yuzhu Zhang,
- Jinnan He,
- Yuxing Han,
- Lixin Fan,
- Kai Chen,
- Qiang Yang
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 15, Issue 6Article No.: 134, Pages 1–33https://doi.org/10.1145/3701039Conventionally, federated learning aims to optimize a single objective, typically the utility. However, for a federated learning system to be trustworthy, it needs to simultaneously satisfy multiple objectives, such as maximizing model performance, ...
- surveyDecember 2024
Security and Privacy on Generative Data in AIGC: A Survey
ACM Computing Surveys (CSUR), Volume 57, Issue 4Article No.: 82, Pages 1–34https://doi.org/10.1145/3703626The advent of artificial intelligence-generated content (AIGC) represents a pivotal moment in the evolution of information technology. With AIGC, it can be effortless to generate high-quality data that is challenging for the public to distinguish. ...
- research-articleDecember 2024
AST-GNN: A Graph Neural Network for Web Tracking Detection
GNNet '24: Proceedings of the 3rd GNNet Workshop on Graph Neural Networking WorkshopPages 27–32https://doi.org/10.1145/3694811.3697816Web tracking technology is prevalent on the Internet today, with most websites employing user identification systems that can accurately identify users or devices behind browsers. While numerous works in literature attempt to create machine learning ...
- short-paperDecember 2024
Privacy Implications of AMQ-Based PQ TLS Authentication
CoNEXT '24: Proceedings of the 20th International Conference on emerging Networking EXperiments and TechnologiesPages 65–72https://doi.org/10.1145/3680121.3697813During the TLS 1.3 handshake, an entity (e.g., a client application) commonly transmits a chain of certificates and certificates' digital signatures to the remote party to authenticate themselves. Towards a transition to post-quantum TLS, several ...
- research-articleDecember 2024JUST ACCEPTED
On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
- Lasse Nitz,
- Mehdi Akbari Gurabi,
- Milan Cermak,
- Martin Zadnik,
- David Karpuk,
- Arthur Drichel,
- Sebastian Schäfer,
- Benedikt Holmes,
- Avikarsha Mandal
Organizations and their security operation centers often struggle to detect and respond effectively to an extensive quantity of ever-evolving cyberattacks. While collaboration, such as threat intelligence sharing between security teams, and response ...
- surveyDecember 2024
Private and Secure Distributed Deep Learning: A Survey
ACM Computing Surveys (CSUR), Volume 57, Issue 4Article No.: 92, Pages 1–43https://doi.org/10.1145/3703452Traditionally, deep learning practitioners would bring data into a central repository for model training and inference. Recent developments in distributed learning, such as federated learning and deep learning as a service (DLaaS), do not require ...
- research-articleJanuary 2025
Challenge/Response-Lifecycle development for Multi-Factor Self-Sovereign Identity Authentication
ICBTA '24: Proceedings of the 2024 7th International Conference on Blockchain Technology and ApplicationsPages 36–41https://doi.org/10.1145/3708622.3708631In the expanding machine-to-everything (M2X) economy, trust between participants is essential for secure and efficient interactions. Multi-factor challenge set self-sovereign identity authentication (MFSSIA) leverages blockchain technology to foster ...
- short-paperDecember 2024
On-Device Speech Filtering for Privacy-Preserving Acoustic Activity Recognition
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1802–1804https://doi.org/10.1145/3636534.3698865Acoustic sensing has become increasingly prevalent for mobile and ambient devices for applications such as human activity recognition, health monitoring, and environmental sensing. These approaches develop audio featurization techniques to enable machine ...
- short-paperDecember 2024
Poster: Can You Find Me?: Linking Devices Despite Wi-Fi MAC Randomization at MobiCom 2023
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1668–1670https://doi.org/10.1145/3636534.3697454We present results for exposing vulnerabilities in MAC address randomization using Wi-Fi network discovery traffic collected at MobiCom 2023. By analyzing probe request sequence numbers and vendor-specific information elements, we successfully link ...
- research-articleDecember 2024
Demystifying Privacy in 5G Stand Alone Networks
- Stavros Eleftherakis,
- Timothy Otim,
- Giuseppe Santaromita,
- Almudena Díaz Zayas,
- Domenico Giustiniano,
- Nicolas Kourtellis
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1330–1345https://doi.org/10.1145/3636534.3690696Ensuring user privacy remains critical in mobile networks, particularly with the rise of connected devices and denser 5G infrastructure. Privacy concerns have persisted across 2G, 3G, and 4G/LTE networks. Recognizing these concerns, the 3rd Generation ...
- research-articleDecember 2024
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2681–2695https://doi.org/10.1145/3658644.3691638COVID-19 caused an abrupt shift towards remote learning, and along with it, an increased adoption of remote, online proctoring technology to both dissuade and identify academic dishonesty (i.e., cheating). This shift also came with significant discontent ...
- abstractDecember 2024
CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and Privacy
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4903–4904https://doi.org/10.1145/3658644.3691550The sixth Workshop on CPS & IoT Security and Privacy is set to take place in Salt Lake City, UT, USA, on October 18, 2024, in conjunction with the ACM Conference on Computer and Communications Security (CCS'24). This workshop marks the amalgamation of ...