- Julen BernabĂ©-RodrĂguez, Albert Garreta, Oscar Lage. A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation. ACM Trans. Inf. Syst. Secur., 27(2):19, May 2024.
- Han Cao 0004, Qindong Sun, Yaqi Li, Rong Geng, Xiaoxiong Wang. Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain. ACM Trans. Inf. Syst. Secur., 27(1), 2024.
- Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang 0002, Shouling Ji, Shanqing Guo. DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. ACM Trans. Inf. Syst. Secur., 27(1), 2024.
- Namgyu Park, Jong Kim 0001. Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit. ACM Trans. Inf. Syst. Secur., 27(2):20, May 2024.
- Xinyu He, Fengrui Hao, Tianlong Gu, Liang Chang 0003. CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models. ACM Trans. Inf. Syst. Secur., 27(3), August 2024.
- Yong Zeng 0002, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma 0001, Yao Liu 0007. Eyes See Hazy while Algorithms Recognize Who You Are. ACM Trans. Inf. Syst. Secur., 27(1), 2024.
- Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, David Starobinski. Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs. ACM Trans. Inf. Syst. Secur., 27(1), 2024.
- Weihan Ou, Steven H. H. Ding, Mohammad Zulkernine, Li Tao Li, Sarah Labrosse. VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning. ACM Trans. Inf. Syst. Secur., 27(3), August 2024.
- Rodolfo Vieira Valentim, Idilio Drago, Marco Mellia, Federico Cerutti 0001. X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting. ACM Trans. Inf. Syst. Secur., 27(3), August 2024.
- Safwa Ameer, Lopamudra Praharaj, Ravi Sandhu, Smriti Bhatt, Maanak Gupta. ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model. ACM Trans. Inf. Syst. Secur., 27(3), August 2024.