情報ジョウホウセキュリティトクロン
菊池キクチ 浩明ヒロアキ
カヨウゲツヨウ3ゲン   411教室キョウシツ (2025ハルセメスター)
No Date   Author Title Issue Keyword
1 2025/4/15     ガイダンス    
2 2025/4/22   Y. Vekaria, R. Nithyanand and Z. Shafiq The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain SP 24 ターゲット広告コウコク ,マルウェア
3 2025/4/29   H. Liu, Y. Wu, Z. Yu and N. Zhang Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack SP 24 モデル説明セツメイ , XAI,プライバシー評価ヒョウカ
4 2025/5/13   Xiwen Teoh and Yun Lin and Ruofan Liu and Zhiyong Huang and Jin Song Dong.  PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models Usenix 24 CAPTCHA, LLM
5 2025/5/20   Yuexin Li and Chengyu Huang and Shumin Deng and Mei Lin Lock and Tri Cao and Nay Oo and Hoon Wei Lim and Bryan Hooi KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection  Usenix 24 LLM, フィッシング検出ケンシュツ
6 2025/5/27   休講キュウコウ      
7 2025/6/3   Kai Dong and Zheng Zhang and Chuang Jia and Zhen Ling and Ming Yang and Junzhou Luo and Xinwen Fu Relation Mining Under Local Differential Privacy Usenix 24 差分サブンプライバシー プライバシー,多次元タジゲン データセット
8 2025/6/10   Meenatchi Sundaram Muthu Selva Annamalai, Andrea Gadotti, and Luc Rocher A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data Usenix 24 合成ゴウセイデータ データ,属性推定ゾクセイスイテイ
9 2025/6/17   Anh Nguyen, Xiaokuan Zhang, and Zhisheng Yan. Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements Usenix 24 VR, 閲覧エツラn ビデオ推定スイテイ
10 2025/6/24   Giuseppe Calderonio, Mir Masood Ali, and Jason Polakis Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising Usenix 24 Third-Party Cookie, Webプライバシー,広告コウコク
11 2025/7/1   Matteo Scarlata, Matilda Backendal, and Miro Haller MFKDF: Multiple Factors Knocked Down Flat Usenix 24 オオイ 要素ヨウソ 認証ニンショウ
12 2025/7/8   休講キュウコウ      
13 2025/7/15   Huiyu Xu, Yaopeng Wang, Zhibo Wang, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, and Kui Ren. ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning ACM CCS 24 Deepfake検出
14 2025/7/22   Wei Tong, Haoyu Chen, Jiacheng Niu, and Sheng Zhong Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols ACM CCS 24 差分サブンプライバシー プライバシー,アイテム集合検出ケンシュツ
IEEESP (IEEE Symposium on Security and Privacy)
CCS (ACM conference on computer and communications security)
Usenix Security
NDSS (The Network and Distributed System Security Symposium)
PETS