| 2026 | Network and System Security - 19th International Conference, NSS 2025, Wuhan, China, December 5-7, 2025, Proceedings Jiageng Chen, Debiao He, Wei Xie |
| 2025 | A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection. Xinyi Zhang, Peng Yu, Yifei Wang, Mingwu Zhang |
| 2025 | A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices. Zexu Li, Kun Li, Jiakai Dou, Dazhong Liu, Shanshan Tu |
| 2025 | A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection. Souhayla Touk, Saad El Jaouhari, Maurras Togbe |
| 2025 | Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment. Samra Bouakkaz, Luis Carlos Suárez, Nora Boulahia-Cuppens, Frédéric Cuppens |
| 2025 | An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs. Zhenhua Han, Gang Shen, Jiazheng Pei |
| 2025 | An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment. Haibo Tian, Zhengdong Liang, Ting Zhang |
| 2025 | An Improved PUF-Based Three-Factor Authentication Scheme for Industrial IoT. Qingyun Liu, Fengtong Wen |
| 2025 | Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing. Zhiguo Zhang, Junyong Wang, Chongzhen Zhang, Jiao Dai, Chong Liu, Fuqiang Hu, Dantong Yan, Hongquan Tian |
| 2025 | Feature Machine Unlearning in Diffusion Models. Linlin Wang, Tianqing Zhu, Laiqiao Qin, Lihua Yin, Wanlei Zhou |
| 2025 | FraudTrace: Verifying Fraudulent News to Prevent Online Scam Campaigns via a Multi-agent LLM-Based System. Nguyen Hoang Phuc, Dang Bui Tan Hai, Nguyen Huu Quyen, Phan The Duy |
| 2025 | HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection. Tianming Zheng, Yixin Jiang, Feiyang Huang, Wenqian Xu, Zhihong Liang, Hua Li |
| 2025 | IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain. Haosu Cheng, Guanquan Shi, Kangkang Zhang, Wenyu Zhang |
| 2025 | MEMC: A Lightweight Image-Based Malware Classifier Based on Improved Shuffle and Coordination Attention. Linquan Huang, Chuanqi Chen, Bo Zhao, Hui Liu, Ke Zhang |
| 2025 | Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH Using Standard Flow Features. Farhan Ahmad, Muhammad Mansoor Alam, Muhammad Salman, Komal Batool |
| 2025 | Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples. Luong Hoang Minh, Duong The Dat, Dang Bui Tan Hai, Le Duc Thinh, Doan Minh Trung, Phan The Duy |
| 2025 | Post-quantum Blockchain Transaction Model Based on Dilithium. Guangxia Xu, Yannan Guan, Lu Wang |
| 2025 | Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior. Zhuotao Lian, Weiyu Wang, Qingkui Zeng, Toru Nakanishi, Teruaki Kitasuka, Chunhua Su |
| 2025 | Real-Time Anomaly Detection for Event-Based Insider Threat Hunting. Thibault Leblanc, Neda Baghalizadeh-Moghadam, Frédéric Cuppens, Nora Boulahia-Cuppens |
| 2025 | Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives. Joan Ferré-Queralt, Jordi Castellà-Roca, Alexandre Viejo |
| 2025 | Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-Based Approach. Lucien Kiven Tamo, Brooke Kidmose, Weizhi Meng, Thanassis Giannetsos |
| 2025 | Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control. Gabriela Mogos |
| 2025 | X-AdvIDS: A Framework for Assessing and Improving the Adversarial Robustness of Intrusion Detection Systems with Explainability-Guided Mutation and Analysis. Phan The Duy, Truong Thi Hoang Hao, Nguyen Viet Hoang, Nguyen Duc Trung, Le Duc Thinh, Doan Minh Trung, Van-Hau Pham |