TrustCom B

397 papers

YearTitle / Authors
202524th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2025, Guiyang, China, November 14-17, 2025
20253D trajectory personalization privacy protection method based on multi-feature classification and spatio-temporal attention.
Ding Mu, Mengyao Zhang, Zihan Wang, Yexiong Shang
20255GC-PDA:A Novel Proactive Defense Architecture for Enhancing 5G Core Network Security.
Xingxing Liao, Wei You, Jie Yang, Jian Tao, Runhan Feng, Xinsheng Ji
2025A Blockchain-Based Spectrum Allocation Scheme Based on Beneficial Consensus Mechanism.
Peiliang Zuo, Yuexiang Wang, Zhen Fang, Xuegang Wang
2025A Blockchain-Enabled AIoT Framework for Secure Metaverse in Wireless Communication Networks.
Danhuai Zhao, Chen Tian, Zhenyu Ju, Yi Rong, Xiaoming He, Wanting Yang
2025A Class of Semi-Supervised Weighted Nonnegative Matrix Factorization for Community Detection.
Shibo Jin, Shiqi Liu, Lujuan Dang
2025A Comprehensive Analysis of the AKMA+ Protocol.
Yueming Li, Long Chen, Zhenfeng Zhang
2025A Cross-Layer Attribution Method Based on Cyber-Physical Coupling Under Load Redistribution Attack.
Zhenya Chen, Rongbin Yao, Chensheng Liu, Ming Yang, Xiaoming Wu, Wenting Wang
2025A Dual-Stage Anomaly Detection Framework for Stealthy Attacks in 5G Core Networks.
Xin Feng, Cong Li, Weizhi Meng, Zilong Wang, Xinsheng Ji
2025A Dynamic Low-cost 3D Indoor Localization Algorithm Based on Error Optimal Estimation.
Qianqian Zhu, Hui Zhang, Yuewei Zhang, Yuanji Shi, Shuyi Wang
2025A Heterogeneous GNN Based Trust Evaluation Method for Remote Desktop Access.
Haishuo Zhang, Huiran Yang, Hongjia Li, Yan Zhang, Peng Chen, Weiping Wang, Ding Tang
2025A High-Quality Data-Driven Incentive Mechanism for Multi-Platform Mobile Crowdsensing.
Minghe Zhang, Xuanyu Wang, Lihong Chen, Gang Liu
2025A New End-to-End Encrypted Image Retrieval Scheme in Cloud Environment.
Yanfeng Chen, Jing Liang, Hongliang He, Peiya Li
2025A New Key Expansion Scheme for SM4 based on Sponge Construction.
Xin Yu, Juan Xu, Xiaoxiao Zhang, Jian Lei
2025A Privacy-Preserving Aggregation Scheme Based on Dual-Masking and Threshold Signature in Computing Power Network.
Xiaodong Yang, Junru He, Na Wang, Duojia Wang, Yuanxin Zhang, Yatong Zhong
2025A Privacy-Preserving and Highly Fault-Tolerant Cross-Chain Atomic Swap Scheme.
Wenjun Zhu, Jianan Hong, Yingjie Xue, Jiayue Zhou, Shiyao Wang
2025A Privilege Creep-Aware Role Mining Method for Enhanced Access Control Security.
Vincent Bittard, Rim Ben Salem, Ahmed Bouzid, Sara Imene Boucetta, Frédéric Cuppens, Nora Cuppens-Boulahia
2025A Real-Time Defense Framework Using PPPO in Deep Reinforcement Learning for CyberBattleSim.
Yixuan Cao, Aniket Mahanti, Ranesh Naha
2025A Region Dual-Factor Aware Federated Learning Framework for NWDAF in B5G/6G Core Network.
Mingchuang Zhang, Hongbo Tang, Wei You, Xingxing Liao, Jie Yang, Hang Qiu
2025A Robust Federated Learning Framework Integrating Principal Component Analysis and Dual Detection Mechanisms.
Lina Ge, JianWei Zhai, Qinchun Su
2025A Robust and Efficient Authentication Protocol for Intelligent Systems in Smart Healthcare IoMT.
Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Junchao Ma, Zaid Alaa Hussien, Ali Hasan Ali, Husam A. Neamah, Ahmed Ali Ahmed
2025A Semantic-Aware Network Intelligence Framework for Anomaly Detection using Large Language Models.
Wei Li, Jianjun Li, Hui Shao, Junjie Li, Wei Zhang
2025A Systematic Approach to Predict the Impact of Cybersecurity Vulnerabilities Using LLMs.
Anders Mølmen Høst, Pierre Lison, Leon Moonen
2025A Threshold Distributed Key Generation and Dynamic Key Management Scheme in Wireless Sensor Networks.
Wenhui Kong, Pengfei Wen, Bo Li, Heng Gao, Runshan Hu, Ning Hu, Xingjun Wang
2025A Transferable Adversarial Attack Framework for Object Detection via Spatial-Frequency Information Masking.
Zhipeng Lyu, Xiumei Li, Junmei Sun
2025A Trust-Based Data Quality Assessment Mechanism in Crowdsensing Services.
Hai Liu, Yadong Peng
2025A Trustworthy and Efficient Inference Scheduling Scheme for Edge MoEs Using DRL.
Jinyang Zhang, Shengli Pan, Shanwu Chen, Anandarup Roy, Peng Li
2025A Watermarking Framework for Secure Distribution of Meteorological Images.
Yue Wu, Fenghua Li, Feng Lu, Zifu Li, Yixuan Zhang, Yanru He
2025A Zero-Trust Empowered Continuous Authentication System for Drivers: Integrating Federated Learning with Conditional Transformer GAN.
Lina Ge, Zhipeng Cao, Ming Jiang, Liang Zhao
2025A secure and provable deletion method over outsourced data for fog-based smart grid.
Changsong Yang, Yueling Liu, Yong Ding, Hai Liang, Shuo Wang
2025AMD: Adaptive Adversarial Training Method Based on Mahalanobis Distance.
Aoqi Ruan, Hui Xia, Rui Zhang, Xiaoxue Song, Zhengheng Li, Mengyuan Song
2025APER: An Efficient and Privacy-Preserving Scheme for E-Health Recommendations.
Jing Wang, Wenhao Yuan, Xianjun Deng, Qiankun Zhang, Jing Fan, Xue Yuan
2025APT-GCM: Advanced Persistent Threats Detection via Graph Contrastive Masked Representation Learning.
Mengkun Zhao, Jing Liu, Wenqiang Hao, Xiaobing Pei
2025Accelerating Privacy-Preserving Federated Learning in Large-Scale LEO Satellite Systems.
Binquan Guo, Junteng Cao, Marie Siew, Bin Bin Chen, Tony Q. S. Quek, Zhu Han
2025Active-Trust Based Security Service Orchestration Framework for 6G Enabled Massive IoT.
Mingfeng Huang, Ronghui Cao, Xiaoyong Tang, Tan Deng
2025Adaptive Cooperative Spectrum Sharing in HSTNs with Hardware Impairments and Realistic Fading for Enhanced Reliability.
Areeb Saldin, Ammar Hawbani, Yunchong Guan, Yunhe Sun, Saeed Hamood Alsamhi, Liang Zhao
2025Adaptive Multi-Feature Hierarchical Framework for Generative Model Attribution.
Ruoying Wang, Linghui Li, Xiaotian Si, Kaiguo Yuan, Zhaoyu Wang
2025Adaptive Neuron Honeypot: Trapping Malicious Backdoors in Federated Learning.
Xingyu Lu, Yang Cao
2025Adaptive Temperature-Enhanced Hypergraph Contrastive Learning with Reliable Data Sampling Augmentation.
Junzheng Li, Hongtao Yu, Ruiyang Huang, Suchang Yang
2025AdaptiveWatermark: Dynamic Watermarking for Large Language Models with Agent.
Qingze Peng, Daifeng Li
2025Adversarial Example Based Fingerprint Embedding for Robust Copyright Protection in Split Learning.
Zhangting Lin, Mingfu Xue, Wenmao Liu, Liquan Chen
2025AlignAD-VAE: A Variational Autoencoder with MMD-Based Dataset Alignment for Network Anomaly Detection.
Samed Saka, Valerio Selis, Alan Marshall
2025An Adaptive Fast Recovery Scheme Based on Checkpoints: Analysis and Application in Asymmetric Multiprocessor Systems.
Jingjing Hu, Yu Li, Yuanhang Sun, Chidan Zhu, Qinrang Liu, Jiangxing Wu
2025An Autoencoder-Based Black-Box Adversarial False Data Injection Attack Against Smart Grid.
Juntao Zhang, Chensheng Liu, Xin Wang, Ming Yang, Xiaoming Wu
2025An Efficient FHE-based Ciphertext Matrix Multiplication Algorithm.
Yihan Wang, Xiangjun Xue, Jingyong Liang, Donghai Guan, Çetin Kaya Koç
2025An Efficient Feature Extraction Model Based on Asymmetric Deep Convolutional Autoencoder for Abnormal Traffic Detection.
Guofeng Zhang, Yang Zhang, Bingbing Wang
2025An Evolutionary Algorithm with Advanced Initial Solutions for Association Rules Hiding.
Jiaran Qiu, Peng Cheng, Jun Zhou
2025An Improved Vector Commitment Construction with Applications to Signatures.
Yalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen, Sumanta Sarkar, Christopher J. P. Newton, Carsten Maple, Ugur-Ilker Atmaca
2025Antenna Selection and Artificial Noise-based Security Transmission for Large-Scale MIMO Systems.
Shiguo Wang, Jie Ma
2025Artificial Noise-Based Countermeasure Against Full-Duplex (FD) Active Eavesdropping.
Shiguo Wang, Yun Zhao
2025Assessing the Effectiveness of Singling-Out Attacks on Synthetic Data: Is the Current GDPR Guidance Adequate?
Fatima Jahan Sarmin, Atiquer Rahman Sarkar, Noman Mohammed
2025Assessing the Impact of Post-Quantum Digital Signature Algorithms on Blockchains.
Alison Gonçalves Schemitt, Henrique Fan da Silva, Roben Castagna Lunardi, Diego Kreutz, Rodrigo Brandão Mansilha, Avelino Francisco Zorzo
2025Asteroid X: A Decentralized Finance Platform for Mining Sectors.
Ben Chen, Xingyu Yang, Hui Cui, Joseph K. Liu
2025Attention-Inverse Perturbation: A Novel Adversarial Attack Strategy by Targeting Non-Attentive Regions.
Ming Zhang, Zhendong Wu, Hu Li, Jin Li, Ling Pang, Cheng Qian
2025Attribute-Based Conditional PRE: A Novel Construction from LWE for Cloud Data-Sharing.
Lisha Yao, Jian Weng, Pengfei Wu, Guofeng Tang, Haiyang Xue, Guomin Yang, Robert H. Deng
2025AuthVR: Securing Authentication Against Shoulder Surfing and Keystroke Inference Attacks using Virtual Reality.
Md Yeasin Ali, Touhid Islam Udoy, Md. Ishmam Tasin, Masum Alam Nahid, Fairuz Rahaman Chowdhury, Farida Chowdhury, Md Sadek Ferdous
2025AutoPentestAL: An automated penetration testing framework with active learning capabilities.
Xianyi Fu, Bin Liu, Cheng Zhu, Dianqiu Ma
2025AutoPentester: An LLM Agent-based Framework for Automated Pentesting.
Yasod Ginige, Akila Niroshan, Sajal Jain, Suranga Seneviratne
2025Automated Attack Graph Construction for Cross-host Threat Detection Using Cyber Threat Intelligence.
Chen Ling, Yifei Li, Ziqing Feng, Bin Liu, QiuYun Wang, Liling Xin, Zhengwei Jiang, Huamin Feng
2025BDT-RVOC: Block Data Truncation for Verifiable and Private Multi-Cloud Computation.
Ze Yang, Youliang Tian, Ruixin Song, Kun Niu, Mengqian Li, Jinbo Xiong
2025Backdoor-Free Node Injection Attacks Against Graph Neural Networks.
Jiasheng Qiu, Lieqing Lin, Qi Zhong, Zhenyu Liang
2025Bad-PoseDiff: Pose-Guided Backdoor Triggering in Diffusion Models.
Jiahao Chen, Yu Pan, Lin Wang, Yi Du
2025BayesFuzz: Bayesian-Based Greybox Fuzzing for Stateful Protocols.
Jianwen Xiang, Junwei Jiang, Songsong Liao, Xueming Zhang, Rui Hao
2025Beyond Algorithmic Proofs: Towards Implementation-Level Provable Security.
Jiahui Shang, Luning Zhang, Zhongxiang Zheng
2025Beyond Likes: Unraveling the Veil of Personal Data Exposure in Mobile Application GUIs.
Jice Wang, Fannv He, Yue Fang, Yuqing Zhang
2025Bias as an Exploit: A Scalable Red-Team Campaign to Uncover Gender-Based Vulnerabilities in Foundational Models.
Kun Jia, Jiyun Chen, Haizhen Gao, Yuxin Zhang, Qiushi Dong, Daixi Zhang, Huimei Chen, Jiayin Qi
2025BinFuse: Binary Code Similarity Detection via Lightweight Fused Semantic Embedding.
Shengjia Chang, Baojiang Cui, Shaocong Feng
2025Bits for Privacy: Evaluating Post-Training Quantization via Membership Inference.
Chenxiang Zhang, Tongxi Qu, Zhong Li, Tian Zhang, Jun Pang, Sjouke Mauw
2025Blind Points Between ASR and Intent Inferring: Vulnerability Discovering via Fuzzing in-Vehicle Voice Assistance.
Peilin Luo, Wei Teng, Jiachun Li, Yan Meng, Haojin Zhu
2025Blind Video Watermarking Resisting Camcorder Recording Based on Spatio-temporal Synchronization.
Ming Liu, Yifeng Shu, Lansheng Han, Xianjun Gu
2025Blockchain-Enabled Privacy-Preserving Medical Data Sharing with Verifiable Insurance Evaluation.
Junhan Li, Xiubo Chen, Gang Xu
2025Blockchain-Enhanced Random Access in Untrusted Wireless Networks: An Evolutionary Game Analysis.
Xinjian Li, Chang Wang, Yuwei Le, Yutong Wu, Hongwang Zhu, Jiaheng Wang, Jianjun Zhang
2025Blockchain-Verified Attribute-Based Keyword Search with User-Generated Keys in Multi-owner Setting for IoT.
Zongmin Wang, Qiang Wang, Fucai Zhou, Bao Li, Jian Xu, Haoyan Huang
2025BreachHydra: Measuring the Resilience of an Underground Data Breach Forum.
Marius Brockhoff, Lukas Schmidt, Fabian Ising, Sebastian Schinzel
2025Broken Chains: An Empirical Analysis of DNS Resolution in IPv6-only Environments.
Lei Zhao, Yujia Zhu, Baiyang Li, Yong Sun, Yuedong Zhang, Qingyun Liu
2025Buffer is All You Need: Defending Federated Learning against Backdoor Attacks under Non-iids via Buffering.
Xingyu Lyu, Ning Wang, Yang Xiao, Shixiong Li, Tao Li, Danjue Chen, Yimin Chen
2025Building Provably Secure Pseudo-Strong PUFs via Weak PUFs and Pseudorandom Functions for Cryptographic Protocols.
Chenghao Chen, Xiaolin Zhang, Kailun Qin, Tengfei Wang, Yipeng Shi, Tianyi Huang, Chi Zhang, Dawu Gu
2025CAHS-Attack: CLIP-Aware Heuristic Search Attack Method for Stable Diffusion.
Shuhan Xia, Jing Dai, Hui Ouyang, Yadong Shang, Dongxiao Zhao, Peipei Li
2025CEE-MLIA: A Multi-Level Imbalance-Aware Framework for Contract Element Extraction.
Bingcheng Liu, Xiao Qian, Xiuxuan Shen
2025CLEK-HP: A certificate-less efficient key agreement scheme based on hybrid PUF in VANETs.
Junfeng Tian, Tingting Jin, Ni Rui
2025CTIGEN: Generating Cyber Threat Intelligence Oriented Summaries Through Summarization Fine-Tuning with Domain-specific NER.
Xuhao Wan, Xiang Lin, Jianhua Li
2025CVshield: Interpretable Black-Box Adversarial Defense for LLMs via CoT Guided Semantic Verification.
Wenjing Hu, Weiwei Qi, Yanlu Li, Xinzhe Huang
2025Can We Distinguish? A Deep Learning Approach to AI-Generated Content Detection.
Yikai Liang, Mengqing Liu
2025Capodoglio: Tackling Multi-Armed Bandit Jamming Attacks.
Shuo Wang, Alessandro Brighente, Valeria Loscrì, Junqing Zhang, Mauro Conti
2025CatPoison: Category-Oriented Knowledge Poisoning Attacks in Retrieval-Augmented Generation Systems.
Haitao Mei, Zhangzhuo Du, Chao Cai, Chi Cheng, Jian Chen
2025Chaos of Functionalities: Understanding Security Risks in Heterogeneity of IoT Matter Controllers.
Yiwei Fang, Haoqiang Wang, Ze Jin, Qixu Liu
2025Clean Label Backdoor Attack Based on Feature Distance Guided Sample Selection and Noise Optimization.
Lixia Xie, Pengcheng Kang, Hongyu Yang, Juncheng Hu
2025Clue Discovery based on Multi-modal Entity Alignment enhanced by Image Generation and Structure Embedding.
Chunqing Yu, Chengxiang Tan, Zhishuo Zhang, Jiacheng Xu, Jianpeng Hu, Xiangyun Kong
2025CoDA: Cross-Domain Few-Shot Website Fingerprinting via Contrastive Prototype Alignment.
Yongxin Li, Yuwei Xu, Xinhe Fan, Yujie Hou, Yali Yuan, Qiao Xiang, Guang Cheng
2025Combining Evolutionary Learning and Window Method for Finding Short Addition Chains for Large Integers.
Xiaopeng Zhao, Zhusen Liu, Jiawei Qian
2025Compacting Side-Channel Measurements With Peak-Anchor-Based Alignment.
Yuling Luo, Minjiao Pei, Shunsheng Zhang, Xue Ouyang, Qiang Fu, Sheng Qin, Junxiu Liu
2025Comparative Analysis of Cross-Border Data Flow Policies: EU, US, and China.
Zhoujie Rong, Jingfeng Rong, Yuqing Zhang
2025Comparing Reconstruction Attacks on Pretrained Versus Full Fine-tuned Large Language Model Embeddings on Homo Sapiens Splice Sites Genomic Data.
Reem Al-Saidi, Erman Ayday, Ziad Kobti
2025ComplexMM: Efficient and Generic Homomorphic Matrix Multiplication via Complexification and BSGS Alignment.
Yucen Liao, Junping Wan, Jingjing Fan, Zoe L. Jiang
2025ConCloneDep: A Confidence-Aware Clone-Based Dependency Identification Approach in C/C++ Open-Source Components.
Jianxing He, Xi Chen, Shan Yao, Xiaoyan Liang, Ruizhong Du
2025Contrasting Crypto and Exfiltration Ransomware with Shamir's Secret Sharing Data Flooding.
Daniele D'Ugo, Saverio Giallorenzo, Simone Melloni
2025Controller Makes Pentesting Better: An Improved Multi-Agent Automated Penetration Testing Framework.
Xiaoyu Geng, Ning An, Boyuan Xu, Xiaobo Yang, Bo Jiang, Baoxu Liu, Junrong Liu
2025Cross-Modal Collaborative Recovery: Breaking Multimodal Unlearnable Examples Protection.
Ruijia Li, Zijiao Zhang, Ximin Huang, Hongwei Hu, Xining Gao
2025CrossMiner: Smart Contract Vulnerability Detection in Interactive Scenarios.
Xiangfu Liu, Teng Huang, Caiyan Tan, Jiahui Huang, Qiong Wang, Yan Pang
2025CyberNER: A Harmonized STIX Corpus for Cybersecurity Named Entity Recognition.
Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Oussama Azrara, Jaafar Chbili
2025CyberSOIE-LLM: Cybersecurity Semi-Open Information Extraction with Large Language Models.
Xinzheng Liu, Zhaoyun Ding
2025D
Hongliang Yin, Hongjiao Li
2025DAPUR: A Decentralized Anonymous Payment Under Regulation from Bitcoin.
Yu Zhang
2025DCARL: Decoupled-Curriculum for Adversarial Robustness Learning under Long-Tailed Distributions.
Mingyang Chen, Linghui Li, Zhaoyu Wang, Kaiguo Yuan, Bingyu Li
2025DCIAD:Dual CNN with Informer for Time-Series Anomaly Detection.
Xiang Zhong, Yong Wang, Lin Zhou
2025DFAFuzz: Fuzzing for Embedded JavaScript Virtual Machines with Type-Directed DFA.
Haiwei Lai, Baojian Hua
2025DPDA: Decentralized Identity-Based Privacy-Preserving Data Aggregation for AIoT.
Can Zhang
2025DTAHF-Net: Domain-Trust Alignment and Hierarchical Fusion for Multimodal Fake News Detection.
Lexin Feng, Jiayin Wei, Youjun Lu, Fujian Feng
2025Data Driven Based Attention Mechanism for Optimal Anomaly Detection in Complex Multivariate Time Series Data.
Shubha Dhali, Kuntal Ghosh, Siddhartha Prakash Duttagupta
2025DataLineage RCA: Root Cause Diagnosis for Data Lineage Issues Using Large Language Model-Based Agents.
Xin Yi, Shangru Zhao, Yuqing Zhang
2025DeFiAD: A Unified Method for Early-Stage Domain Abuse Detection Through Automated Deep Feature Interaction.
Zhaojun Dai, Xiaodong Lee, Yufan Fu, Botao Peng
2025Decentralizing Photo Forensics for Public and Verifiable Trust.
Mauro Clavijo-Herrera, Rolando Trujillo-Rasua, Carles Angles-Tafalla
2025Deep Learning Assisted Reverse Engineering: Recognizing Encryption Loops in Ransomware.
Nanqing Luo, Haizhou Wang, Zhilong Wang, Lan Zhang, Ping Chen, Peng Liu
2025DeepLancet: Effectively Detecting Deep Learning Library Bugs via LLM-assisted Testcase Generation.
Zihao Luo, Baojian Hua
2025Defending Federated Learning against Backdoor Attacks by Inspecting Sparsity-Guided Out-of-Distribution Model Behavior.
Songgao Tu
2025DerandomPre: An LLM-based Stability Enhancement Method for Network Protocol Fuzzing.
Yifan Zhang, Kailong Zhu, Qian Chen, Zixiong Li, Yuliang Lu, Yingchun Chen
2025Detecting Content Rating Violations in Android Applications: A Vision-Language Approach.
Dishanika Denipitiyage, Bhanuka Silva, Suranga Seneviratne, Aruna Seneviratne, Sanjay Chawla
2025Detecting Multi-Turn Jailbreak Attacks in Large Language Models via Linear Probes.
Jorge Marina-Metola, José María de Fuentes, Lorena González-Manzano, Luis Ibañez-Lissen
2025Detection and Mitigation of Unknown Threats in IPv6 Networks via Layered Data Adaptation.
Youjun Huang, Xiang Li, Jia Zhang, Haixin Duan
2025Diffusion-Driven Video Steganography: A Three-Stage Framework for Robust and High-Capacity Data Concealment.
Yuning Zhou, Min Wu, Hongxiang Ji, Ziwei Wang
2025Disguised Attack in the Metaverse: A New Threat to Avatar-Based Identity Security.
Chen Zhang, Zhenyong Zhang, Cong Wang, Ruilong Deng
2025Diverse Fault Attacks on Dilithium and Variant Implementation: Skipping, Aborting and Zeroing.
Hao Yuan, Yuejun Liu, Jingdian Ming, Yongbin Zhou
2025DoNotSurf - Low-Latency DNS IP Tunneling.
Alexandru Kiraly, Darius Bufnea
2025Dual Gradient Evaluation-Based Defense Method Against Poisoning Attacks in Federated Learning.
Zhuangzhuang Zhang, Xinhai Yan, Libing Wu, Bingyi Liu, Enshu Wang, Jianping Wang
2025Dynamic Hybrid Backdoor Attack: Saliency-Guided Composite Triggers for Image Classification.
Yuanhao Shen, Ying Wang, Yiran Liu, Zili Yao, Xue-song Qiu, Shaoyong Guo
2025EFSM-Based Modeling of Siemens S7comm for Adaptive Cyber Deception in ICS Honeypots.
Saurabh Chamotra, Ferdous Ahmed Barbhuiya
2025ET-FS: Functional Specialization Method for Multi-Task Learning in Encrypted Traffic Classification.
Xinzhu Feng, Gaopeng Gou, Chang Liu, Zheyuan Gu, Wenqi Dong, Famei He, Xuren Wang
2025ETCFF: An Encrypted Traffic Classification Method Based on Fusion Features.
Zhipeng Fu, Fanping Zeng
2025Early Classification and Improved Performance: A Multi-Model Serial Encrypted Traffic Classification Framework.
Jinhui Li, Guang Cheng, Zihan Chen
2025EdgeTrace: A Context-Aware Anomalous Edge Detection Framework for APT Traceback.
Nianqi Yang, Zhijian Zhao, Bing Chen
2025Efficient Auditing and Querying in Verifiable Redactable Blockchain: A Lightweight VDS Protocol with Integrity Verification.
Xiaoxu Zhang, Zhipeng Cai, Keyan Chen, Guanxiong Ha, Chunfu Jia
2025Efficient Zero-Knowledge Proofs for Typical Non-Linear Functions in Machine Learning.
Shengqi Jin, Weihan Li, Zongyang Zhang
2025Efficient and Dynamic Multi-Source Data Analytics over Encrypted Cloud Data with Bitmap-Based Indexing.
Yuyang Wang, Wei Song, Ruisi Song, Yuan Shen, Xiaohui Wang
2025Efficient and Privacy-Preserving (α, β)-Core Community Search over Encrypted Bipartite Graphs.
Xiaoxian Liu, Chen Chen, Xueqiao Liu, Xiaoyang Wang
2025Efficient and Secure Spatial Keyword Similarity Query with User Preference.
Shen Du, Xinrui Ge, Chengliang Tian
2025End-to-End Security Policy Automation with Multi-LLM Agents in Cloud-Native Systems.
Xuefei Chen, Yuqi Zhang, Haohao Liu, Xiaotong Wang, Chen Li, Bibo Tu
2025Engine-Agnostic Evaluation of Container Isolation Characteristics.
Felix Wruck, Maximilian Peisl, Michael Weiß
2025Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting.
Dilli Prasad Sharma, Liang Xue, Xiaowei Sun, Xiaodong Lin, Pulei Xiong
2025Enhancing Data Security in RISC-V Embedded Systems: A Lightweight Architecture.
Dunkai Mao, Lifeng Xi, Fujia Zhang
2025Enhancing Federated Learning under Partial Participation via Proportional Variance Reduction.
Xiang Wang, Lei Tian, Chen Yang, Feilong Lin, Minglu Li
2025Enhancing Physical Security in Smart Environments with Ambient Intelligence.
Ashish Nanda, Robin Doss, Folmer Heikamp, Abhi Kumar, Haftu Reda, Adnan Anwar, Zubair A. Baig, Praveen Gauravaram, Debi Prasad Pati, Salil S. Kanhere, Mohan Baruwal Chhetri
2025Establishing Secure Intra-Solid Communication Networks via Acoustic Transceivers.
Chaoyi Sun, Henglin Pu, Junyi Zhou, Chao Cai
2025Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware Detection.
Samy Bettaieb, Serena Lucca, Charles-Henry Bertrand Van Ouytsel, Etienne Rivière
2025Evasion Attacks in Continual Learning.
Niklas Bunzel, Aino Schwarte
2025Exploring Subtle Manipulation Vulnerabilities in Federated Distillation.
Peiyan Chen, Changsheng Wan, Hao Zou, Tian Wen, Zhiyuan Wu
2025Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks.
Gerrit Klause, Niklas Bunzel
2025FABA: Breaking Defenses in Production-Grade Federated Learning for Mobile Malware Detection Services.
Xingyu Lu, Yang Cao
2025FBFISADetector: A Method based on Filter Mechanism to detect the Instruction Set Architecture of Monolithic Firmware.
Qing Yang, Shangru Zhao, Yuqing Zhang
2025FDLLM: A Dedicated Detector for Black-Box LLMs Fingerprinting.
Zhiyuan Fu, Junfan Chen, Lan Zhang, Ting Yang, Jun Niu, Hongyu Sun, Ruidong Li, Peng Liu, Jice Wang, Fannv He, Yuqing Zhang
2025FST-AD: Anomaly Detection for Cyber-Physical Systems via Frequency-Spatio-Temporal GNNs.
Zhenya Chen, Xueying Bian, Ming Yang, Chensheng Liu, Xiaoming Wu, Sihan Lu
2025FTE: Filter-Based Trust Evaluation for the Internet of Vehicles.
Hai Lin, Xingchen Zhu, Zhihong Chen, Yue Cao
2025Fair Data Exchange Scheme with Cryptographic Commitment and Smart Contract for Data Trading.
Xiaomei Yan, Yong Li, Yan Zhu
2025Fairness-Constrained Optimization Attack in Federated Learning.
Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy
2025FakeZero: Real-Time, Privacy-Preserving Misinformation Detection for Facebook and X.
Soufiane Essahli, Oussama Sarsar, Imane Fouad, Ahmed Bentajer, Anas Motii
2025FaultSpy: On the Insecurity of SPDM Protocols under Fault Injection.
Peiyao Sun, Qifan Wang, David F. Oswald, Mark Dermot Ryan, Vladimiro Sassone, Ahmad Atamli
2025Fed-CMA: Federated Clustering and Matched Averaging for Personalized Intra-Vehicular Network Intrusion Detection.
Louis Agnese, Xiaojie Lin, Guangsheng Yu, Xu Wang
2025FedDHKD: A Lightweight Federated Learning Framework Based on Dynamic Hierarchical Knowledge Distillation for 5G IoT.
Junxuan Lv, Qiwei Zhao, Hongbo Tang, Hang Qiu, Wei You, Yu Zhao
2025FedEdge: Federated Self-Supervised Graph Learning with Personalized Fine-Tuning for Node Classification.
Zichao Deng, Han Yu
2025FedPPA: Progressive Parameter Alignment for Personalized Federated Learning.
Maulidi Adi Prasetia, Muhamad Risqi U. Saputra, Guntur Dharma Putra
2025FedProbe: Attacking Federated Model Ownership Verification via Fine-Grained Watermark Detection and Erasure.
Kunlong Jin, Youliang Tian, Lujia Shi
2025FedRand: A Federated Random Forest Learning Technique for Anomaly Detection in IoT Networks.
Omodolapo Babalola, José Cano, Somrudee Deepaisarn, Nguyen Truong
2025Finder6: Efficient IPv6 Addresses Scanning Based on Hostname Correlation in IPv6-Only Network.
Ce Sun, Liancheng Zhang, Ruijuan Wang, Yakai Fang, Hongtao Zhang, Haojie Zhu, Luyang Li
2025Fine-Grained Revocable Lattice-Based ABE: Dual User and Attribute Revocation with Low Overhead for Cloud Environments.
Yuliang Liu, Yuan Liu, Yiwen Gao, Yongbin Zhou, Licheng Wang, Peng Gao
2025Flatness-Aware Attack: Enhancing Adversarial Transferability via Local Region Stability.
Kejun Zhang, Yufan Yang, Jiahao Cheng, Meijiao Li
2025FlexiGrain: A Flexible and Fine-Grained Privacy Control Framework for Dynamic Social Networks.
Ben Niu, Fanyu Gan, Jinyu Peng, Qian Yang, Jin Cao
2025Flow-Based Screen-Shooting Robust Watermarking with Invertible Noise Simulation Network.
Pei Gan, Xuehu Yan, Hu Deng, Rongtao Liao, Feng Chen
2025ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models.
Siyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu
2025From Electronic Contracts to Smart Legal Contracts: A Template-Based Approach.
Haoxiang Chen, Ning Zhang, Jiayue Liu
2025From Sample Generation to Efficacy Transfer: Optimization of Privacy-Preserving LLMs for Content Moderation.
Mingyong Yin, Tong Liu, Hejun Wang, Yulong Wang, Run Yang
2025From Survey to Application Vision: LLM Watermarking Techniques and Prospects in Scientific Scenarios.
Chen Yucheng, Li Yang, Li Qiao, Yajiao Wang, Wang Meng, Hanyu Li
2025From Text to STIX: Reducing Hallucinations through Fine-Tuned LLMs.
Ruoyao Xiao, Yu Luo, Weifeng Xu, Dianxiang Xu
2025From static to dynamic risk indicators in predicting and detecting insider attacks.
N'Famoussa Kounon Nanamou, Rim Ben Salem, Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens
2025GAPPO: Graph-Attention Enhanced Reinforcement Learning for Efficient Attack Path Planning.
Xiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Junchao Fan, Xiaolin Chang
2025GMFuzz: Integrating Hierarchical Mutation and Fidelity Constraints for Coverage-Guided DNN Security Testing.
Yue Cui, Guangshun Li, Kexin Yang, Junhua Wu
2025GPEA: Grad-CAM-Guided Perceptibility-Reduced Ensemble Attack in Object Detection.
Zhengheng Li, Hui Xia, Rui Zhang, Mengyuan Song, Aoqi Ruan, Shaoqiang Wang
2025GTCN-G: A Residual Graph-Temporal Fusion Network for Imbalanced Intrusion Detection.
Tianxiang Xu, Zhichao Wen, Xinyu Zhao, Qi Hu, Yan Li, Chang Liu
2025GVTMC: A Novel Cryptocurrency Mining Traffic Classification Method.
Yujie Lai, Huiyong Liu, Wei Zhang
2025Generating Structured BPMN Models from Smart Contracts Using LLMs.
Linlin Chen
2025Ghost Vehicle: A Game-Theoretical Attack Strategy Targeting CAV Platoons.
Lanai Huang, Winston Ellis, Sana Belguith
2025Goal Hijacking Attack on Large Language Models via Pseudo-Conversation Injection.
Zheng Chen, Buhui Yao
2025Granular Ball and Curriculum Learning-Based Fuzzy Support Vector Machine.
Zhenlei Wu, Xiaoqin Pan, Lei Zhou
2025GraphAss: Multi-dimensional dependency semantics graph-based Automobile software vulnerability detection method.
Qingwen Han, Shiyu Sun, Jianmei Lei, Lingqiu Zeng, Yang Liu, Lei Ye, Kaiwei Fan
2025HARS:A Dynamic Scheduling Algorithm for Redundant Executors Based on Weighted Hypergraph Heterogeneity.
Yifan Wang, Xinjian Zhao, Zesheng Xi, June Li, Xu Zhong, Yu Li
2025HOT-SPT: Hierarchical Optimal Transport for Robust and Fair Cross-Domain Video Expression Recognition.
Qianli Zhao, Zhen Wang, Linlin Zong, Chao Jin, Xiaohuan Li
2025Hamster: Private Transformer Inference via Fully Homomorphic Encryption.
Huizhuo Wang, Zhiyong Zhang, Lei Ju
2025Hardware-Aware Neural Architecture Search for Real-Time Automotive Intrusion Detection.
Xuke Yan, Linxi Zhang
2025HiFi-XAI: A Fidelity-Aware, LLM-Powered Framework for Trustworthy Intrusion Detection.
Avinash Awasthi, Pritam Vediya, Hemant Miranka, Ramesh Babu Battula, Priyadarsi Nanda
2025Hierarchical Ring Signatures with Hidden Signature Functionality over Blockchain Infrastructure.
Lukasz Krzywiecki, Witold Karas, Adam Niezgoda, Karol Niczyj
2025High-fidelity Dual-layer Backdoor Watermarking Scheme based on Private Model Embedding.
Lingyun Xiang, Fangbo Luo, Xiangli Jin
2025Hotness Strategy based Secure Cross-user Deduplication for Cloud Storage.
Liangyu Zhang, Junyu Cheng, Xin Tang, Jiaxin Li
2025Human-Machine Collaborative Cognition for Intelligent Operation of Cascade Filtration Systems: A Dynamic Decision Framework Based on Fuzzy Inference and Uncertainty Analysis.
Zhengqin Zhu, Junjie Song, Peiyan Pan, Yixiong Feng, Zhifeng Zhang
2025HyBiGraph: Toward Multi-Order Malicious Encrypted Traffic Classification via Hyper-Bipartite Graph Fusion.
Yibin Zhou, Yunxiao Shi, Xiao Yang, Da Xiao, Gaolei Li, Jianhua Li
2025Hybrid Fault Attack on Grain-128AEAD: Signature or Machine Learning Localization with Bandit-Guided Recovery.
Ya Lin, Iftekhar Salam
2025Hybrid Multi-granularity Reconstruction and Contrastive Learning for Graph Anomaly Detection.
Mingjie Yu, Jiong Yu
2025Hyperchaos and HVS-Adaptive Video Watermarking Embedding.
Kesong Wu, Maowei Li, Peng Yang, Wanting Yang, Jiangtian Nie, Xianbin Cao
2025IAGNN: Mitigating Quantity and Topological Imbalance for Fair Graph Learning.
Yangqi Liu, Xuemin Wang, Liang Chang, Heng Yang
2025IEPIS: An Intelligent Endpoint Protection and Insight System.
Rahul K. Patel, Puya Pakshad, Sumeet Batra, Shubhayan Das, Alapan Ghosh
2025Identification of Generative Forged Western Blot Images.
Yunqiao Zhang, Shunquan Tan, Jiwu Huang
2025Identity-Based Asymmetric Group Message Franking.
Hang Liu, Yang Ming, Aotian Cai, Chenhao Wang, Yi Zhao
2025Improved Differential-Linear Distinguishes on the ChaCha256 Stream Cipher.
Honglei Wang, Lin Ding, Zhengting Li, Xinhai Wang
2025Improved Rsqrt for Faster Secure Neural Networks Inference.
Jiafu Liu, YeDong, Yuqi Zhou, Jun Huang
2025Improving Reliability of Electric-Vehicle Charging Service: A Scalable Modeling Approach.
Xiuping Li, Yong Li, Yangbai Zhang, Xiaowei Li, Xiaolin Chang
2025Improving the SEU Reliability of TMR Designs Implemented on SRAM-Based FPGAs with Redundant Module Restructuring.
Chidan Zhu, Jingjing Hu, Yuanhang Sun, Yu Li
2025Incentive-Compatible Pricing for Truthful Data Sharing.
Mingjian Tang, Weiqi Wang, Shui Yu
2025Incorporating Statistic and Semantic Dependencies for Enhancing the Robustness of Android Malware Detection.
Lingyu Qiu, Zhen Liu, Bitao Peng, Ruoyu Wang, Changji Wang, Qingqing Gan
2025Interprocedural Call Graph Embedding with GAT for Memory safety Vulnerability Detection.
Rong Ren, Jingyi Wu, Hongbo Jin, QingYu Song, Bing Zhang, Qian Wang
2025Intrusion Detection via Federated Learning: Tackling Non-IID Data and Poisoning Attacks.
Quan Li, Yuhong Li
2025Jailbreaking Multimodal Large Language Models via Consistent Cross-Modal Backgrounds.
Meng Yang, Peirou Liang, Zhiqian Wu, Yong Liao
2025KHAD: K-Hop and Activation-aware Defense against Bit-Flip Attacks in Deep Neural Networks.
Jiajun Guo, Hao Ying, Zhezhao Yang, Xinyue Yu, Tianqi Shi, Jie Xiao
2025KSFed: A Defense against Poisoning Attacks in Federated Learning using Statistical Analysis.
Jiaxuan Zhao, Qi Feng, Qin Liu, Min Luo, Wei Zhao, Debiao He
2025L2M-AID: Autonomous Cyber-Physical Defense by Fusing Semantic Reasoning of Large Language Models with Multi-Agent Reinforcement Learning.
Tianxiang Xu, Zhichao Wen, Xinyu Zhao, Jun Wang, Yan Li, Chang Liu
2025LASEFlow: A Label-Aware Security Enhancement Framework for Serverless Workflows.
Minghui Chen, Keming Wang, Chenlin Huang, Fengyuan Yu, Renyu Yang, Hua Cheng, Mantun Chen
2025LDFS: LLMs with Dynamic Few-Shot for Offensive Language Detection.
Yimin Wang, Qian Huang, Kaizhi Wu, Kai Guo
2025LDInfer: Landmarks Inference-Based for Facial Forgery Detection of Different Quality.
Jiaxin Jiang, Zhiwen Chen, Hui Zhou, Wenjun Yan, Tianshuo Jiao, Bohan Tan, Zhuo Zhang, Hao Chen, Zheng Qin
2025LDP: Latent Diffusion-based Adversarial Purification towards Transformer-based Visual Encoders.
Mengfan Li, Xinxin Fan, Quanliang Jing, Shaoye Luo, Yunfeng Lu, Jingping Bi
2025LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices.
Michael Eckel
2025LLM-Assisted IDOR Detection in Hospital Mini-Programs: Risks to PII and PHI.
Jiawen Sun, Rui Tian, Shangru Zhao, Xiangming Zhou, He Wang, Yuqing Zhang
2025LLM-Driven APT Analysis and Detection Based on Provenance Graph by Threat Pattern.
Yibin Fu, Zhaoyun Ding, Sheng Zhang, Deqi Cao, Yi Wang
2025LLM-Guided Mutation Location Selection for Vulnerability-Aware JavaScript Engine Fuzzing.
Jizhe Li, Yongjun Wang, Haoran Xu, Lin Peng, Muxin Xu, Tian Xia
2025Lattice-based Dynamic Privacy-preserving Cross-chain Payment Scheme.
Bing Zhang, Guijuan Wang, Zhongyuan Yu, Anming Dong, Hongliang Zhang
2025Layered Website Fingerprinting Defense Against Adversarial Training.
Yong Zeng, Jiaze Li, Hao Liu, Zhihong Liu, Jianfeng Ma
2025Leader-Follower Federated Learning Framework: Heterogeneous Federated Learning based on Asymmetric Distillation.
Lina Ge, Haisong Zhu, Ming Jiang, Zhe Wang
2025Learning to Co-Design Routing and Processing in Computing Power Networks.
Ye Qin, Kexian Liu, Jianli Liu, Xiaolong Hu, Zejun Lan, Jianfeng Guan
2025Leveraging Cross-Layer Network Probing to Detect Stealth Services.
Jiangyi Yin, Chenxu Wang, Zhao Li, Zhuojun Jiang, Jiangchao Chen, Dongfang Hao, Qingyun Liu
2025Leveraging large language models for SQL behavior-based database intrusion detection.
Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li
2025Local Midpoint Guided Topology Control Method for Elimination of Vulnerable Node in UAV Ad-Hoc Networks.
Peng Zhang, Peng Yi, Tong Duan, Zhen Zhang, Jiaxin Li, Junfei Li, Jing Yu
2025Location Privacy Protection for Network-RTK VRS Positioning Users via Mobile Networks.
Ruoting Xiong, Yi Ren, Xin Shi, Wei Ren, Gerard Parr
2025Log Intelligent Knowledge Base Construction Method Based On Streaming Graph Fusion.
Xinzhuo Xue, Shangru Zhao, Yuqing Zhang
2025Log2Sig: Frequency-Aware Insider Threat Detection via Multivariate Behavioral Signal Decomposition.
Kaichuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng
2025MAD-OOD: A Deep Learning Cluster-Driven Framework for an Out-of-Distribution Malware Detection and Classification.
Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Asif Rahman, Olukunle Kolade, Sasidhar Kunapuli
2025MBCGAN-SGFM: Detecting Rare and Unknown Attacks via Generative Augmentation and Semantic Memory.
Yunhao Wang, Yong Wang, Lin Zhou
2025MEB: A Backdoor Detection Framework for Pre-training Based Malicious Traffic Detection.
Kai Wang, Jieying Zhou, Libo Yang, Weixun Li, Ziguang Jie, Zheyu Jiang, Zhiliang Wang
2025MIMO Channel Modeling Based on Physics-Constrained Generative Neural Networks.
Hanxiao Li, Hongmei Wang, Shuo Liu, Weilong Zhang
2025MLSBOX: Automated Sandbox for Fine-Grained Isolation of Multiple Third-Party Libraries
Yuqi Qiu, Juan Wang, Chenjun Ma, Yunfeng Kang, Jie Wang
2025MR-Patch: A Retrieval-Augmented Generation Approach for Patch Presence Test.
Zirui Jiang, Yisen Wang, Xingyu Bai, Jiajun Du, Tianchan Yang, Bing Zhu
2025MSG-ImDiffusion: Multi-Scale Spatio-Temporal Diffusion Modeling for Anomaly Detection in Microservice Systems.
Ruoyao Zhang, Yuchun Guo, Yishuai Chen, Zhong Cao
2025MVL-AD:A Multi-View Learning Framework for Class-Incremental Unknown Attack Detection.
XuKui Li, Guang Cheng, Wei Chen, Zhen Zhang, Zechen Xu, Xing Qiu
2025Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling.
Karla Schäfer, Martin Steinebach
2025MalShield: Enhancing Android Malware Detection with Stateful Defense against Query Attacks.
Hengyu Zhang, Guang Cheng, Yuyang Zhou, Zongyao Chen
2025Mitigating Leakage Amplification in DP-Enhanced Encrypted Search Across Multiple Users.
Yingying Qi, Jiabei Wang, Tiancheng Zhu, Yongbin Zhou
2025Mixture of Experts Representation Learning Scheme for Multi-View Android Malware Detection.
Jiaxiong Chen, Shuaishuai Tan, Jinchuan Liu, Zehua Zhang, Jianjun Zhou, Qiannan Lin, Haowen Tan
2025Model Evaluation-Driven Aggregation: FedMEDA for Robust Non-IID Federated Learning.
Bosong Zhang, Linna Zhang, Qian Sun, Hai Wang, Danyang Li
2025Model Reduction of Colored Petri Nets Based on Unrelated Transitions.
Zhen Gao, Tao Sun
2025Multi-Channel Attacks on Dilithium: Bridging Power Gaps with EM-Guided Synthetic Traces.
Qikang Fan, Jingdian Ming, Yiwen Gao, Yongbin Zhou
2025Multi-Directional Dynamical Framework for Information Propagation Prediction.
Yuhang Wang, Ziang Hu, Guang Wang, Yu Shang, Jizhong Han, Tao Guo
2025Multi-Party Contract Signing Ensuring Trust in Complex Transactions.
Catalin V. Bîrjoveanu, Mirela Bîrjoveanu
2025Multi-keyword Searchable Encryption Scheme with Policy Hiding Support for User Revocation in Cloud Environment.
Xuan Zhang, Suzhen Cao, Tianhao Zhang, Guorui Liu, Lei Han, Xiaodong Yang
2025Multidimensional Dynamic Trust Evaluation towards Intelligent Transportation.
Kaixuan Luo, Chuanxiang Ma
2025NFD-TRG: Network Flow Detection via Traffic Relationship Graphs with Statistical Feature Embedding.
Mingshu He, Xiaowei Zhao, Liu Yang
2025NFDP: Enabling Noise-Adaptive and Fast-Converging Privacy Protection in Graph Neural Network Training.
Hang Chen, Bo Yin, Binyao Xu
2025No Touch, No Trace: A Paradigm for Remote Voltage Side-Channel Attacks on FPGA-Based Computing Platforms.
Zhe Liu, Kun Zhou, Chengkai Chen, Jianfei Mao, Hongbing Cheng
2025Non-Restrictive Hardware-Based Trust in Embedded High-Level Operating Systems.
Simon Unger, Sven Gebauer, Stefan Katzenbeisser
2025ORThrus: Detecting Deep Learning Compiler Bugs via Optimization Resistance Transformations.
Tongwei Zhang, Baojian Hua
2025OSSDetector: Towards a More Accurate Approach for C/C++ Third-Party Library Detection.
Xiang Hai, Jia Zeng, Zhiyuan Fu, Siyu Chen, Yansong Shi, Hongyu Sun, Jice Wang, Fannv He, Yuqing Zhang
2025OUF: Oblivious Universal Function with domain specific optimizations.
Victor Delfour, Marc-Olivier Killijian
2025OmniNova: A General Multimodal Multi-Agent Framework.
Bingzhen Li, Zihan Wang, Pengfei Du, Yupeng Jiang
2025On the Limitations of Fuzzy Hashing for Malware Similarity: An Analysis of Vulnerable Code Detection in Malware.
Nathan Ross, Oluwafemi Olukoya, Jesús Martínez del Rincón
2025On-Chain Risk Signals: Predicting Security Threats in DeFi Projects.
Bahareh Parhizkari, Antonio Ken Iannillo, Ed Zulkoski, Christof Ferreira Torres, Radu State
2025Online Reliability Assessment of Nuclear Power Components via Mechanistic and Data-Driven Modeling.
Xiangyu Jiang, Yixiong Feng, Zhi-Wu Li, MengChu Zhou, Xuanyu Wu, Jianrong Tan
2025Opening a Can of Worms: A Comprehensive View into the Android Debug Bridge Malware.
Huancheng Hu, Christian Doerr
2025OptiFLIDS: Optimized Federated Learning for Energy-Efficient Intrusion Detection in IoT.
Saida Elouardi, Mohammed Jouhari, Anas Motii
2025Optimization Design Method for Nets in Multi- Stage Filtration System of Nuclear Power Plant Using Cognitive Intelligence Techniques.
Peiyan Pan, Zhifeng Zhang, Yixiong Feng, Zhengqin Zhu, Junjie Song, Jianrong Tan
2025Optimizing FHE-Based Secure Matrix Computation for Untrusted Cloud Environments.
Yuanyuan Xie, Ming Luo, Han Wang, Mingsheng Wang
2025Optimizing Spectrum Sharing in Low-Altitude Intelligent Networks: A Model-Based Reinforcement Learning Approach.
Tianle Li, Qingyu Liu, Peixi Peng
2025Overcoming Data Mining in Blockchain-Based Covert Communication: Transaction Withdrawal and Multisig Embedding.
Jialing He, Zhuo Chen, Yijing Lin, Jiacheng Wang, Liehuang Zhu, Zhu Han, Rahim Tafazolli, Tao Xiang
2025P
Wei Yu, Cheng Tan, Lvlin Ni, Chengyu Du, Cheng Liu, Qingbing Ji
2025PACT: A Passive Accuracy-Based Trust Metric for Malicious Client Detection in Federated Learning.
Sayedali Sheykholeslamzadeh, Dima Alhadidi
2025PANDA-CDR: Perturbation-Aware and Neural Dual-Channel Alignment for Cross-Domain Recommendation.
Ruohan Wang, Gaode Chen, Miaobo Hu, Ji Xiang, Ruixin Song, Cong Xue, Lei Wang, Haoyuan Teng
2025PDD-FANs: Personalized Decentralized Federated Adversarial Networks with Defense Mechanism in Non-IID Setting.
Xinguang Wang, Nguyen Linh Trung, Oliver Y. Chen, Jeroen Van Schependom, Stijn Denissen, Guy Nagels
2025PIRL: A Robust and Privacy-Preserving Learning Method from an Information-Theoretic Perspective.
Guangyuan Liu, Shigong Long
2025PLAA: Packet-level Adversarial Attacks in Network Traffic Detection.
Jinhao You, Zan Zhou, Shujie Yang, Yi Sun, Lei Zhang, Changqiao Xu
2025POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization.
Aiyao Zhang, Xiaodong Lee, Zhixian Zhuang, Jiuqi Wei, Yufan Fu, Botao Peng
2025PPFDroid: An Android Malware Detection Method Based on Pre-Training and Prompt-Based Fine-Tuning.
Xufeng Wang, Yuqi Ma, Hongxian Liu, Sanfeng Zhang
2025PPIA-MTL: Efficient Property Proportion Inference Attacks on Tabular Generative Models via Multi-Task Learning.
Ninghui Zhang, Chun Long, Jing Li, Fan Yang, Yuhao Fu, Wei Wan, Haojie Nie, Xingbo Pan
2025PROV-LLM: Advanced Persistent Threat Detection Based on Process Behavior Subgraphs Using Large Language Models.
Canhua Chen, Yang Song, Yunpeng Li, Yun Feng, Xiaoyu Wang, Yuling Liu, Qixu Liu
2025PSI-TR-ABE: A Traceable and Policy-Hidden Attribute-Based Encryption Scheme for Medical Data Sharing.
Ye Feng, Siqi Lu, Liujia Cai, Xingyun Hu, Xinxin Wang, Yongjuan Wang
2025PUF-Enhanced Physical-Layer Key Generation for Secure Drone Communication with Untrusted Relays.
Tao Chen, Dongming Li, Xianglin Fan, Yi Lou
2025Passkeys in Practice: An Empirical Evaluation of FIDO2/WebAuthn Compliance and Interoperability.
Ahmed Mahfouz, Rawad Abdulghafor, Alaa A. K. Ismaeel
2025PathFed: Trustworthy and Efficient Federated Aggregation via Path Attention.
Manzhou Li, Xinjin Ge, Yan Li, Yan Zhang
2025PoDIBC: Prevention of DrDoS Attacks Using Identity -Based Cryptography in Software-Defined Networking Environment.
Shain Saharan, Vishal Gupta
2025Post-Quantum Anonymity of Key Encapsulation Mechanism and Its Applications in Password Authenticated Key Exchange Protocols.
JiaYv An, Yankun Gao, Lei Han
2025Post-Quantum Cryptography for Secure Authentication Key Distribution in QKD Networks.
Filip Lauterbach, Lukas Kapicak, Sergej Jakovlev, Miralem Mehic, Stefan Rass, Miroslav Voznák
2025PrivANN: Practical and Efficient Private Approximate Nearest Neighbor Search.
Xuan Chen, Shujie Cui, Joseph K. Liu, Shifeng Sun, Shangqi Lai
2025PrivFGL: Differentially Private Federated Graph Learning via Personalized Data Transformation.
Songyan Zhang, Hanyu Lu, Hongfa Ding
2025PrivRAG: A Privacy-Preserving Retrieval-Augmented Generation Protocol for LLM-Driven Voice Assistants.
Yuan Chang, Siran Wang, Tom H. Luan, Yuntao Wang, Zhou Su
2025Privacy Protection Method for 3D Trajectories Integrating Semantic Information.
Mengyao Zhang, Ding Mu, Zihan Wang, Na Fan
2025Privacy for AI Generated Images: Conditional Generative Adversarial Networks Trained Over Obfuscated Data.
Krzysztof Talalaj, Lukasz Krzywiecki, Marcin Zawada
2025Privacy-Assured Analytics on Decentralized Graphs:The Case of Graph Learning.
Longji Li, Yifeng Zheng, Songlei Wang, Zhongyun Hua, Lei Xu, Yansong Gao
2025Privacy-Preserving Average Consensus by One-Step Perturbation.
Hanyu Zhao, Yinyan Zhang
2025Privacy-Preserving Distributed Optimal Consensus of High-Order Nonlinear Multi-Agent Systems.
Yuxuan Xiong, Yinyan Zhang
2025Privacy-Preserving Facial Authentication with Hybrid Fuzzy Commitment and Cancelable Transformation.
Weilai Guo, Shuaichao Song, Yeming Yang, Yuming Liao, Jiyuan Li, Songhui Guo
2025Privacy-Preserving and Control-Compliant Authenticated Access for the AI-Enabled Industrial Internet of Things.
Qing Fan, Yumeng Xie, Zhitao Guan, Yongshuang Wei, Yajie Wang, Chuan Zhang, Liehuang Zhu
2025Privacy-preserving Location-Based Services with A New Private Information Retrieval Scheme.
Xiaopang Wang, Lihui Wang, Limin Guo
2025Proactive Federated Backdoor Unlearning via Two-Phase Optimization and State Replacement.
Ze Chai, Yijing Lin, Zhipeng Gao, Zhiqiang Xie, Dusit Niyato
2025Proactive Radio Frequency Fingerprinting-Based Authentication Leverage IQ Perturbation.
Siqi Pei, Shiyue Huang, Hongbo Liu, Haitao Jia, Yanzhi Ren, Huan Dai, Jiadi Yu
2025ProfilE: Self-Supervised Communication Relationship Profiling for Imbalanced Smart Grid Anomaly Detection.
Haimiao Li, Changbo Tian, Runqing Zhang, Shiyi Yuan, Bo Sun
2025Prototype-Integrated Representation Learning for Novelty Detection.
Saranya Vijayakumar, Christos Faloutsos, Matt Fredrikson
2025Provenance graph-based advanced persistent threats detection via self-supervised contrastive learning.
XuTao Xiang, Yanqing Yang, Yurong Qian, Kai Zhao, Linlin Zhang
2025Pruning for Security: Mitigating Stealthy Bit-Flip Attacks with Efficiency Gains.
Hao Ying, Jiajun Guo, Xinyue Yu, Zhezhao Yang, Tianqi Shi, Jie Xiao
2025Pure Object Detection for Text-CAPTCHAs - YOVO: A Lightweight Recognition Model and Annotation Framework Derived from YOLOv8n.
Disen Tang
2025QUICkly Running Out of Money: Evaluating QUIC Resilience to Traffic Inflating Attacks.
Giovanni Menon, Enrico Bassetti, Mauro Conti
2025RASKEE: A TEE-Assisted Secure Range Spatial Keyword Query in a Multi-user Setting.
Zhen Lv, Yaorong Tan, Hongwei Huo, Yanguo Peng, Youliang Tian
2025RESA: RLWE-Based Efficient Secure Aggregation For Federated Learning.
Ziming Wang, Liang Zhang, Hang Zhou, Haibin Kan, Jiheng Zhang
2025RL-Optimized Lightweight Obfuscation Against Binary Code Similarity Detection.
Ran Wei, Hui Shu, Fei Kang
2025RaceTEE: Enabling Interoperability of Confidential Smart Contracts.
Keyu Zhang, Andrew Martin
2025Range Dynamic Searchable Symmetric Encryption: Combating Volume Leakage and Enabling Non-interactive Deletion.
Jinguo Li, Qiang Lv, Junqin Huang, Linghe Kong
2025ReTainer: Reputation-Aware Containerized Service Deployment in Blockchain Networks.
Xiaoxu Ren, Qixin Li, Haipeng Yao, Tianhao Ouyang, Ruichen Zhang
2025Real-Time Forgery Detection via Dynamic Frequency-Domain Selection and Phoneme Alignment.
Wenbin Li, Peng Yang, Xiaoyu Geng, Kesong Wu, Hongtao Yu
2025RecZTA: A Reputation-Based Architecture with Dual-Layer PEPs for Zero Trust Access.
Zhi Lin, Lin Yan, Zan Zhou, Yongfeng Yu, Penghui Xiao, Shujie Yang
2025Recipient-Agnostic Hash Locks for Cross-Chain Auctions with Bitcoin Bidding.
Fuyang Deng, Qianhong Wu, Bo Qin
2025RegMix: Adversarial Mutual and Generalization Regularization for Enhancing DNN Robustness.
Zhenyu Liu, Varun Ojha
2025Reinforcement Learning Enhanced Temporal Generative Adversarial Networks for Blockchain Illicit Transaction Detection.
Mengyuan Li, Jiewei Chen, Shao-Yong Guo, Xuesong Qiu, Feng Qi
2025Reliable and Robust Watermarking for Data Flooding against Ransomware Random Techniques.
Saverio Giallorenzo, Simone Melloni, Pietro Sami
2025Resource Allocation and Optimization in Low-altitude D2D Communication Networks.
Changyuan Ji, Zongyan Li, Chen Yang, Hao Wang
2025Retrieval-Augmented Generation-Based Adaptive State Enhancement for Federated Split Learning.
Boyang Dong, Xiukun Yan, Kai Zeng
2025Review of Defect Detection Techniques for Power Information Systems.
Xingwang Dou, Shanquan Yang, Chaoyang Zhu, Ziqing Lin, Baiji Hu, Jice Wang, Hongyu Sun, Fannv He, Anmin Fu, Yuqing Zhang
2025Revisiting the Byzantine Resilience of Federated Reinforcement Learning: A Distillation Perspective.
Wenzheng Jiang, Ji Wang, Zhengyi Zhong, Jiangzhou Liao, Xiaomin Zhu, Flint Xiaofeng Fan
2025Robust Multi-Scale Gradient Estimation for Query-Efficient Black-box Adversarial Attack.
Guorong Wang, Jinchuan Tang, Zehua Ding, Youliang Tian
2025Robust Recovery Method Against Malicious Face Swapping in Online Social Networks.
Huaquan Yang, Shan Bian, Gongwei Weng
2025Robustness Assessment and Enhancement of Text Watermarking for Google's SynthID.
Xia Han, Qi Li, Jianbing Ni, Mohammad Zulkernine
2025RuDyna: Towards A Dynamic Analysis Framework for Rust.
Shanlin Deng, Baojian Hua
2025Rusty: Effectively Detecting Multilingual Rust Memory Bugs with Interprocedural Static Analysis.
Mingliang Liu, Baojian Hua
2025SATA: A Distributed Stealthy and Persistent Backdoor Attack via Trigger Association in Federated Learning.
Xin Ai, Yang Cao
2025SCodeGen: A Real-Time Trustworthy Constrained Decoding Framework for Secure Code Generation with LLMs.
Muzi Qu, Jie Liu, Liangyi Kang, Shuyi Ling, Shuai Wang, Dan Ye, Tao Huang
2025SEMA: A Structural Entropy Guided Multimodal Framework for Adversarial Face Attacks.
Ruixin Song, Youliang Tian, Mengqian Li, Ze Yang
2025SERA: Semantic Entity Recognition and Alignment for Threat Intelligence Representation.
Xinyu Liu, Tianbo Wang, Chunhe Xia, Yingming Zeng, Ruidong Wang
2025SPFuzz: Program-State-Aware Fuzzing for Mail Protocols.
Hangzhou Fei, Xiaobing Xiong, Hui Shu
2025SPPF: A Speech-Semantic and Privacy-Preserving Framework with Prompt-Tuning Large Language Models.
Ben Niu, Tiantian Kong, Yuqiao Hou, Bohao Li, Guoli Zhao
2025SSRCorr: A Self-Supervised Robust Flow Representation Learning Framework for Flow Correlation Attacks on Tor.
Chen Chen, Mengyan Liu, Zhong Guan, Yaochen Ren, Yanbo Wu, Yangyang Guan, Zhen Li, Gaopeng Gou, Junzheng Shi
2025STAR-Shield: Self-Tuning Adaptive Rules for Web Application Firewall-as-a-Service via Multiple Large Language Models.
Letian Sha, Lei Xue, Nan Yi, Fu Xiao
2025SafeMLLM: Extending Safety Alignment from Single-Modal LLMs to Multimodal LLMs.
Di Jiang, Xiaojie Zhu, Chi Chen
2025Safety-Aware DRL Training Based on Reachability Analysis.
Yixuan Yang, Min Zhang
2025Scalable Distance-aware Fuzzy Private Set Intersection.
Zhenyu Xiong, Kai Chen, Xingwei Ren, Yongqiang Li, Mingsheng Wang
2025Scalable Private k-Nearest Neighbors Search Based on Secret Sharing.
Peizhao Zhou, Lihai Nie, Zheli Liu
2025SecuRecNet-IoT: Adaptive Secure Reconfiguration and Session-Aware Communication in IoT Edge Networks.
Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Bashair Alrashed, Ibrahim Haddadi
2025Secure Communication Protocols and Video Streaming Demonstrations in Open RAN through DTLS and LKH.
Sudarson Karmaker, Haitham S. Cruickshank, Mohammad Shojafar
2025Secure Computation Scheme for the Intersection Area of Polygons Resistant to Malicious Participants.
Xin Liu, Anyang Qi, Lanying Liang, Dan Luo, Yuchen Zhang, Wei Ye, Baohua Zhang, Yu Gu, Gang Xu, Xiubo Chen
2025Secure Non-Interactive Authentication in Satellite Networks Using Time Lock Encryption.
Xinhong Hei, Xi Zuo, Yichuan Wang, Mengjie Tian, Yanhua Feng
2025Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks.
Jialiang Dong, Zihan Ni, Nan Sun, Sanjay K. Jha, Yiwei Zhang, Elisa Bertino, Surya Nepal, Siqi Ma
2025Security Risks of Transpiling C Programs to Rust.
Si Wu, Huyao Yang, Baojian Hua
2025Security of LLM Agents: A Case Study Approach.
Casey Fan, Diyana Tial, Vladislav Dubrovenski, Mengtao Zhang, Yugyung Lee, Dianxiang Xu
2025Semantic-Graph-Indistinguishability: A Novel Approach to Location Privacy Protection Under Road Networks.
Sai Wang, Huijuan Lian, Lei Shi, Gaolei Li, Yan Cao
2025SemiFlow: Website Fingerprinting Using Semi-Supervised Learning.
Shanpeng Lv, Ying Yang, Yuling Huang
2025SoK: Credential-Based Trust Management in Decentralized Ledger Systems.
Yanna Jiang, Haiyu Deng, Qin Wang, Guangsheng Yu, Xu Wang, Yilin Sai, Shiping Chen, Wei Ni, Ren Ping Liu
2025Solving Small LWE Instances with the Dropping Meet-in-the-Middle Algorithm.
Xiaofei Tong, Jingguo Bi, Shuwen Luo, Licheng Wang, Lixiang Li, Lin Wang
2025Splicing Strategy based Chunk Level Deduplication Scheme for Cloud Storage.
Xin Tang, Haixin Chen, Siyu He, Yamin Yang, Luchao Jin
2025SwCC: A Swapped-Contrastive Clustering Learning for Few-shot Website Fingerprinting Attacks.
Jing Bai, Gaopeng Gou, Zheyuan Gu, Wenqi Dong, Gang Xiong, Zhen Li, Zhenzhen Li, Qingya Yang
2025T2F2L: Towards Trustworthy Fairness in Federated Learning Through A Verifiable Approach.
Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
2025TAR - PCH: Traceable and Revocable Blockchain Rewriting via Partial Policy-Hiding Chameleon Hashing under Cloud Assistance.
Lifeng Guo, Jingjing Xie, Runtao Zhang, Wei-Chuen Yau
2025TCP-Awareness Augmented Robust TLS Traffic Classification: A Hybrid Deep Learning Approach.
Yewa Li, Yitan Huang, Bo Jiang, Zhigang Lu, Zelin Cui
2025TF-Detector: Anomaly Detection in Industrial Control System through Process-Aware Time-Frequency Domain Analysis.
Shuyuan Chang, Qixiao Lin, Jian Mao, Mengshuo Yuan, Yan Huo
2025TGF-JA4: LLM-Aware Multi-Feature Temporal Graph For Malware Detection Under Concept Drift.
Xinyan Chen, Yu Wang, Peishuai Sun, He Wang, Yuqing Zhang
2025TLSA: Transfer Learning Enhanced Link Stealing Attacks on Graph Neural Networks.
Zhenkun Jin, Jiaqi Ma, Yuanyuan He, Wei Xiang, Qiankun Zhang, Tao Zhang
2025TSDAs: Enhanced Statistics-Based Query Recovery in Dynamic Searchable Symmetric Encryption via Probabilistic Modeling.
Yikang Fan, Xiaojie Zhu, Chi Chen, Yong Li
2025Targeted and Transferable Adversarial Attacks on Large Vision-Language Models via Two-Stage Region-Specific Perturbations.
Zhuoran Wang, Jiawei Zhao, Liang Zhang, Zheng Wang, Yining Hu
2025TeGCN:Temporal Evolution-Aware Trust Evaluation for Dynamic Social Networks.
Chunhui Liu, Geming Xia, Chaodong Yu, Yuze Zhang, Jiawen Wu, Hongwei Huang
2025The Sound of Reduction: Minimal Inputs, Maximal Coverage.
Iaroslav Gridin, Antonis Michalas, Alejandro Cabrera Aldaya
2025Theoretical Min-Entropy Bounds for Physical-Layer Key Generation over Weibull Fading Channels.
Dongchi Han, Yuan Ma, Xianhui Lu
2025Toward Robust Encrypted Traffic Detection via Graph Contrastive Learning.
Jiahao Huang, Mohan Li, Yanbin Sun, Yu Jiang
2025Towards Automated and Robust Forensic Event Reconstruction.
Lukas Schmidt, Sebastian Schinzel
2025Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data.
Zuan Wang, Juntao Lu, Jiazhuang Wu, Youliang Tian, Wei Song, Qiuxian Li, Duo Zhang
2025Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE.
Michael Eckel, Janik Gorbracht, Georgios Gkoktsis, Tobias Kaupat
2025Towards System-of-Systems Bill of Material Solution for Vulnerability Operational Impact Analysis.
Lucas Tesson, Jamal El Hachem, Patrice Guillou, Jérémy Buisson
2025Towards a Deep Understanding and Practical Guideline on the SameSite Policy.
Shuang Wu, Ying Yu, Yan Liu, Xiangyu Gao, Zhe Qu
2025Toxic Ink on Immutable Paper: Content Moderation for Ethereum Input Data Messages (IDMs).
Xihan Xiong, Zhipeng Wang, Qin Wang, William Knottenbelt
2025Traceable and Revocable Key-Policy Attribute-Based Encryption scheme from Lattices.
Yanqi Ma, Yuan Liu, Yongbin Zhou, Yiwen Gao
2025Transfer Learning based Fingerprint Database Reconstruction Scheme in Indoor Location Scenarios.
Qian Miao, Hui Zhang, Weixin Wang, Yuanji Shi, Lihua Yang
2025TrapLLM: An LLM-powered Interactive Log-based Honeypot for Real-world Network Attacks.
Yunjun Ma, Gangyan Zeng, Peng Zhang, Yuchen Huang, Fuyuan Zhang, Ran Lin, Huan Qian
2025TriDNet: 3D Reconstruction and Generalized Feature Disentanglement for Deepfake Detection.
Yaqi Liu, Hanhan Wang, Weichen Zhu, Kunbai Zhang, Chao Xia
2025Trust-Aware Rapid Emergency Service Recovery for Low-Altitude Intelligent Networking via Transformer-Enhanced Reinforcement Learning.
Lixin Zhang, Peng Yu, Chaochao Li, Can Tan, Xu Chen, Dingshi Liao
2025Trust-Aware V2V Charging Coordination via Hierarchical Decision under Mode Uncertainty.
Shuohan Liu, Wei Zhang, Yue Cao, Qiang Ni, Lu Zhang, Xinyu Li
2025TrustIoT: Building Trust in Human-Thing Interactions for Healthcare Systems Using Machine Learning.
Abir Al-Ansari, Kristiaan D'Août, Valerio Selis
2025TrustMFA: A Privacy-Preserving Multi-Factor Authentication Scheme with Anonymous Credential.
Wenjun Zhu, Jianan Hong, Shiyao Wang, Kunling Li, Kun He
2025TrustMonitor: A Secured Container Framework via Virtualization and Pointer Authentication for Cross-Domain Data Sharing.
Xin Wang, Yulun Song, Fan Zhang, Feng Qi, Yunlong Xie, Lin Sun
2025TrustSciAgent: Towards Rigorous and Trustworthy Agents for Scientific Research.
Yang Li, Meng Wang, Mengting Zhang, Zhixiong Zhang, Guangyin Zhang, Hanyu Li
2025Trusted Online Key Management Center Architecture and Implementation Method for Train Control Systems.
Weihong Ma, Xinxin Li, Xiaoya Hu, Shaohu Li, Qian Wang, Fangyu Li
2025TwinGuard: A Proactive RL-Driven Defence Framework for Digital Twin-Enabled O-RAN Security.
Neha Gupta, Liam O'Driscoll, Taneya Sharma, Mohammad Shojafar, Chuan Heng Foh, Ioana Boureanu, Helen Treharne, Sotiris Moschoyiannis
2025Two-Tier Batch Data Integrity Verification with Identity-Based Signatures and Privacy Preservation in Cloud-Edge-End Architecture.
Xiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Xiaolin Chang
2025UAV Assisted Multi-Attack Detection Method for Vehicular Ad Hoc Networks.
Junhui Zhang, Na Fan, Liping Ye, Jianghui Hu, Yexiong Shang, Yu Shi
2025UC Secure Privacy-Preserving and Auditable Transaction System for Permissioned Blockchains
Su Hang, Zhaozhong Guo, Maozhi Xu
2025Ultra-Reliable Routing Strategy for Large-Scale Optical Free-Space Low Earth Orbit Satellite Networks.
Haowen Wu, Wei Ren, Yong Wang, Yan Zhang
2025User Demands Based Multi-Agent Reinforcement Learning Satellite Handover Strategy.
Qiyun Yu, Yanrong Lu, Weiwei Jiang
2025VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching.
Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu
2025VLAH: A Lightweight and Verifiable Framework for Approximate Nearest Neighbor Search in High-Dimensional Space.
Yiping Teng, Yuyao Tang, Gang Wang, Shiqing Wang, Changze Li, Liang Zhao
2025VMPL-KMI: Protecting Kernel Module Integrity within Confidential VMs.
Benshan Mei, Wenhao Wang, Dongdai Lin
2025Validation of a Governance Framework Supporting Security Controls across Emerging Systems.
Maysa Sinan, Mojtaba Shahin, Iqbal Gondal
2025VarAgent: LLM-Enhanced Variable Name Recovery in Binaries via Reinforcement Learning and Semantic Fusion.
Yuyao Huang, Hui Shu, Fei Kang, Cong Li
2025Verifiable Outsourced CP-ABE with Authority Audit for Public Computing Devices.
Dan Gao, Huanhuan Xu
2025Verifiable and Robust Distributed Deep Learning based on Blockchain Infrastructure.
Mikolaj Pietrek, Lukasz Krzywiecki, Karol Niczyj, Witold Karas
2025WSDNet: A Dual-Branch Wavelet-Structured Network for Image Forgery Detection.
Xiao Ke, Song Yun
2025When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks.
Karla Schäfer, Leon Ludwig
2025Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results.
Michael Eckel, Georgios Gkoktsis, Markus Horn
2025You May Not Be Your Username: Cross-Market Vendor Alias Attribution with Automatic Multi-Signal Evaluation.
Wesley Kwan, Lynn Takahashi, Nathan Pham, Apurva Sista, Ericsson Santana Marin
2025Zephyr: Secure and Non-interactive Two-Party Inference for Transformers.
Wenchao Liu, Huiyu Xie, Tanping Zhou, Shuo Chen, Weidong Zhong, Xiaoyuan Yang
2025Zero Trust-Based Dynamic and Continuous Access Control for Mobile Devices.
Xiaoya Cao, Zhenya Chen, Ming Yang, Xin Wang, Xiaoming Wu
2025Zero-Knowledge Quantized Weighted Majority Algorithm.
Li Quan, Xikun Jiang, Boris Düdder
2025iSME: Image Steganography with MECS Based on GAN.
Yamin Li, Chen Zeng, Liu Duan, Xuansong Li, Can Li, Haofeng Ju