期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022; 25 (3)
Edge intelligence has played an important role in constructing smart cities, but the vulnerability of edge nodes to adversarial attacks becomes an urg......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022; 25 (3)
With the wide use of Automatic Speech Recognition (ASR) in applications such as human machine interaction, simultaneous interpretation, audio transcri......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022; 25 (1)
As face presentation attacks (PAs) are realistic threats for unattended face verification systems, face presentation attack detection (PAD) has been i......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021; 24 (3)
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of querie......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021; 24 (3)
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of querie......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020; 23 (2)
Text-based CAPTCHAs remains a popular scheme for distinguishing between a legitimate human user and an automated program. This article presents a nove......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020; 23 (4)
Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. ......
期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2018; 21 (4)
Pattern lock is widely used for identification and authentication on Android devices. This article presents a novel video-based side channel attack th......