NSS B

23 papers

YearTitle / Authors
2026Network and System Security - 19th International Conference, NSS 2025, Wuhan, China, December 5-7, 2025, Proceedings
Jiageng Chen, Debiao He, Wei Xie
2025A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection.
Xinyi Zhang, Peng Yu, Yifei Wang, Mingwu Zhang
2025A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices.
Zexu Li, Kun Li, Jiakai Dou, Dazhong Liu, Shanshan Tu
2025A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection.
Souhayla Touk, Saad El Jaouhari, Maurras Togbe
2025Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment.
Samra Bouakkaz, Luis Carlos Suárez, Nora Boulahia-Cuppens, Frédéric Cuppens
2025An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs.
Zhenhua Han, Gang Shen, Jiazheng Pei
2025An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment.
Haibo Tian, Zhengdong Liang, Ting Zhang
2025An Improved PUF-Based Three-Factor Authentication Scheme for Industrial IoT.
Qingyun Liu, Fengtong Wen
2025Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing.
Zhiguo Zhang, Junyong Wang, Chongzhen Zhang, Jiao Dai, Chong Liu, Fuqiang Hu, Dantong Yan, Hongquan Tian
2025Feature Machine Unlearning in Diffusion Models.
Linlin Wang, Tianqing Zhu, Laiqiao Qin, Lihua Yin, Wanlei Zhou
2025FraudTrace: Verifying Fraudulent News to Prevent Online Scam Campaigns via a Multi-agent LLM-Based System.
Nguyen Hoang Phuc, Dang Bui Tan Hai, Nguyen Huu Quyen, Phan The Duy
2025HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection.
Tianming Zheng, Yixin Jiang, Feiyang Huang, Wenqian Xu, Zhihong Liang, Hua Li
2025IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain.
Haosu Cheng, Guanquan Shi, Kangkang Zhang, Wenyu Zhang
2025MEMC: A Lightweight Image-Based Malware Classifier Based on Improved Shuffle and Coordination Attention.
Linquan Huang, Chuanqi Chen, Bo Zhao, Hui Liu, Ke Zhang
2025Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH Using Standard Flow Features.
Farhan Ahmad, Muhammad Mansoor Alam, Muhammad Salman, Komal Batool
2025Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples.
Luong Hoang Minh, Duong The Dat, Dang Bui Tan Hai, Le Duc Thinh, Doan Minh Trung, Phan The Duy
2025Post-quantum Blockchain Transaction Model Based on Dilithium.
Guangxia Xu, Yannan Guan, Lu Wang
2025Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior.
Zhuotao Lian, Weiyu Wang, Qingkui Zeng, Toru Nakanishi, Teruaki Kitasuka, Chunhua Su
2025Real-Time Anomaly Detection for Event-Based Insider Threat Hunting.
Thibault Leblanc, Neda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens
2025Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives.
Joan Ferré-Queralt, Jordi Castellà-Roca, Alexandre Viejo
2025Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-Based Approach.
Lucien Kiven Tamo, Brooke Kidmose, Weizhi Meng, Thanassis Giannetsos
2025Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control.
Gabriela Mogos
2025X-AdvIDS: A Framework for Assessing and Improving the Adversarial Robustness of Intrusion Detection Systems with Explainability-Guided Mutation and Analysis.
Phan The Duy, Truong Thi Hoang Hao, Nguyen Viet Hoang, Nguyen Duc Trung, Le Duc Thinh, Doan Minh Trung, Van-Hau Pham