- Chunghyo Kim, Juhwan Noh, Esmaeil Ghahremani, Yongdae Kim. Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Yuxin Yang 0003, Qiang Li 0008, Yuede Ji, Binghui Wang. A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Liang Wang 0038, Zhuangkun Wei, Weisi Guo. Multi-agent Deep Reinforcement Learning-based Key Generation for Graph Layer Security. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Hieu Le 0003, Salma Elmalaki 0001, Athina Markopoulou, Zubair Shafiq. AutoFR: Automated Filter Rule Generation for Adblocking. ACM Trans. Inf. Syst. Secur., 28(1), February 2025.
- Björn Bjurling, Shahid Raza. Cyber Threat Intelligence meets the Analytic Tradecraft. ACM Trans. Inf. Syst. Secur., 28(1), February 2025.
- Antonio Ruggia, Andrea Possemato, Savino Dambra, Alessio Merlo, Simone Aonzo, Davide Balzarotti. The Dark Side of Native Code on Android. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Xuejing Yuan, Jiangshan Zhang, Kai Chen 0012, Cheng'an Wei, Ruiyuan Li, Zhenkun Ma, Xinqi Ling. Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems. ACM Trans. Inf. Syst. Secur., 28(1), February 2025.
- Danushka Bollegala, Shuichi Otake, Tomoya Machide, Ken-ichi Kawarabayashi. A Metric Differential Privacy Mechanism for Sentence Embeddings. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Long Chen 0018, Ya-Nan Li 0007, Qiang Tang 0005, Moti Yung. End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Yingkai Dong, Li Wang, Zheng Li 0023, Hao Li, Peng Tang, Chengyu Hu, Shanqing Guo. Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.