Below you will find just some of the cyber security research published by Imperial academics in 2025. If you are an Imperial academic and wish for your paper to be added, please contact Soteris Demetriou.
- Rocher, Luc, Julien M. Hendrickx, and Yves-Alexandre de Montjoye. "A scaling law to model the effectiveness of identification techniques." Nature Communications 16, no. 1 (2025): 347.
- Alotaibi, F., E. Goodbrand, and S. Maffeis. 2025. “Deep Learning from Imperfectly Labeled Malware Data.” CCS 2025.
- Ukani, Alisha, Hamed Haddadi, Alex C. Snoeren, and Pete Snyder. 2025. “Local Frames: Exploiting Inherited Origins to Bypass Content Blockers.” ACM CCS 25.
- Shamsabadi, Ali Shahin, Peter Snyder, Ralph Giles, Aurélien Bellet, and Hamed Haddadi. 2025. “Nebula: Efficient, Private and Accurate Histogram Estimation.” ACM CCS 25.
- Bollauf, Maiara F., Maja Lie, and and Cong Ling. 2025. “On Gaussian Sampling for q-ary Lattices and Linear Codes with Lee Weight.” CRYPTO 2025. https://link.springer.com/chapter/10.1007/978-3-032-01855-7_11.
- Pollock, J, I Shilov, E Dodd, and YA de Montjoye. 2025. “Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods.” 34th USENIX Security Symposium (USENIX Security 25). https://www.usenix.org/conference/usenixsecurity25/presentation/pollock.
- Hantke, Florian, Peter Snyder, Hamed Haddadi, and Ben Stock. 2025. “Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements.” 34th USENIX Security Symposium (USENIX Security 25).
- Maali, E, O Alrawi, and J McCann. 2025. “Evaluating Machine Learning-Based IoT Device Identification Models for Security Applications.” Network and Distributed System Security (NDSS) Symposium, 2025. https://www.ndss-symposium.org/wp-content/uploads/4A-f0118-maali.pdf.
- Celi, Sofía, Alex Davidson, Joe Rowell, Gonçalo Pestana, and Hamed Haddadi. 2025. “DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More.” Network and Distributed System Security (NDSS) Symposium, 2025. Distinguished paper Award
- Cadet, Xavier F., Anastasia Borovykh, Mohammad Malekzadeh, Sara Ahmadi-Abhari, and Hamed Haddadi. “Deep Unlearn: Benchmarking Machine Unlearning for Image Classification.” Euro S&P 25.
- Böhme, Marcel, Eric Bodden, Tevfik Bultan, Cristian Cadar, Yang Liu, and Giuseppe Scanniello. 2025. “Software Security Analysis in 2030 and Beyond: A Research Roadmap.” ACM TOSEM . https://dl.acm.org/doi/10.1145/3708533.
- Foley, M., and S. Maffeis. 2025. “APIRL: Deep Reinforcement Learning for REST API Fuzzing.” AAAI 2025. https://doi.org/10.1609/aaai.v39i1.31995.
- Wicker, M, P Sosnin, I Shilov, A Janik, MN Müller, and YA de Montjoye. 2025. “Certification for Differentially Private Prediction in Gradient-Based Training.” International Conference on Machine Learning (ICML). https://arxiv.org/abs/2406.13433.
- Wei, Z, Z Yu, C Liu, W Hu, P Gautam, H Sun, and JA McCann. 2025. “Reconfigurable Intelligent Surface Optimized Over-The-Air Control of Networked Dynamic Systems.” IEEE INFOCOM 2025-IEEE Conference on Computer Communications Workshops. https://ieeexplore.ieee.org/abstract/document/11152792/.
- Huang, S, PY Chen, P Zhou, K Li, and JA McCann. 2025. “Zero-parameter Attention Sharing Transformer for Joint Human Activity and Identity Recognition.” IEEE Transactions on Artificial Intelligence. https://ieeexplore.ieee.org/abstract/document/11072848/.
- Mendelsohn, Andrew, Charles Grover, and Cong Ling. 2025. “On the Security of Group Ring Learning with Errors.” IACR Communications in Cryptology. https://cic.iacr.org/p/2/2/2.
- Lepipas, Anastasios, Marios Charalambides, Jiani Liu, Yiying Guan, Dominika Woszczyk, Mansi, Hai Le, and Soteris Demetriou. 2025. “Leaky Diffusion: Attribute Leakage in Text-Guided Image Generation.” PETS 2025. https://petsymposium.org/popets/2025/popets-2025-0130.pdf.
- Woszczyk, Dominika, and Soteris Demetriou. 2025. “ DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech.” PETS 2025. https://petsymposium.org/popets/2025/popets-2025-0012.pdf.
- Maheri, Mohammadmahdi, Hamed Haddadi, and Alex Davidson. 2025. “TeleSparse: Practical Privacy-Preserving Verification of Deep Neural Networks.” PETS 25.
- HE, Jiahui, Pete Snyder, Hamed Haddadi, Fabian E. Bustamante, and Gareth Tyson. 2025. “Measuring the Accuracy and Effectiveness of PII Removal Services.” PETS 25.
- Aldaihan, A., F. Alotaibi, and S. Maffeis. 2025. “Clouesau: A Hierarchal Multi Agent Approach For Autonomous Attack Investigation.” ACSAC 2025.
- Yao, Z, N Krčo, G Ganev, and YA de Montjoye. 2025. “The DCR Delusion: Measuring the Privacy Risk of Synthetic Data.” European Symposium on Research in Computer Security (ESORICS. https://link.springer.com/chapter/10.1007/978-3-032-07884-1_24.
- Mansi, Anastasios Lepipas, Dominika Woszczyk, Yiying Guan, and Soteris Demetriou. 2025. “Understanding Dementia Speech Alignment with Diffusion-Based Image Generation.” Interspeech 2025. https://www.arxiv.org/abs/2508.09385.
- Woszczyk, Dominika, Ranya Aloufi, and Soteris Demetriou. 2025. “ClaritySpeech: Dementia Obfuscation in Speech.” Interspeech 2025. https://arxiv.org/abs/2507.09282.
- Zhu, J, H Han, J Cao, J McCann, HYM Ma, and X Liu. 2025. “LiquidAuth: Reliable and Accurate Liquid Authentication Using GAN-enhanced Acoustic-to-Mass-Spectrum Mapping.” 34th International Conference on Computer Communications and Networks (ICCCN). https://ieeexplore.ieee.org/abstract/document/11134008/.
- R, Capraru, Lupu E, Wang J-G, and Hee Soong B. 2025. “GhostLite: data minimization with applications to real-time LiDAR attacks.” VTC2025-Fall, Chengdu, China, 19 Oct 2025 - 22 Oct 2025. IEEE.
- Capraru, Richard; Wu, Jia-Yu; Wang, Jian-Gang; Ritchie, Matthew; Lupu, Emil; Soong, and Boon Hee. 2025. “Overcoming catastrophic forgetting in radar and LiDAR object detection in rain via layer freezing and data augmentation.” 2025 IEEE Radar Conference (RadarConf25).
- Hanif, H., S. Maffeis, and N. Badrul Anuar. 2025. “The Richer Representation Fallacy: Are We Just Adding Noise to LLM-based Software Vulnerability Detectors?.” ICOCO 2025.
- E, Lupu, and Castiglione L. 2025. “Consilience of Safety, Security and Resilience.” 44th International Conference on Computer Safety, Reliability and Security (SafeComp 2025). https://hal.science/.
- Meeus, M, I Shilov, G Kaissis, and YA de Montjoye. 2025. “Counterfactual Influence as a Distributional Quantity.” arXiv preprint. https://arxiv.org/abs/2506.20481.
- S, Narula, Ghasemigol M, Carnerero-Cano J, Minnich A, Lupu E, and Takabi D. 2025. “Exploring research and tools in ai security: a systematic mapping study.” IEEE Access 13:84057-84080 19 May 2025. 10.1109/ACCESS.2025.3567195.
- Cunha, M, R Mendes, YA de Montjoye, and JP Vilela. 2025. “WiFi-based Location Tracking: A Still Open Door on Laptops.” IEEE Open Journal of the Computer Society. https://ieeexplore.ieee.org/abstract/document/11002526.
- Hayes, Jamie, Ilia Shumailov, Christopher A. Choquette-Choo, Matthew Jagielski, George Kaissis, Katherine Lee, Milad Nasr, Sahra Ghalebikesabi, Niloofar Mireshghallah, Meenatchi Sundaram Mutu Selva Annamalai, Igor Shilov, Matthieu Meeus, Yves-Alexandre de Montjoye, Franziska Boenisch, Adam Dziedzic, and A. Feder Cooper. 2025. “Strong Membership Inference Attacks on Massive Datasets and (Moderately) Large Language Models.” arXiv preprint. https://arxiv.org/abs/2505.18773.
- Khan, Muhammad Zakir, Yao Ge, Michael Mollel, Julie Mccann, Qammer H Abbasi, and Muhammad Imran. 2025. “RFSensingGPT: A Multi-Modal RAG-Enhanced Framework for Integrated Sensing and Communications Intelligence in 6G Networks.” IEEE Transactions on Cognitive Communications and Networking. https://ieeexplore.ieee.org/abstract/document/10949644.
- Cunha, M, R Mendes, YA de Montjoye, and JP Vilela. 2025. “On the Difficulty of NOT being Unique: Fingerprinting Users from Wi-Fi Data in Mobile Devices.” Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing. https://dl.acm.org/doi/abs/10.1145/3672608.3707966.
- D, Joksas, Muñoz-González L, Lupu E, and Mehonic A. 2025. “Nonideality-aware training makes memristive networks more robust to adversarial attacks.” APL Machine Learning. https://doi.org/10.1063/5.0241202.
- L, Castiglione, Guerra S, and Lupu E. 2025. “Automated identification of safety-critical attacks against CPS and generation of assurance case fragments.” Proceedings of the Thirty third Safety-Critical Systems Symposium (SSS'25).
- Wei, Z, W Hu, J Zhang, W Guo, and J McCann. 2025. “Explainable adversarial learning framework on physical layer key generation combating malicious reconfigurable intelligent surface.” IEEE Transactions on Wireless Communications. https://ieeexplore.ieee.org/abstract/document/10856736.
- Jing, Yaoxin, Michael Steiner, Anjo Vahldiek-Oberwagner, Mona Vij, and Lluis Vilanova. "Using Recursive Attestation to Scale Trust in Modern Heterogeneous Cloud Architectures." In Proceedings of the 16th ACM SIGOPS Asia-Pacific Workshop on Systems, pp. 185-193. 2025.
- White, Otto, Yaoxin Jing, Adrien Ghosn, Michael Steiner, Anjo Vahldiek-Oberwagner, Mona Vij, and Lluis Vilanova. "Enabling Cloud-Scale Distributed Capabilities." In Proceedings of the 4th Workshop on Heterogeneous Composable and Disaggregated Systems, pp. 38-44. 2025.
- Steele, L., F. Alotaibi, and S. Maffeis. 2025. “Poster: Randomness Unmasked: Towards Reproducible and Fair Evaluation of Shift-Aware Deep Learning NIDS.” CCS 2025.
- Xie, J., A. Aldaihan, and S. Maffeis. 2025. “Poster: Towards Reproducible Attack Scenarios With Automated Labeling.” ACSAC 2025.
- Yang, X, B Stevanoski, M Meeus, and YA de Montjoye. 2025. “Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses.” arXiv preprint. https://arxiv.org/abs/2505.15738.
- Mao, Y, B Stevanoski, and YA de Montjoye. 2025. “DeSIA: Attribute Inference Attacks Against Limited Fixed Aggregate Statistics.” arXiv preprint. https://arxiv.org/abs/2504.18497.
- Wei, Z, W Hu, Y Bouazizi, M Zou, C Liu, Y Chen, H Sun, and J McCann. 2025. “Integrated Sensing, Communication, and Over-The-Air Control of UAV Swarm Dynamics.” arXiv preprint. https://arxiv.org/abs/2502.07467.
-
Sanna Passino, F., A. Mantziou, D. Ghani, P. Thiede, R. Bevington, and N.A. Heard. 2025. “Nested Dirichlet models for unsupervised attack pattern detection in honeypot data.” The Annals of Applied Statistics. https://arxiv.org/abs/2301.02505; https://doi.org/10.1214/24-AOAS1974.
MSc Computing (Security and Reliability)
Have you studied computing but want to specialise in threats, attack techniques, and how to defend against these? As part of our MSc Computing (Security and Reliability), you can study:
- Cryptography engineering
- Quantum computing
Contact us
MSc Security and Resilience: Science and Technology
Have you studied cyber security but wish to apply it to a broader context? The MSc Security and Resilience: Science and Technology is:
- Open to STEM graduates and professionals
- Full-time and part-time study options