ProvSec C

31 papers

YearTitle / Authors
2026Provable and Practical Security - 19th International Conference, ProvSec 2025, Yokohama, Japan, October 10-12, 2025, Proceedings
Guomin Yang, Shengli Liu, Chunhua Su, Akira Otsuka, Zhuotao Lian
2025A Deep Reinforcement Learning Framework for Robust Maritime Collision Avoidance Under GPS Spoofing.
Ying Ding, Weizhi Meng, Shaoming He, Wenjuan Li
2025A NTRU Lattice Based Linkable DualRing Signature.
Honghui Ye, Xinjian Chen, Qiong Huang
2025A Round-Optimal Near-Linear Third-Party Private Set Intersection Protocol.
Foo Yee Yeo, Jason H. M. Ying
2025AccountCatcher: Anomaly Blockchain Account Detection Based on Hybrid Graph-Based Model.
Wenkuan Xiao, Qianhong Wu, Wenbo Wu, Sipeng Xie, Bo Qin
2025AdvPurge: A Robust Personalized Federated Learning Framework Against Backdoor Attack.
Tu Huang, Na Ruan
2025An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and How to Avoid It.
Lourenço Abecasis, Paulo Mateus, Chrysoula Vlachou
2025An Empirical Study of Variation of Blockchain to Address the Issue of Verification and Validation.
Joya Biswas, Rutaban Jania, Jahid Hossain, Mohammad Farhan Ferdous, Shakik Mahmud, Jiageng Chen, Rashed Mazumder
2025Claimable Multi-designated Verifier Signature.
Yuuki Fujita, Keisuke Hara, Kyosuke Yamashita
2025DHABI FRAMEWORK: A Hybrid Approach to Overcoming Resistance Against Statistical Cryptanalysis and Side-Channel Analysis.
Sumesh Manjunath Ramesh, Hoda Alkhzaimi
2025Dynamic Self-feedback Mechanism for Improved Privacy Budgeting in LDP-SGD.
Bingchang He, Atsuko Miyaji
2025Electrum: UC Fail-Stop Server-Supported Signatures.
Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud
2025Federated Intrusion Detection Under Non-IID Traffic.
Ziang Wu, Xiuheng Liao, Buzhen He, Shuai Shang, Tianhui Li, Chunhua Su
2025GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability Detection.
Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du, Xiapu Luo
2025Improved Constant-Time Modular Inversion.
Shogo Kuramoto, Atsuko Miyaji
2025Lattice-Based Certificateless Encryption with Keyword Search.
Minghui He, Zesheng Lin, Hongbo Li, Xinjian Chen, Qiong Huang
2025Logarithmic-Size Ring Signatures with Tight Security from the DL Assumption.
Keisuke Hara, Masayuki Tezuka
2025Many-Time Linkable Ring Signatures.
Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo
2025More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression.
Huu Ngoc Duc Nguyen, Shujie Cui, Shangqi Lai, Tsz Hon Yuen, Joseph K. Liu
2025Network Intrusion Detection System Based on Reinforcement Learning Technique Optimization.
Sukkarin Ruensukont, Karin Sumonkayothin, Prarinya Siritanawan, Narit Hnoohom, Setthawhut Saennam, Razvan Beuran
2025Optimized Implementation of NTRU on RISC-V Platform.
Wen Zhang, Lu Zhou, Hao Yang, Zhe Liu
2025POSTER: A Server-Side Proactive Defense Framework for Poison-Resilient Federated Learning.
Qingkui Zeng, Zhuotao Lian
2025POSTER: AI-Based Physical Layer Key Generation Mechanism.
Hong Zhao, Zhuotao Lian, Xinsheng Wang, Enting Guo
2025POSTER: An Efficient Sieve Algorithm for Ideal Lattices.
Yuntao Wang, Kazutaka Toda
2025POSTER: Tricking LLM-Based NPCs into Spilling Secrets.
Kyohei Shiomi, Zhuotao Lian, Toru Nakanishi, Teruaki Kitasuka
2025Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Xinyu Zhang, Qishuang Fu, Ron Steinfeld, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au
2025Privacy-Preserving LLM Agent for Multi-modal Health Monitoring.
Qipeng Xie, Jiafei Wu, Weiyu Wang, Zhuotao Lian, Mu Yuan, Xian Shuai, Weizheng Wang, Yuan Haoyi, Haibo Hu, Kaishun Wu
2025Proposal of An SVP Solver on Prime Cyclotomic Lattices.
Kazutaka Toda, Yuntao Wang
2025Registered Attribute-Based Signature with Attribute Privacy.
Liuyu Yang, Xinxuan Zhang, Yi Deng, Xudong Zhu, Zhuo Wu, Zhongliang Zhang
2025SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain.
Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo, Hui Cui
2025Source Code Guardrail: AI Driven Solution to Distinguish Critical vs. Generic Code for Enterprise LLM Security.
Raghav Sharma, Amit Gupta