| 2025 | Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings Zhe Xia, Jiageng Chen |
| 2024 | A Comparative Analysis of Phishing Tools: Features and Countermeasures. Rishikesh Sahay, Weizhi Meng, Wenjuan Li |
| 2024 | A New Construction of Leakage-Resilient Identity-Based Encryption Scheme. Zirui Qiao, Ran Xu, Yonghui Lu, Yanwei Zhou, Bo Yang |
| 2024 | A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing. Mingwu Zhang, Qi Zou, Bo Yang |
| 2024 | An eID-Based Privacy-Enhanced Public Transportation Ticket System. Kanagaratnam Anojjan, Weizhi Meng, Brooke Kidmose, Yu Wang |
| 2024 | Breaking GEA-Like Stream Ciphers with Lower Time Cost. Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang |
| 2024 | Controlled Multi-client Functional Encryption for Flexible Access Control. Mingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang |
| 2024 | Differential Cryptanalysis Against SIMECK Implementation in a Leakage Profiling Scenario. Hailong Zhang |
| 2024 | Efficient Large-Scale Multi-party Computation Based on Garbled Circuit. Zhusen Liu, Jiafei Wu, Zhe Liu |
| 2024 | Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber. Peng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu |
| 2024 | From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework. Liwei Liu, Zijian Liu, Na Ruan |
| 2024 | Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption. Kaiming Chen, Atsuko Miyaji, Jiageng Chen |
| 2024 | Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm. Congrong Peng, Cong Peng, Xiaolin Yang, Qingcai Luo, Min Luo |
| 2024 | Lattice-Based Universal Designated Multi-verifiers Signature Scheme. Yanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen |
| 2024 | OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. Yudi Zhang, Yumei Li, Mingwu Zhang, Willy Susilo |
| 2024 | Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning. Hong Qin, Debiao He, Qi Feng, Xiaolin Yang, Qingcai Luo |
| 2024 | Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures. Mengsi Wu, Pei Li, Jiageng Chen, Shixiong Yao |
| 2024 | Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC. Kangkang Shi, Jiongjiong Ren, Shaozhen Chen |
| 2024 | SNIPER: Detect Complex Attacks Accurately from Traffic. Changlong Yu, Bo Zhang, Boyu Kuang, Anmin Fu |
| 2024 | Secure Federated Distillation Framework for Encrypted Traffic Classification. Long Teng, Qi Feng, Wei Zhao, Min Luo, Debiao He |
| 2024 | Shrinkable Ring Signatures: It Wasn't Them! Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto |
| 2024 | TriNT: A Framework for ROV Identification Based on Triplet. Yujing Liu, Jiangbin Chen, Shuhui Chen |
| 2024 | Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection. Md Mashrur Arifin, Troy Suyehara Tolman, Jyh-haw Yeh |