| 2025 |
| SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research | Yasha Iravantchi, Pardis Emami-Naeini, Alanson Sample |
| SoK: Computational and Distributed Differential Privacy for MPC | Fredrik Meisingseth |
| SoK: Descriptive Statistics Under Local Differential Privacy | René Raab, Pascal Berrang, Paul Gerhart, Dominique Schröder |
| SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures | Michael Wrana, Diogo Barradas, N. Asokan |
| 2024 |
| SoK: Can Trajectory Generation Combine Privacy and Utility? | Erik Buchholz, Sharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere |
| SoK: Data Privacy in Virtual Reality | Gonzalo Munilla Garrido, Vivek Nair, Dawn Song |
| SoK: Metadata-Protecting Communication Systems | Sajin Sasy, Ian Goldberg |
| SoK: Provably Secure Onion Routing against a Global Adversary | Philip Scherer, Christiane Weis, Thorsten Strufe |
| SoK: Secure Human-centered Wireless Sensing | Wei Sun, Tingjun Chen, Neil Gong |
| SoK: Trusting Self-Sovereign Identity | Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere |
| SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training | Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas |
| 2023 |
| SoK: Content Moderation for End-to-End Encryption | Sarah Scheffler, Jonathan Mayer |
| SoK: Differentially Private Publication of Trajectory Data | Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe |
| SoK: Managing risks of linkage attacks on data privacy | Jovan Powar, Alastair R. Beresford |
| SoK: Secure Aggregation based on cryptographic schemes for Federated Learning | Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti |
| SoK: Secure E-Voting with Everlasting Privacy | Thomas Haines, Rafieh Mosaheb, Johannes Mueller, Ivan Pryvalov |
| 2022 |
| SoK: Assumptions underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Experts and Legal Practitioners | Dominic Deuber, Viktoria Ronge, Christian Rückert |
| SoK: Cryptographic Confidentiality of Data on Mobile Devices | Maximilian Zinkus, Tushar M. Jois, Matthew Green |
| SoK: Plausibly Deniable Storage | Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion |
| SoK: Privacy-enhancing Smart Home Hubs | Igor Zavalyshyn, Axel Legay, Annanda Rath, Etienne Riviere |
| SoK: SCT Auditing in Certificate Transparency | Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark |
| SoK: TEE-assisted Confidential Smart Contract | Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan |
| 2021 |
| SoK: Efficient Privacy-preserving Clustering | Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame |
| SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data | Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper |
| SoK: Privacy-Preserving Collaborative Tree-based Model Learning | Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux |
| SoK: Privacy-Preserving Computation Techniques for Deep Learning | José Cabrero-Holgueras, Sergio Pastrana |
| SoK: Privacy-Preserving Reputation Systems | Stan Gurtler, Ian Goldberg |
| 2020 |
| SoK: Anatomy of Data Breaches | Hamza Saleem, Muhammad Naveed |
| SoK: Differential privacies | Damien Desfontaines, Balázs Pejó |
| 2019 |
| SoK: Modular and Efficient Private Decision Tree Evaluation | Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider |