| 2026 | Provable and Practical Security - 19th International Conference, ProvSec 2025, Yokohama, Japan, October 10-12, 2025, Proceedings Guomin Yang, Shengli Liu, Chunhua Su, Akira Otsuka, Zhuotao Lian |
| 2025 | A Deep Reinforcement Learning Framework for Robust Maritime Collision Avoidance Under GPS Spoofing. Ying Ding, Weizhi Meng, Shaoming He, Wenjuan Li |
| 2025 | A NTRU Lattice Based Linkable DualRing Signature. Honghui Ye, Xinjian Chen, Qiong Huang |
| 2025 | A Round-Optimal Near-Linear Third-Party Private Set Intersection Protocol. Foo Yee Yeo, Jason H. M. Ying |
| 2025 | AccountCatcher: Anomaly Blockchain Account Detection Based on Hybrid Graph-Based Model. Wenkuan Xiao, Qianhong Wu, Wenbo Wu, Sipeng Xie, Bo Qin |
| 2025 | AdvPurge: A Robust Personalized Federated Learning Framework Against Backdoor Attack. Tu Huang, Na Ruan |
| 2025 | An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and How to Avoid It. Lourenço Abecasis, Paulo Mateus, Chrysoula Vlachou |
| 2025 | An Empirical Study of Variation of Blockchain to Address the Issue of Verification and Validation. Joya Biswas, Rutaban Jania, Jahid Hossain, Mohammad Farhan Ferdous, Shakik Mahmud, Jiageng Chen, Rashed Mazumder |
| 2025 | Claimable Multi-designated Verifier Signature. Yuuki Fujita, Keisuke Hara, Kyosuke Yamashita |
| 2025 | DHABI FRAMEWORK: A Hybrid Approach to Overcoming Resistance Against Statistical Cryptanalysis and Side-Channel Analysis. Sumesh Manjunath Ramesh, Hoda Alkhzaimi |
| 2025 | Dynamic Self-feedback Mechanism for Improved Privacy Budgeting in LDP-SGD. Bingchang He, Atsuko Miyaji |
| 2025 | Electrum: UC Fail-Stop Server-Supported Signatures. Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud |
| 2025 | Federated Intrusion Detection Under Non-IID Traffic. Ziang Wu, Xiuheng Liao, Buzhen He, Shuai Shang, Tianhui Li, Chunhua Su |
| 2025 | GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability Detection. Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du, Xiapu Luo |
| 2025 | Improved Constant-Time Modular Inversion. Shogo Kuramoto, Atsuko Miyaji |
| 2025 | Lattice-Based Certificateless Encryption with Keyword Search. Minghui He, Zesheng Lin, Hongbo Li, Xinjian Chen, Qiong Huang |
| 2025 | Logarithmic-Size Ring Signatures with Tight Security from the DL Assumption. Keisuke Hara, Masayuki Tezuka |
| 2025 | Many-Time Linkable Ring Signatures. Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo |
| 2025 | More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression. Huu Ngoc Duc Nguyen, Shujie Cui, Shangqi Lai, Tsz Hon Yuen, Joseph K. Liu |
| 2025 | Network Intrusion Detection System Based on Reinforcement Learning Technique Optimization. Sukkarin Ruensukont, Karin Sumonkayothin, Prarinya Siritanawan, Narit Hnoohom, Setthawhut Saennam, Razvan Beuran |
| 2025 | Optimized Implementation of NTRU on RISC-V Platform. Wen Zhang, Lu Zhou, Hao Yang, Zhe Liu |
| 2025 | POSTER: A Server-Side Proactive Defense Framework for Poison-Resilient Federated Learning. Qingkui Zeng, Zhuotao Lian |
| 2025 | POSTER: AI-Based Physical Layer Key Generation Mechanism. Hong Zhao, Zhuotao Lian, Xinsheng Wang, Enting Guo |
| 2025 | POSTER: An Efficient Sieve Algorithm for Ideal Lattices. Yuntao Wang, Kazutaka Toda |
| 2025 | POSTER: Tricking LLM-Based NPCs into Spilling Secrets. Kyohei Shiomi, Zhuotao Lian, Toru Nakanishi, Teruaki Kitasuka |
| 2025 | Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs. Xinyu Zhang, Qishuang Fu, Ron Steinfeld, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au |
| 2025 | Privacy-Preserving LLM Agent for Multi-modal Health Monitoring. Qipeng Xie, Jiafei Wu, Weiyu Wang, Zhuotao Lian, Mu Yuan, Xian Shuai, Weizheng Wang, Yuan Haoyi, Haibo Hu, Kaishun Wu |
| 2025 | Proposal of An SVP Solver on Prime Cyclotomic Lattices. Kazutaka Toda, Yuntao Wang |
| 2025 | Registered Attribute-Based Signature with Attribute Privacy. Liuyu Yang, Xinxuan Zhang, Yi Deng, Xudong Zhu, Zhuo Wu, Zhongliang Zhang |
| 2025 | SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain. Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo, Hui Cui |
| 2025 | Source Code Guardrail: AI Driven Solution to Distinguish Critical vs. Generic Code for Enterprise LLM Security. Raghav Sharma, Amit Gupta |