| 2025 | 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2025, Guiyang, China, November 14-17, 2025 |
| 2025 | 3D trajectory personalization privacy protection method based on multi-feature classification and spatio-temporal attention. Ding Mu, Mengyao Zhang, Zihan Wang, Yexiong Shang |
| 2025 | 5GC-PDA:A Novel Proactive Defense Architecture for Enhancing 5G Core Network Security. Xingxing Liao, Wei You, Jie Yang, Jian Tao, Runhan Feng, Xinsheng Ji |
| 2025 | A Blockchain-Based Spectrum Allocation Scheme Based on Beneficial Consensus Mechanism. Peiliang Zuo, Yuexiang Wang, Zhen Fang, Xuegang Wang |
| 2025 | A Blockchain-Enabled AIoT Framework for Secure Metaverse in Wireless Communication Networks. Danhuai Zhao, Chen Tian, Zhenyu Ju, Yi Rong, Xiaoming He, Wanting Yang |
| 2025 | A Class of Semi-Supervised Weighted Nonnegative Matrix Factorization for Community Detection. Shibo Jin, Shiqi Liu, Lujuan Dang |
| 2025 | A Comprehensive Analysis of the AKMA+ Protocol. Yueming Li, Long Chen, Zhenfeng Zhang |
| 2025 | A Cross-Layer Attribution Method Based on Cyber-Physical Coupling Under Load Redistribution Attack. Zhenya Chen, Rongbin Yao, Chensheng Liu, Ming Yang, Xiaoming Wu, Wenting Wang |
| 2025 | A Dual-Stage Anomaly Detection Framework for Stealthy Attacks in 5G Core Networks. Xin Feng, Cong Li, Weizhi Meng, Zilong Wang, Xinsheng Ji |
| 2025 | A Dynamic Low-cost 3D Indoor Localization Algorithm Based on Error Optimal Estimation. Qianqian Zhu, Hui Zhang, Yuewei Zhang, Yuanji Shi, Shuyi Wang |
| 2025 | A Heterogeneous GNN Based Trust Evaluation Method for Remote Desktop Access. Haishuo Zhang, Huiran Yang, Hongjia Li, Yan Zhang, Peng Chen, Weiping Wang, Ding Tang |
| 2025 | A High-Quality Data-Driven Incentive Mechanism for Multi-Platform Mobile Crowdsensing. Minghe Zhang, Xuanyu Wang, Lihong Chen, Gang Liu |
| 2025 | A New End-to-End Encrypted Image Retrieval Scheme in Cloud Environment. Yanfeng Chen, Jing Liang, Hongliang He, Peiya Li |
| 2025 | A New Key Expansion Scheme for SM4 based on Sponge Construction. Xin Yu, Juan Xu, Xiaoxiao Zhang, Jian Lei |
| 2025 | A Privacy-Preserving Aggregation Scheme Based on Dual-Masking and Threshold Signature in Computing Power Network. Xiaodong Yang, Junru He, Na Wang, Duojia Wang, Yuanxin Zhang, Yatong Zhong |
| 2025 | A Privacy-Preserving and Highly Fault-Tolerant Cross-Chain Atomic Swap Scheme. Wenjun Zhu, Jianan Hong, Yingjie Xue, Jiayue Zhou, Shiyao Wang |
| 2025 | A Privilege Creep-Aware Role Mining Method for Enhanced Access Control Security. Vincent Bittard, Rim Ben Salem, Ahmed Bouzid, Sara Imene Boucetta, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2025 | A Real-Time Defense Framework Using PPPO in Deep Reinforcement Learning for CyberBattleSim. Yixuan Cao, Aniket Mahanti, Ranesh Naha |
| 2025 | A Region Dual-Factor Aware Federated Learning Framework for NWDAF in B5G/6G Core Network. Mingchuang Zhang, Hongbo Tang, Wei You, Xingxing Liao, Jie Yang, Hang Qiu |
| 2025 | A Robust Federated Learning Framework Integrating Principal Component Analysis and Dual Detection Mechanisms. Lina Ge, JianWei Zhai, Qinchun Su |
| 2025 | A Robust and Efficient Authentication Protocol for Intelligent Systems in Smart Healthcare IoMT. Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Junchao Ma, Zaid Alaa Hussien, Ali Hasan Ali, Husam A. Neamah, Ahmed Ali Ahmed |
| 2025 | A Semantic-Aware Network Intelligence Framework for Anomaly Detection using Large Language Models. Wei Li, Jianjun Li, Hui Shao, Junjie Li, Wei Zhang |
| 2025 | A Systematic Approach to Predict the Impact of Cybersecurity Vulnerabilities Using LLMs. Anders Mølmen Høst, Pierre Lison, Leon Moonen |
| 2025 | A Threshold Distributed Key Generation and Dynamic Key Management Scheme in Wireless Sensor Networks. Wenhui Kong, Pengfei Wen, Bo Li, Heng Gao, Runshan Hu, Ning Hu, Xingjun Wang |
| 2025 | A Transferable Adversarial Attack Framework for Object Detection via Spatial-Frequency Information Masking. Zhipeng Lyu, Xiumei Li, Junmei Sun |
| 2025 | A Trust-Based Data Quality Assessment Mechanism in Crowdsensing Services. Hai Liu, Yadong Peng |
| 2025 | A Trustworthy and Efficient Inference Scheduling Scheme for Edge MoEs Using DRL. Jinyang Zhang, Shengli Pan, Shanwu Chen, Anandarup Roy, Peng Li |
| 2025 | A Watermarking Framework for Secure Distribution of Meteorological Images. Yue Wu, Fenghua Li, Feng Lu, Zifu Li, Yixuan Zhang, Yanru He |
| 2025 | A Zero-Trust Empowered Continuous Authentication System for Drivers: Integrating Federated Learning with Conditional Transformer GAN. Lina Ge, Zhipeng Cao, Ming Jiang, Liang Zhao |
| 2025 | A secure and provable deletion method over outsourced data for fog-based smart grid. Changsong Yang, Yueling Liu, Yong Ding, Hai Liang, Shuo Wang |
| 2025 | AMD: Adaptive Adversarial Training Method Based on Mahalanobis Distance. Aoqi Ruan, Hui Xia, Rui Zhang, Xiaoxue Song, Zhengheng Li, Mengyuan Song |
| 2025 | APER: An Efficient and Privacy-Preserving Scheme for E-Health Recommendations. Jing Wang, Wenhao Yuan, Xianjun Deng, Qiankun Zhang, Jing Fan, Xue Yuan |
| 2025 | APT-GCM: Advanced Persistent Threats Detection via Graph Contrastive Masked Representation Learning. Mengkun Zhao, Jing Liu, Wenqiang Hao, Xiaobing Pei |
| 2025 | Accelerating Privacy-Preserving Federated Learning in Large-Scale LEO Satellite Systems. Binquan Guo, Junteng Cao, Marie Siew, Bin Bin Chen, Tony Q. S. Quek, Zhu Han |
| 2025 | Active-Trust Based Security Service Orchestration Framework for 6G Enabled Massive IoT. Mingfeng Huang, Ronghui Cao, Xiaoyong Tang, Tan Deng |
| 2025 | Adaptive Cooperative Spectrum Sharing in HSTNs with Hardware Impairments and Realistic Fading for Enhanced Reliability. Areeb Saldin, Ammar Hawbani, Yunchong Guan, Yunhe Sun, Saeed Hamood Alsamhi, Liang Zhao |
| 2025 | Adaptive Multi-Feature Hierarchical Framework for Generative Model Attribution. Ruoying Wang, Linghui Li, Xiaotian Si, Kaiguo Yuan, Zhaoyu Wang |
| 2025 | Adaptive Neuron Honeypot: Trapping Malicious Backdoors in Federated Learning. Xingyu Lu, Yang Cao |
| 2025 | Adaptive Temperature-Enhanced Hypergraph Contrastive Learning with Reliable Data Sampling Augmentation. Junzheng Li, Hongtao Yu, Ruiyang Huang, Suchang Yang |
| 2025 | AdaptiveWatermark: Dynamic Watermarking for Large Language Models with Agent. Qingze Peng, Daifeng Li |
| 2025 | Adversarial Example Based Fingerprint Embedding for Robust Copyright Protection in Split Learning. Zhangting Lin, Mingfu Xue, Wenmao Liu, Liquan Chen |
| 2025 | AlignAD-VAE: A Variational Autoencoder with MMD-Based Dataset Alignment for Network Anomaly Detection. Samed Saka, Valerio Selis, Alan Marshall |
| 2025 | An Adaptive Fast Recovery Scheme Based on Checkpoints: Analysis and Application in Asymmetric Multiprocessor Systems. Jingjing Hu, Yu Li, Yuanhang Sun, Chidan Zhu, Qinrang Liu, Jiangxing Wu |
| 2025 | An Autoencoder-Based Black-Box Adversarial False Data Injection Attack Against Smart Grid. Juntao Zhang, Chensheng Liu, Xin Wang, Ming Yang, Xiaoming Wu |
| 2025 | An Efficient FHE-based Ciphertext Matrix Multiplication Algorithm. Yihan Wang, Xiangjun Xue, Jingyong Liang, Donghai Guan, Çetin Kaya Koç |
| 2025 | An Efficient Feature Extraction Model Based on Asymmetric Deep Convolutional Autoencoder for Abnormal Traffic Detection. Guofeng Zhang, Yang Zhang, Bingbing Wang |
| 2025 | An Evolutionary Algorithm with Advanced Initial Solutions for Association Rules Hiding. Jiaran Qiu, Peng Cheng, Jun Zhou |
| 2025 | An Improved Vector Commitment Construction with Applications to Signatures. Yalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen, Sumanta Sarkar, Christopher J. P. Newton, Carsten Maple, Ugur-Ilker Atmaca |
| 2025 | Antenna Selection and Artificial Noise-based Security Transmission for Large-Scale MIMO Systems. Shiguo Wang, Jie Ma |
| 2025 | Artificial Noise-Based Countermeasure Against Full-Duplex (FD) Active Eavesdropping. Shiguo Wang, Yun Zhao |
| 2025 | Assessing the Effectiveness of Singling-Out Attacks on Synthetic Data: Is the Current GDPR Guidance Adequate? Fatima Jahan Sarmin, Atiquer Rahman Sarkar, Noman Mohammed |
| 2025 | Assessing the Impact of Post-Quantum Digital Signature Algorithms on Blockchains. Alison Gonçalves Schemitt, Henrique Fan da Silva, Roben Castagna Lunardi, Diego Kreutz, Rodrigo Brandão Mansilha, Avelino Francisco Zorzo |
| 2025 | Asteroid X: A Decentralized Finance Platform for Mining Sectors. Ben Chen, Xingyu Yang, Hui Cui, Joseph K. Liu |
| 2025 | Attention-Inverse Perturbation: A Novel Adversarial Attack Strategy by Targeting Non-Attentive Regions. Ming Zhang, Zhendong Wu, Hu Li, Jin Li, Ling Pang, Cheng Qian |
| 2025 | Attribute-Based Conditional PRE: A Novel Construction from LWE for Cloud Data-Sharing. Lisha Yao, Jian Weng, Pengfei Wu, Guofeng Tang, Haiyang Xue, Guomin Yang, Robert H. Deng |
| 2025 | AuthVR: Securing Authentication Against Shoulder Surfing and Keystroke Inference Attacks using Virtual Reality. Md Yeasin Ali, Touhid Islam Udoy, Md. Ishmam Tasin, Masum Alam Nahid, Fairuz Rahaman Chowdhury, Farida Chowdhury, Md Sadek Ferdous |
| 2025 | AutoPentestAL: An automated penetration testing framework with active learning capabilities. Xianyi Fu, Bin Liu, Cheng Zhu, Dianqiu Ma |
| 2025 | AutoPentester: An LLM Agent-based Framework for Automated Pentesting. Yasod Ginige, Akila Niroshan, Sajal Jain, Suranga Seneviratne |
| 2025 | Automated Attack Graph Construction for Cross-host Threat Detection Using Cyber Threat Intelligence. Chen Ling, Yifei Li, Ziqing Feng, Bin Liu, QiuYun Wang, Liling Xin, Zhengwei Jiang, Huamin Feng |
| 2025 | BDT-RVOC: Block Data Truncation for Verifiable and Private Multi-Cloud Computation. Ze Yang, Youliang Tian, Ruixin Song, Kun Niu, Mengqian Li, Jinbo Xiong |
| 2025 | Backdoor-Free Node Injection Attacks Against Graph Neural Networks. Jiasheng Qiu, Lieqing Lin, Qi Zhong, Zhenyu Liang |
| 2025 | Bad-PoseDiff: Pose-Guided Backdoor Triggering in Diffusion Models. Jiahao Chen, Yu Pan, Lin Wang, Yi Du |
| 2025 | BayesFuzz: Bayesian-Based Greybox Fuzzing for Stateful Protocols. Jianwen Xiang, Junwei Jiang, Songsong Liao, Xueming Zhang, Rui Hao |
| 2025 | Beyond Algorithmic Proofs: Towards Implementation-Level Provable Security. Jiahui Shang, Luning Zhang, Zhongxiang Zheng |
| 2025 | Beyond Likes: Unraveling the Veil of Personal Data Exposure in Mobile Application GUIs. Jice Wang, Fannv He, Yue Fang, Yuqing Zhang |
| 2025 | Bias as an Exploit: A Scalable Red-Team Campaign to Uncover Gender-Based Vulnerabilities in Foundational Models. Kun Jia, Jiyun Chen, Haizhen Gao, Yuxin Zhang, Qiushi Dong, Daixi Zhang, Huimei Chen, Jiayin Qi |
| 2025 | BinFuse: Binary Code Similarity Detection via Lightweight Fused Semantic Embedding. Shengjia Chang, Baojiang Cui, Shaocong Feng |
| 2025 | Bits for Privacy: Evaluating Post-Training Quantization via Membership Inference. Chenxiang Zhang, Tongxi Qu, Zhong Li, Tian Zhang, Jun Pang, Sjouke Mauw |
| 2025 | Blind Points Between ASR and Intent Inferring: Vulnerability Discovering via Fuzzing in-Vehicle Voice Assistance. Peilin Luo, Wei Teng, Jiachun Li, Yan Meng, Haojin Zhu |
| 2025 | Blind Video Watermarking Resisting Camcorder Recording Based on Spatio-temporal Synchronization. Ming Liu, Yifeng Shu, Lansheng Han, Xianjun Gu |
| 2025 | Blockchain-Enabled Privacy-Preserving Medical Data Sharing with Verifiable Insurance Evaluation. Junhan Li, Xiubo Chen, Gang Xu |
| 2025 | Blockchain-Enhanced Random Access in Untrusted Wireless Networks: An Evolutionary Game Analysis. Xinjian Li, Chang Wang, Yuwei Le, Yutong Wu, Hongwang Zhu, Jiaheng Wang, Jianjun Zhang |
| 2025 | Blockchain-Verified Attribute-Based Keyword Search with User-Generated Keys in Multi-owner Setting for IoT. Zongmin Wang, Qiang Wang, Fucai Zhou, Bao Li, Jian Xu, Haoyan Huang |
| 2025 | BreachHydra: Measuring the Resilience of an Underground Data Breach Forum. Marius Brockhoff, Lukas Schmidt, Fabian Ising, Sebastian Schinzel |
| 2025 | Broken Chains: An Empirical Analysis of DNS Resolution in IPv6-only Environments. Lei Zhao, Yujia Zhu, Baiyang Li, Yong Sun, Yuedong Zhang, Qingyun Liu |
| 2025 | Buffer is All You Need: Defending Federated Learning against Backdoor Attacks under Non-iids via Buffering. Xingyu Lyu, Ning Wang, Yang Xiao, Shixiong Li, Tao Li, Danjue Chen, Yimin Chen |
| 2025 | Building Provably Secure Pseudo-Strong PUFs via Weak PUFs and Pseudorandom Functions for Cryptographic Protocols. Chenghao Chen, Xiaolin Zhang, Kailun Qin, Tengfei Wang, Yipeng Shi, Tianyi Huang, Chi Zhang, Dawu Gu |
| 2025 | CAHS-Attack: CLIP-Aware Heuristic Search Attack Method for Stable Diffusion. Shuhan Xia, Jing Dai, Hui Ouyang, Yadong Shang, Dongxiao Zhao, Peipei Li |
| 2025 | CEE-MLIA: A Multi-Level Imbalance-Aware Framework for Contract Element Extraction. Bingcheng Liu, Xiao Qian, Xiuxuan Shen |
| 2025 | CLEK-HP: A certificate-less efficient key agreement scheme based on hybrid PUF in VANETs. Junfeng Tian, Tingting Jin, Ni Rui |
| 2025 | CTIGEN: Generating Cyber Threat Intelligence Oriented Summaries Through Summarization Fine-Tuning with Domain-specific NER. Xuhao Wan, Xiang Lin, Jianhua Li |
| 2025 | CVshield: Interpretable Black-Box Adversarial Defense for LLMs via CoT Guided Semantic Verification. Wenjing Hu, Weiwei Qi, Yanlu Li, Xinzhe Huang |
| 2025 | Can We Distinguish? A Deep Learning Approach to AI-Generated Content Detection. Yikai Liang, Mengqing Liu |
| 2025 | Capodoglio: Tackling Multi-Armed Bandit Jamming Attacks. Shuo Wang, Alessandro Brighente, Valeria Loscrì, Junqing Zhang, Mauro Conti |
| 2025 | CatPoison: Category-Oriented Knowledge Poisoning Attacks in Retrieval-Augmented Generation Systems. Haitao Mei, Zhangzhuo Du, Chao Cai, Chi Cheng, Jian Chen |
| 2025 | Chaos of Functionalities: Understanding Security Risks in Heterogeneity of IoT Matter Controllers. Yiwei Fang, Haoqiang Wang, Ze Jin, Qixu Liu |
| 2025 | Clean Label Backdoor Attack Based on Feature Distance Guided Sample Selection and Noise Optimization. Lixia Xie, Pengcheng Kang, Hongyu Yang, Juncheng Hu |
| 2025 | Clue Discovery based on Multi-modal Entity Alignment enhanced by Image Generation and Structure Embedding. Chunqing Yu, Chengxiang Tan, Zhishuo Zhang, Jiacheng Xu, Jianpeng Hu, Xiangyun Kong |
| 2025 | CoDA: Cross-Domain Few-Shot Website Fingerprinting via Contrastive Prototype Alignment. Yongxin Li, Yuwei Xu, Xinhe Fan, Yujie Hou, Yali Yuan, Qiao Xiang, Guang Cheng |
| 2025 | Combining Evolutionary Learning and Window Method for Finding Short Addition Chains for Large Integers. Xiaopeng Zhao, Zhusen Liu, Jiawei Qian |
| 2025 | Compacting Side-Channel Measurements With Peak-Anchor-Based Alignment. Yuling Luo, Minjiao Pei, Shunsheng Zhang, Xue Ouyang, Qiang Fu, Sheng Qin, Junxiu Liu |
| 2025 | Comparative Analysis of Cross-Border Data Flow Policies: EU, US, and China. Zhoujie Rong, Jingfeng Rong, Yuqing Zhang |
| 2025 | Comparing Reconstruction Attacks on Pretrained Versus Full Fine-tuned Large Language Model Embeddings on Homo Sapiens Splice Sites Genomic Data. Reem Al-Saidi, Erman Ayday, Ziad Kobti |
| 2025 | ComplexMM: Efficient and Generic Homomorphic Matrix Multiplication via Complexification and BSGS Alignment. Yucen Liao, Junping Wan, Jingjing Fan, Zoe L. Jiang |
| 2025 | ConCloneDep: A Confidence-Aware Clone-Based Dependency Identification Approach in C/C++ Open-Source Components. Jianxing He, Xi Chen, Shan Yao, Xiaoyan Liang, Ruizhong Du |
| 2025 | Contrasting Crypto and Exfiltration Ransomware with Shamir's Secret Sharing Data Flooding. Daniele D'Ugo, Saverio Giallorenzo, Simone Melloni |
| 2025 | Controller Makes Pentesting Better: An Improved Multi-Agent Automated Penetration Testing Framework. Xiaoyu Geng, Ning An, Boyuan Xu, Xiaobo Yang, Bo Jiang, Baoxu Liu, Junrong Liu |
| 2025 | Cross-Modal Collaborative Recovery: Breaking Multimodal Unlearnable Examples Protection. Ruijia Li, Zijiao Zhang, Ximin Huang, Hongwei Hu, Xining Gao |
| 2025 | CrossMiner: Smart Contract Vulnerability Detection in Interactive Scenarios. Xiangfu Liu, Teng Huang, Caiyan Tan, Jiahui Huang, Qiong Wang, Yan Pang |
| 2025 | CyberNER: A Harmonized STIX Corpus for Cybersecurity Named Entity Recognition. Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Oussama Azrara, Jaafar Chbili |
| 2025 | CyberSOIE-LLM: Cybersecurity Semi-Open Information Extraction with Large Language Models. Xinzheng Liu, Zhaoyun Ding |
| 2025 | D Hongliang Yin, Hongjiao Li |
| 2025 | DAPUR: A Decentralized Anonymous Payment Under Regulation from Bitcoin. Yu Zhang |
| 2025 | DCARL: Decoupled-Curriculum for Adversarial Robustness Learning under Long-Tailed Distributions. Mingyang Chen, Linghui Li, Zhaoyu Wang, Kaiguo Yuan, Bingyu Li |
| 2025 | DCIAD:Dual CNN with Informer for Time-Series Anomaly Detection. Xiang Zhong, Yong Wang, Lin Zhou |
| 2025 | DFAFuzz: Fuzzing for Embedded JavaScript Virtual Machines with Type-Directed DFA. Haiwei Lai, Baojian Hua |
| 2025 | DPDA: Decentralized Identity-Based Privacy-Preserving Data Aggregation for AIoT. Can Zhang |
| 2025 | DTAHF-Net: Domain-Trust Alignment and Hierarchical Fusion for Multimodal Fake News Detection. Lexin Feng, Jiayin Wei, Youjun Lu, Fujian Feng |
| 2025 | Data Driven Based Attention Mechanism for Optimal Anomaly Detection in Complex Multivariate Time Series Data. Shubha Dhali, Kuntal Ghosh, Siddhartha Prakash Duttagupta |
| 2025 | DataLineage RCA: Root Cause Diagnosis for Data Lineage Issues Using Large Language Model-Based Agents. Xin Yi, Shangru Zhao, Yuqing Zhang |
| 2025 | DeFiAD: A Unified Method for Early-Stage Domain Abuse Detection Through Automated Deep Feature Interaction. Zhaojun Dai, Xiaodong Lee, Yufan Fu, Botao Peng |
| 2025 | Decentralizing Photo Forensics for Public and Verifiable Trust. Mauro Clavijo-Herrera, Rolando Trujillo-Rasua, Carles Angles-Tafalla |
| 2025 | Deep Learning Assisted Reverse Engineering: Recognizing Encryption Loops in Ransomware. Nanqing Luo, Haizhou Wang, Zhilong Wang, Lan Zhang, Ping Chen, Peng Liu |
| 2025 | DeepLancet: Effectively Detecting Deep Learning Library Bugs via LLM-assisted Testcase Generation. Zihao Luo, Baojian Hua |
| 2025 | Defending Federated Learning against Backdoor Attacks by Inspecting Sparsity-Guided Out-of-Distribution Model Behavior. Songgao Tu |
| 2025 | DerandomPre: An LLM-based Stability Enhancement Method for Network Protocol Fuzzing. Yifan Zhang, Kailong Zhu, Qian Chen, Zixiong Li, Yuliang Lu, Yingchun Chen |
| 2025 | Detecting Content Rating Violations in Android Applications: A Vision-Language Approach. Dishanika Denipitiyage, Bhanuka Silva, Suranga Seneviratne, Aruna Seneviratne, Sanjay Chawla |
| 2025 | Detecting Multi-Turn Jailbreak Attacks in Large Language Models via Linear Probes. Jorge Marina-Metola, José María de Fuentes, Lorena González-Manzano, Luis Ibañez-Lissen |
| 2025 | Detection and Mitigation of Unknown Threats in IPv6 Networks via Layered Data Adaptation. Youjun Huang, Xiang Li, Jia Zhang, Haixin Duan |
| 2025 | Diffusion-Driven Video Steganography: A Three-Stage Framework for Robust and High-Capacity Data Concealment. Yuning Zhou, Min Wu, Hongxiang Ji, Ziwei Wang |
| 2025 | Disguised Attack in the Metaverse: A New Threat to Avatar-Based Identity Security. Chen Zhang, Zhenyong Zhang, Cong Wang, Ruilong Deng |
| 2025 | Diverse Fault Attacks on Dilithium and Variant Implementation: Skipping, Aborting and Zeroing. Hao Yuan, Yuejun Liu, Jingdian Ming, Yongbin Zhou |
| 2025 | DoNotSurf - Low-Latency DNS IP Tunneling. Alexandru Kiraly, Darius Bufnea |
| 2025 | Dual Gradient Evaluation-Based Defense Method Against Poisoning Attacks in Federated Learning. Zhuangzhuang Zhang, Xinhai Yan, Libing Wu, Bingyi Liu, Enshu Wang, Jianping Wang |
| 2025 | Dynamic Hybrid Backdoor Attack: Saliency-Guided Composite Triggers for Image Classification. Yuanhao Shen, Ying Wang, Yiran Liu, Zili Yao, Xue-song Qiu, Shaoyong Guo |
| 2025 | EFSM-Based Modeling of Siemens S7comm for Adaptive Cyber Deception in ICS Honeypots. Saurabh Chamotra, Ferdous Ahmed Barbhuiya |
| 2025 | ET-FS: Functional Specialization Method for Multi-Task Learning in Encrypted Traffic Classification. Xinzhu Feng, Gaopeng Gou, Chang Liu, Zheyuan Gu, Wenqi Dong, Famei He, Xuren Wang |
| 2025 | ETCFF: An Encrypted Traffic Classification Method Based on Fusion Features. Zhipeng Fu, Fanping Zeng |
| 2025 | Early Classification and Improved Performance: A Multi-Model Serial Encrypted Traffic Classification Framework. Jinhui Li, Guang Cheng, Zihan Chen |
| 2025 | EdgeTrace: A Context-Aware Anomalous Edge Detection Framework for APT Traceback. Nianqi Yang, Zhijian Zhao, Bing Chen |
| 2025 | Efficient Auditing and Querying in Verifiable Redactable Blockchain: A Lightweight VDS Protocol with Integrity Verification. Xiaoxu Zhang, Zhipeng Cai, Keyan Chen, Guanxiong Ha, Chunfu Jia |
| 2025 | Efficient Zero-Knowledge Proofs for Typical Non-Linear Functions in Machine Learning. Shengqi Jin, Weihan Li, Zongyang Zhang |
| 2025 | Efficient and Dynamic Multi-Source Data Analytics over Encrypted Cloud Data with Bitmap-Based Indexing. Yuyang Wang, Wei Song, Ruisi Song, Yuan Shen, Xiaohui Wang |
| 2025 | Efficient and Privacy-Preserving (α, β)-Core Community Search over Encrypted Bipartite Graphs. Xiaoxian Liu, Chen Chen, Xueqiao Liu, Xiaoyang Wang |
| 2025 | Efficient and Secure Spatial Keyword Similarity Query with User Preference. Shen Du, Xinrui Ge, Chengliang Tian |
| 2025 | End-to-End Security Policy Automation with Multi-LLM Agents in Cloud-Native Systems. Xuefei Chen, Yuqi Zhang, Haohao Liu, Xiaotong Wang, Chen Li, Bibo Tu |
| 2025 | Engine-Agnostic Evaluation of Container Isolation Characteristics. Felix Wruck, Maximilian Peisl, Michael Weiß |
| 2025 | Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting. Dilli Prasad Sharma, Liang Xue, Xiaowei Sun, Xiaodong Lin, Pulei Xiong |
| 2025 | Enhancing Data Security in RISC-V Embedded Systems: A Lightweight Architecture. Dunkai Mao, Lifeng Xi, Fujia Zhang |
| 2025 | Enhancing Federated Learning under Partial Participation via Proportional Variance Reduction. Xiang Wang, Lei Tian, Chen Yang, Feilong Lin, Minglu Li |
| 2025 | Enhancing Physical Security in Smart Environments with Ambient Intelligence. Ashish Nanda, Robin Doss, Folmer Heikamp, Abhi Kumar, Haftu Reda, Adnan Anwar, Zubair A. Baig, Praveen Gauravaram, Debi Prasad Pati, Salil S. Kanhere, Mohan Baruwal Chhetri |
| 2025 | Establishing Secure Intra-Solid Communication Networks via Acoustic Transceivers. Chaoyi Sun, Henglin Pu, Junyi Zhou, Chao Cai |
| 2025 | Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware Detection. Samy Bettaieb, Serena Lucca, Charles-Henry Bertrand Van Ouytsel, Etienne Rivière |
| 2025 | Evasion Attacks in Continual Learning. Niklas Bunzel, Aino Schwarte |
| 2025 | Exploring Subtle Manipulation Vulnerabilities in Federated Distillation. Peiyan Chen, Changsheng Wan, Hao Zou, Tian Wen, Zhiyuan Wu |
| 2025 | Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks. Gerrit Klause, Niklas Bunzel |
| 2025 | FABA: Breaking Defenses in Production-Grade Federated Learning for Mobile Malware Detection Services. Xingyu Lu, Yang Cao |
| 2025 | FBFISADetector: A Method based on Filter Mechanism to detect the Instruction Set Architecture of Monolithic Firmware. Qing Yang, Shangru Zhao, Yuqing Zhang |
| 2025 | FDLLM: A Dedicated Detector for Black-Box LLMs Fingerprinting. Zhiyuan Fu, Junfan Chen, Lan Zhang, Ting Yang, Jun Niu, Hongyu Sun, Ruidong Li, Peng Liu, Jice Wang, Fannv He, Yuqing Zhang |
| 2025 | FST-AD: Anomaly Detection for Cyber-Physical Systems via Frequency-Spatio-Temporal GNNs. Zhenya Chen, Xueying Bian, Ming Yang, Chensheng Liu, Xiaoming Wu, Sihan Lu |
| 2025 | FTE: Filter-Based Trust Evaluation for the Internet of Vehicles. Hai Lin, Xingchen Zhu, Zhihong Chen, Yue Cao |
| 2025 | Fair Data Exchange Scheme with Cryptographic Commitment and Smart Contract for Data Trading. Xiaomei Yan, Yong Li, Yan Zhu |
| 2025 | Fairness-Constrained Optimization Attack in Federated Learning. Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy |
| 2025 | FakeZero: Real-Time, Privacy-Preserving Misinformation Detection for Facebook and X. Soufiane Essahli, Oussama Sarsar, Imane Fouad, Ahmed Bentajer, Anas Motii |
| 2025 | FaultSpy: On the Insecurity of SPDM Protocols under Fault Injection. Peiyao Sun, Qifan Wang, David F. Oswald, Mark Dermot Ryan, Vladimiro Sassone, Ahmad Atamli |
| 2025 | Fed-CMA: Federated Clustering and Matched Averaging for Personalized Intra-Vehicular Network Intrusion Detection. Louis Agnese, Xiaojie Lin, Guangsheng Yu, Xu Wang |
| 2025 | FedDHKD: A Lightweight Federated Learning Framework Based on Dynamic Hierarchical Knowledge Distillation for 5G IoT. Junxuan Lv, Qiwei Zhao, Hongbo Tang, Hang Qiu, Wei You, Yu Zhao |
| 2025 | FedEdge: Federated Self-Supervised Graph Learning with Personalized Fine-Tuning for Node Classification. Zichao Deng, Han Yu |
| 2025 | FedPPA: Progressive Parameter Alignment for Personalized Federated Learning. Maulidi Adi Prasetia, Muhamad Risqi U. Saputra, Guntur Dharma Putra |
| 2025 | FedProbe: Attacking Federated Model Ownership Verification via Fine-Grained Watermark Detection and Erasure. Kunlong Jin, Youliang Tian, Lujia Shi |
| 2025 | FedRand: A Federated Random Forest Learning Technique for Anomaly Detection in IoT Networks. Omodolapo Babalola, José Cano, Somrudee Deepaisarn, Nguyen Truong |
| 2025 | Finder6: Efficient IPv6 Addresses Scanning Based on Hostname Correlation in IPv6-Only Network. Ce Sun, Liancheng Zhang, Ruijuan Wang, Yakai Fang, Hongtao Zhang, Haojie Zhu, Luyang Li |
| 2025 | Fine-Grained Revocable Lattice-Based ABE: Dual User and Attribute Revocation with Low Overhead for Cloud Environments. Yuliang Liu, Yuan Liu, Yiwen Gao, Yongbin Zhou, Licheng Wang, Peng Gao |
| 2025 | Flatness-Aware Attack: Enhancing Adversarial Transferability via Local Region Stability. Kejun Zhang, Yufan Yang, Jiahao Cheng, Meijiao Li |
| 2025 | FlexiGrain: A Flexible and Fine-Grained Privacy Control Framework for Dynamic Social Networks. Ben Niu, Fanyu Gan, Jinyu Peng, Qian Yang, Jin Cao |
| 2025 | Flow-Based Screen-Shooting Robust Watermarking with Invertible Noise Simulation Network. Pei Gan, Xuehu Yan, Hu Deng, Rongtao Liao, Feng Chen |
| 2025 | ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models. Siyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu |
| 2025 | From Electronic Contracts to Smart Legal Contracts: A Template-Based Approach. Haoxiang Chen, Ning Zhang, Jiayue Liu |
| 2025 | From Sample Generation to Efficacy Transfer: Optimization of Privacy-Preserving LLMs for Content Moderation. Mingyong Yin, Tong Liu, Hejun Wang, Yulong Wang, Run Yang |
| 2025 | From Survey to Application Vision: LLM Watermarking Techniques and Prospects in Scientific Scenarios. Chen Yucheng, Li Yang, Li Qiao, Yajiao Wang, Wang Meng, Hanyu Li |
| 2025 | From Text to STIX: Reducing Hallucinations through Fine-Tuned LLMs. Ruoyao Xiao, Yu Luo, Weifeng Xu, Dianxiang Xu |
| 2025 | From static to dynamic risk indicators in predicting and detecting insider attacks. N'Famoussa Kounon Nanamou, Rim Ben Salem, Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2025 | GAPPO: Graph-Attention Enhanced Reinforcement Learning for Efficient Attack Path Planning. Xiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Junchao Fan, Xiaolin Chang |
| 2025 | GMFuzz: Integrating Hierarchical Mutation and Fidelity Constraints for Coverage-Guided DNN Security Testing. Yue Cui, Guangshun Li, Kexin Yang, Junhua Wu |
| 2025 | GPEA: Grad-CAM-Guided Perceptibility-Reduced Ensemble Attack in Object Detection. Zhengheng Li, Hui Xia, Rui Zhang, Mengyuan Song, Aoqi Ruan, Shaoqiang Wang |
| 2025 | GTCN-G: A Residual Graph-Temporal Fusion Network for Imbalanced Intrusion Detection. Tianxiang Xu, Zhichao Wen, Xinyu Zhao, Qi Hu, Yan Li, Chang Liu |
| 2025 | GVTMC: A Novel Cryptocurrency Mining Traffic Classification Method. Yujie Lai, Huiyong Liu, Wei Zhang |
| 2025 | Generating Structured BPMN Models from Smart Contracts Using LLMs. Linlin Chen |
| 2025 | Ghost Vehicle: A Game-Theoretical Attack Strategy Targeting CAV Platoons. Lanai Huang, Winston Ellis, Sana Belguith |
| 2025 | Goal Hijacking Attack on Large Language Models via Pseudo-Conversation Injection. Zheng Chen, Buhui Yao |
| 2025 | Granular Ball and Curriculum Learning-Based Fuzzy Support Vector Machine. Zhenlei Wu, Xiaoqin Pan, Lei Zhou |
| 2025 | GraphAss: Multi-dimensional dependency semantics graph-based Automobile software vulnerability detection method. Qingwen Han, Shiyu Sun, Jianmei Lei, Lingqiu Zeng, Yang Liu, Lei Ye, Kaiwei Fan |
| 2025 | HARS:A Dynamic Scheduling Algorithm for Redundant Executors Based on Weighted Hypergraph Heterogeneity. Yifan Wang, Xinjian Zhao, Zesheng Xi, June Li, Xu Zhong, Yu Li |
| 2025 | HOT-SPT: Hierarchical Optimal Transport for Robust and Fair Cross-Domain Video Expression Recognition. Qianli Zhao, Zhen Wang, Linlin Zong, Chao Jin, Xiaohuan Li |
| 2025 | Hamster: Private Transformer Inference via Fully Homomorphic Encryption. Huizhuo Wang, Zhiyong Zhang, Lei Ju |
| 2025 | Hardware-Aware Neural Architecture Search for Real-Time Automotive Intrusion Detection. Xuke Yan, Linxi Zhang |
| 2025 | HiFi-XAI: A Fidelity-Aware, LLM-Powered Framework for Trustworthy Intrusion Detection. Avinash Awasthi, Pritam Vediya, Hemant Miranka, Ramesh Babu Battula, Priyadarsi Nanda |
| 2025 | Hierarchical Ring Signatures with Hidden Signature Functionality over Blockchain Infrastructure. Lukasz Krzywiecki, Witold Karas, Adam Niezgoda, Karol Niczyj |
| 2025 | High-fidelity Dual-layer Backdoor Watermarking Scheme based on Private Model Embedding. Lingyun Xiang, Fangbo Luo, Xiangli Jin |
| 2025 | Hotness Strategy based Secure Cross-user Deduplication for Cloud Storage. Liangyu Zhang, Junyu Cheng, Xin Tang, Jiaxin Li |
| 2025 | Human-Machine Collaborative Cognition for Intelligent Operation of Cascade Filtration Systems: A Dynamic Decision Framework Based on Fuzzy Inference and Uncertainty Analysis. Zhengqin Zhu, Junjie Song, Peiyan Pan, Yixiong Feng, Zhifeng Zhang |
| 2025 | HyBiGraph: Toward Multi-Order Malicious Encrypted Traffic Classification via Hyper-Bipartite Graph Fusion. Yibin Zhou, Yunxiao Shi, Xiao Yang, Da Xiao, Gaolei Li, Jianhua Li |
| 2025 | Hybrid Fault Attack on Grain-128AEAD: Signature or Machine Learning Localization with Bandit-Guided Recovery. Ya Lin, Iftekhar Salam |
| 2025 | Hybrid Multi-granularity Reconstruction and Contrastive Learning for Graph Anomaly Detection. Mingjie Yu, Jiong Yu |
| 2025 | Hyperchaos and HVS-Adaptive Video Watermarking Embedding. Kesong Wu, Maowei Li, Peng Yang, Wanting Yang, Jiangtian Nie, Xianbin Cao |
| 2025 | IAGNN: Mitigating Quantity and Topological Imbalance for Fair Graph Learning. Yangqi Liu, Xuemin Wang, Liang Chang, Heng Yang |
| 2025 | IEPIS: An Intelligent Endpoint Protection and Insight System. Rahul K. Patel, Puya Pakshad, Sumeet Batra, Shubhayan Das, Alapan Ghosh |
| 2025 | Identification of Generative Forged Western Blot Images. Yunqiao Zhang, Shunquan Tan, Jiwu Huang |
| 2025 | Identity-Based Asymmetric Group Message Franking. Hang Liu, Yang Ming, Aotian Cai, Chenhao Wang, Yi Zhao |
| 2025 | Improved Differential-Linear Distinguishes on the ChaCha256 Stream Cipher. Honglei Wang, Lin Ding, Zhengting Li, Xinhai Wang |
| 2025 | Improved Rsqrt for Faster Secure Neural Networks Inference. Jiafu Liu, YeDong, Yuqi Zhou, Jun Huang |
| 2025 | Improving Reliability of Electric-Vehicle Charging Service: A Scalable Modeling Approach. Xiuping Li, Yong Li, Yangbai Zhang, Xiaowei Li, Xiaolin Chang |
| 2025 | Improving the SEU Reliability of TMR Designs Implemented on SRAM-Based FPGAs with Redundant Module Restructuring. Chidan Zhu, Jingjing Hu, Yuanhang Sun, Yu Li |
| 2025 | Incentive-Compatible Pricing for Truthful Data Sharing. Mingjian Tang, Weiqi Wang, Shui Yu |
| 2025 | Incorporating Statistic and Semantic Dependencies for Enhancing the Robustness of Android Malware Detection. Lingyu Qiu, Zhen Liu, Bitao Peng, Ruoyu Wang, Changji Wang, Qingqing Gan |
| 2025 | Interprocedural Call Graph Embedding with GAT for Memory safety Vulnerability Detection. Rong Ren, Jingyi Wu, Hongbo Jin, QingYu Song, Bing Zhang, Qian Wang |
| 2025 | Intrusion Detection via Federated Learning: Tackling Non-IID Data and Poisoning Attacks. Quan Li, Yuhong Li |
| 2025 | Jailbreaking Multimodal Large Language Models via Consistent Cross-Modal Backgrounds. Meng Yang, Peirou Liang, Zhiqian Wu, Yong Liao |
| 2025 | KHAD: K-Hop and Activation-aware Defense against Bit-Flip Attacks in Deep Neural Networks. Jiajun Guo, Hao Ying, Zhezhao Yang, Xinyue Yu, Tianqi Shi, Jie Xiao |
| 2025 | KSFed: A Defense against Poisoning Attacks in Federated Learning using Statistical Analysis. Jiaxuan Zhao, Qi Feng, Qin Liu, Min Luo, Wei Zhao, Debiao He |
| 2025 | L2M-AID: Autonomous Cyber-Physical Defense by Fusing Semantic Reasoning of Large Language Models with Multi-Agent Reinforcement Learning. Tianxiang Xu, Zhichao Wen, Xinyu Zhao, Jun Wang, Yan Li, Chang Liu |
| 2025 | LASEFlow: A Label-Aware Security Enhancement Framework for Serverless Workflows. Minghui Chen, Keming Wang, Chenlin Huang, Fengyuan Yu, Renyu Yang, Hua Cheng, Mantun Chen |
| 2025 | LDFS: LLMs with Dynamic Few-Shot for Offensive Language Detection. Yimin Wang, Qian Huang, Kaizhi Wu, Kai Guo |
| 2025 | LDInfer: Landmarks Inference-Based for Facial Forgery Detection of Different Quality. Jiaxin Jiang, Zhiwen Chen, Hui Zhou, Wenjun Yan, Tianshuo Jiao, Bohan Tan, Zhuo Zhang, Hao Chen, Zheng Qin |
| 2025 | LDP: Latent Diffusion-based Adversarial Purification towards Transformer-based Visual Encoders. Mengfan Li, Xinxin Fan, Quanliang Jing, Shaoye Luo, Yunfeng Lu, Jingping Bi |
| 2025 | LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices. Michael Eckel |
| 2025 | LLM-Assisted IDOR Detection in Hospital Mini-Programs: Risks to PII and PHI. Jiawen Sun, Rui Tian, Shangru Zhao, Xiangming Zhou, He Wang, Yuqing Zhang |
| 2025 | LLM-Driven APT Analysis and Detection Based on Provenance Graph by Threat Pattern. Yibin Fu, Zhaoyun Ding, Sheng Zhang, Deqi Cao, Yi Wang |
| 2025 | LLM-Guided Mutation Location Selection for Vulnerability-Aware JavaScript Engine Fuzzing. Jizhe Li, Yongjun Wang, Haoran Xu, Lin Peng, Muxin Xu, Tian Xia |
| 2025 | Lattice-based Dynamic Privacy-preserving Cross-chain Payment Scheme. Bing Zhang, Guijuan Wang, Zhongyuan Yu, Anming Dong, Hongliang Zhang |
| 2025 | Layered Website Fingerprinting Defense Against Adversarial Training. Yong Zeng, Jiaze Li, Hao Liu, Zhihong Liu, Jianfeng Ma |
| 2025 | Leader-Follower Federated Learning Framework: Heterogeneous Federated Learning based on Asymmetric Distillation. Lina Ge, Haisong Zhu, Ming Jiang, Zhe Wang |
| 2025 | Learning to Co-Design Routing and Processing in Computing Power Networks. Ye Qin, Kexian Liu, Jianli Liu, Xiaolong Hu, Zejun Lan, Jianfeng Guan |
| 2025 | Leveraging Cross-Layer Network Probing to Detect Stealth Services. Jiangyi Yin, Chenxu Wang, Zhao Li, Zhuojun Jiang, Jiangchao Chen, Dongfang Hao, Qingyun Liu |
| 2025 | Leveraging large language models for SQL behavior-based database intrusion detection. Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li |
| 2025 | Local Midpoint Guided Topology Control Method for Elimination of Vulnerable Node in UAV Ad-Hoc Networks. Peng Zhang, Peng Yi, Tong Duan, Zhen Zhang, Jiaxin Li, Junfei Li, Jing Yu |
| 2025 | Location Privacy Protection for Network-RTK VRS Positioning Users via Mobile Networks. Ruoting Xiong, Yi Ren, Xin Shi, Wei Ren, Gerard Parr |
| 2025 | Log Intelligent Knowledge Base Construction Method Based On Streaming Graph Fusion. Xinzhuo Xue, Shangru Zhao, Yuqing Zhang |
| 2025 | Log2Sig: Frequency-Aware Insider Threat Detection via Multivariate Behavioral Signal Decomposition. Kaichuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng |
| 2025 | MAD-OOD: A Deep Learning Cluster-Driven Framework for an Out-of-Distribution Malware Detection and Classification. Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Asif Rahman, Olukunle Kolade, Sasidhar Kunapuli |
| 2025 | MBCGAN-SGFM: Detecting Rare and Unknown Attacks via Generative Augmentation and Semantic Memory. Yunhao Wang, Yong Wang, Lin Zhou |
| 2025 | MEB: A Backdoor Detection Framework for Pre-training Based Malicious Traffic Detection. Kai Wang, Jieying Zhou, Libo Yang, Weixun Li, Ziguang Jie, Zheyu Jiang, Zhiliang Wang |
| 2025 | MIMO Channel Modeling Based on Physics-Constrained Generative Neural Networks. Hanxiao Li, Hongmei Wang, Shuo Liu, Weilong Zhang |
| 2025 | MLSBOX: Automated Sandbox for Fine-Grained Isolation of Multiple Third-Party Libraries Yuqi Qiu, Juan Wang, Chenjun Ma, Yunfeng Kang, Jie Wang |
| 2025 | MR-Patch: A Retrieval-Augmented Generation Approach for Patch Presence Test. Zirui Jiang, Yisen Wang, Xingyu Bai, Jiajun Du, Tianchan Yang, Bing Zhu |
| 2025 | MSG-ImDiffusion: Multi-Scale Spatio-Temporal Diffusion Modeling for Anomaly Detection in Microservice Systems. Ruoyao Zhang, Yuchun Guo, Yishuai Chen, Zhong Cao |
| 2025 | MVL-AD:A Multi-View Learning Framework for Class-Incremental Unknown Attack Detection. XuKui Li, Guang Cheng, Wei Chen, Zhen Zhang, Zechen Xu, Xing Qiu |
| 2025 | Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling. Karla Schäfer, Martin Steinebach |
| 2025 | MalShield: Enhancing Android Malware Detection with Stateful Defense against Query Attacks. Hengyu Zhang, Guang Cheng, Yuyang Zhou, Zongyao Chen |
| 2025 | Mitigating Leakage Amplification in DP-Enhanced Encrypted Search Across Multiple Users. Yingying Qi, Jiabei Wang, Tiancheng Zhu, Yongbin Zhou |
| 2025 | Mixture of Experts Representation Learning Scheme for Multi-View Android Malware Detection. Jiaxiong Chen, Shuaishuai Tan, Jinchuan Liu, Zehua Zhang, Jianjun Zhou, Qiannan Lin, Haowen Tan |
| 2025 | Model Evaluation-Driven Aggregation: FedMEDA for Robust Non-IID Federated Learning. Bosong Zhang, Linna Zhang, Qian Sun, Hai Wang, Danyang Li |
| 2025 | Model Reduction of Colored Petri Nets Based on Unrelated Transitions. Zhen Gao, Tao Sun |
| 2025 | Multi-Channel Attacks on Dilithium: Bridging Power Gaps with EM-Guided Synthetic Traces. Qikang Fan, Jingdian Ming, Yiwen Gao, Yongbin Zhou |
| 2025 | Multi-Directional Dynamical Framework for Information Propagation Prediction. Yuhang Wang, Ziang Hu, Guang Wang, Yu Shang, Jizhong Han, Tao Guo |
| 2025 | Multi-Party Contract Signing Ensuring Trust in Complex Transactions. Catalin V. Bîrjoveanu, Mirela Bîrjoveanu |
| 2025 | Multi-keyword Searchable Encryption Scheme with Policy Hiding Support for User Revocation in Cloud Environment. Xuan Zhang, Suzhen Cao, Tianhao Zhang, Guorui Liu, Lei Han, Xiaodong Yang |
| 2025 | Multidimensional Dynamic Trust Evaluation towards Intelligent Transportation. Kaixuan Luo, Chuanxiang Ma |
| 2025 | NFD-TRG: Network Flow Detection via Traffic Relationship Graphs with Statistical Feature Embedding. Mingshu He, Xiaowei Zhao, Liu Yang |
| 2025 | NFDP: Enabling Noise-Adaptive and Fast-Converging Privacy Protection in Graph Neural Network Training. Hang Chen, Bo Yin, Binyao Xu |
| 2025 | No Touch, No Trace: A Paradigm for Remote Voltage Side-Channel Attacks on FPGA-Based Computing Platforms. Zhe Liu, Kun Zhou, Chengkai Chen, Jianfei Mao, Hongbing Cheng |
| 2025 | Non-Restrictive Hardware-Based Trust in Embedded High-Level Operating Systems. Simon Unger, Sven Gebauer, Stefan Katzenbeisser |
| 2025 | ORThrus: Detecting Deep Learning Compiler Bugs via Optimization Resistance Transformations. Tongwei Zhang, Baojian Hua |
| 2025 | OSSDetector: Towards a More Accurate Approach for C/C++ Third-Party Library Detection. Xiang Hai, Jia Zeng, Zhiyuan Fu, Siyu Chen, Yansong Shi, Hongyu Sun, Jice Wang, Fannv He, Yuqing Zhang |
| 2025 | OUF: Oblivious Universal Function with domain specific optimizations. Victor Delfour, Marc-Olivier Killijian |
| 2025 | OmniNova: A General Multimodal Multi-Agent Framework. Bingzhen Li, Zihan Wang, Pengfei Du, Yupeng Jiang |
| 2025 | On the Limitations of Fuzzy Hashing for Malware Similarity: An Analysis of Vulnerable Code Detection in Malware. Nathan Ross, Oluwafemi Olukoya, Jesús Martínez del Rincón |
| 2025 | On-Chain Risk Signals: Predicting Security Threats in DeFi Projects. Bahareh Parhizkari, Antonio Ken Iannillo, Ed Zulkoski, Christof Ferreira Torres, Radu State |
| 2025 | Online Reliability Assessment of Nuclear Power Components via Mechanistic and Data-Driven Modeling. Xiangyu Jiang, Yixiong Feng, Zhi-Wu Li, MengChu Zhou, Xuanyu Wu, Jianrong Tan |
| 2025 | Opening a Can of Worms: A Comprehensive View into the Android Debug Bridge Malware. Huancheng Hu, Christian Doerr |
| 2025 | OptiFLIDS: Optimized Federated Learning for Energy-Efficient Intrusion Detection in IoT. Saida Elouardi, Mohammed Jouhari, Anas Motii |
| 2025 | Optimization Design Method for Nets in Multi- Stage Filtration System of Nuclear Power Plant Using Cognitive Intelligence Techniques. Peiyan Pan, Zhifeng Zhang, Yixiong Feng, Zhengqin Zhu, Junjie Song, Jianrong Tan |
| 2025 | Optimizing FHE-Based Secure Matrix Computation for Untrusted Cloud Environments. Yuanyuan Xie, Ming Luo, Han Wang, Mingsheng Wang |
| 2025 | Optimizing Spectrum Sharing in Low-Altitude Intelligent Networks: A Model-Based Reinforcement Learning Approach. Tianle Li, Qingyu Liu, Peixi Peng |
| 2025 | Overcoming Data Mining in Blockchain-Based Covert Communication: Transaction Withdrawal and Multisig Embedding. Jialing He, Zhuo Chen, Yijing Lin, Jiacheng Wang, Liehuang Zhu, Zhu Han, Rahim Tafazolli, Tao Xiang |
| 2025 | P Wei Yu, Cheng Tan, Lvlin Ni, Chengyu Du, Cheng Liu, Qingbing Ji |
| 2025 | PACT: A Passive Accuracy-Based Trust Metric for Malicious Client Detection in Federated Learning. Sayedali Sheykholeslamzadeh, Dima Alhadidi |
| 2025 | PANDA-CDR: Perturbation-Aware and Neural Dual-Channel Alignment for Cross-Domain Recommendation. Ruohan Wang, Gaode Chen, Miaobo Hu, Ji Xiang, Ruixin Song, Cong Xue, Lei Wang, Haoyuan Teng |
| 2025 | PDD-FANs: Personalized Decentralized Federated Adversarial Networks with Defense Mechanism in Non-IID Setting. Xinguang Wang, Nguyen Linh Trung, Oliver Y. Chen, Jeroen Van Schependom, Stijn Denissen, Guy Nagels |
| 2025 | PIRL: A Robust and Privacy-Preserving Learning Method from an Information-Theoretic Perspective. Guangyuan Liu, Shigong Long |
| 2025 | PLAA: Packet-level Adversarial Attacks in Network Traffic Detection. Jinhao You, Zan Zhou, Shujie Yang, Yi Sun, Lei Zhang, Changqiao Xu |
| 2025 | POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization. Aiyao Zhang, Xiaodong Lee, Zhixian Zhuang, Jiuqi Wei, Yufan Fu, Botao Peng |
| 2025 | PPFDroid: An Android Malware Detection Method Based on Pre-Training and Prompt-Based Fine-Tuning. Xufeng Wang, Yuqi Ma, Hongxian Liu, Sanfeng Zhang |
| 2025 | PPIA-MTL: Efficient Property Proportion Inference Attacks on Tabular Generative Models via Multi-Task Learning. Ninghui Zhang, Chun Long, Jing Li, Fan Yang, Yuhao Fu, Wei Wan, Haojie Nie, Xingbo Pan |
| 2025 | PROV-LLM: Advanced Persistent Threat Detection Based on Process Behavior Subgraphs Using Large Language Models. Canhua Chen, Yang Song, Yunpeng Li, Yun Feng, Xiaoyu Wang, Yuling Liu, Qixu Liu |
| 2025 | PSI-TR-ABE: A Traceable and Policy-Hidden Attribute-Based Encryption Scheme for Medical Data Sharing. Ye Feng, Siqi Lu, Liujia Cai, Xingyun Hu, Xinxin Wang, Yongjuan Wang |
| 2025 | PUF-Enhanced Physical-Layer Key Generation for Secure Drone Communication with Untrusted Relays. Tao Chen, Dongming Li, Xianglin Fan, Yi Lou |
| 2025 | Passkeys in Practice: An Empirical Evaluation of FIDO2/WebAuthn Compliance and Interoperability. Ahmed Mahfouz, Rawad Abdulghafor, Alaa A. K. Ismaeel |
| 2025 | PathFed: Trustworthy and Efficient Federated Aggregation via Path Attention. Manzhou Li, Xinjin Ge, Yan Li, Yan Zhang |
| 2025 | PoDIBC: Prevention of DrDoS Attacks Using Identity -Based Cryptography in Software-Defined Networking Environment. Shain Saharan, Vishal Gupta |
| 2025 | Post-Quantum Anonymity of Key Encapsulation Mechanism and Its Applications in Password Authenticated Key Exchange Protocols. JiaYv An, Yankun Gao, Lei Han |
| 2025 | Post-Quantum Cryptography for Secure Authentication Key Distribution in QKD Networks. Filip Lauterbach, Lukas Kapicak, Sergej Jakovlev, Miralem Mehic, Stefan Rass, Miroslav Voznák |
| 2025 | PrivANN: Practical and Efficient Private Approximate Nearest Neighbor Search. Xuan Chen, Shujie Cui, Joseph K. Liu, Shifeng Sun, Shangqi Lai |
| 2025 | PrivFGL: Differentially Private Federated Graph Learning via Personalized Data Transformation. Songyan Zhang, Hanyu Lu, Hongfa Ding |
| 2025 | PrivRAG: A Privacy-Preserving Retrieval-Augmented Generation Protocol for LLM-Driven Voice Assistants. Yuan Chang, Siran Wang, Tom H. Luan, Yuntao Wang, Zhou Su |
| 2025 | Privacy Protection Method for 3D Trajectories Integrating Semantic Information. Mengyao Zhang, Ding Mu, Zihan Wang, Na Fan |
| 2025 | Privacy for AI Generated Images: Conditional Generative Adversarial Networks Trained Over Obfuscated Data. Krzysztof Talalaj, Lukasz Krzywiecki, Marcin Zawada |
| 2025 | Privacy-Assured Analytics on Decentralized Graphs:The Case of Graph Learning. Longji Li, Yifeng Zheng, Songlei Wang, Zhongyun Hua, Lei Xu, Yansong Gao |
| 2025 | Privacy-Preserving Average Consensus by One-Step Perturbation. Hanyu Zhao, Yinyan Zhang |
| 2025 | Privacy-Preserving Distributed Optimal Consensus of High-Order Nonlinear Multi-Agent Systems. Yuxuan Xiong, Yinyan Zhang |
| 2025 | Privacy-Preserving Facial Authentication with Hybrid Fuzzy Commitment and Cancelable Transformation. Weilai Guo, Shuaichao Song, Yeming Yang, Yuming Liao, Jiyuan Li, Songhui Guo |
| 2025 | Privacy-Preserving and Control-Compliant Authenticated Access for the AI-Enabled Industrial Internet of Things. Qing Fan, Yumeng Xie, Zhitao Guan, Yongshuang Wei, Yajie Wang, Chuan Zhang, Liehuang Zhu |
| 2025 | Privacy-preserving Location-Based Services with A New Private Information Retrieval Scheme. Xiaopang Wang, Lihui Wang, Limin Guo |
| 2025 | Proactive Federated Backdoor Unlearning via Two-Phase Optimization and State Replacement. Ze Chai, Yijing Lin, Zhipeng Gao, Zhiqiang Xie, Dusit Niyato |
| 2025 | Proactive Radio Frequency Fingerprinting-Based Authentication Leverage IQ Perturbation. Siqi Pei, Shiyue Huang, Hongbo Liu, Haitao Jia, Yanzhi Ren, Huan Dai, Jiadi Yu |
| 2025 | ProfilE: Self-Supervised Communication Relationship Profiling for Imbalanced Smart Grid Anomaly Detection. Haimiao Li, Changbo Tian, Runqing Zhang, Shiyi Yuan, Bo Sun |
| 2025 | Prototype-Integrated Representation Learning for Novelty Detection. Saranya Vijayakumar, Christos Faloutsos, Matt Fredrikson |
| 2025 | Provenance graph-based advanced persistent threats detection via self-supervised contrastive learning. XuTao Xiang, Yanqing Yang, Yurong Qian, Kai Zhao, Linlin Zhang |
| 2025 | Pruning for Security: Mitigating Stealthy Bit-Flip Attacks with Efficiency Gains. Hao Ying, Jiajun Guo, Xinyue Yu, Zhezhao Yang, Tianqi Shi, Jie Xiao |
| 2025 | Pure Object Detection for Text-CAPTCHAs - YOVO: A Lightweight Recognition Model and Annotation Framework Derived from YOLOv8n. Disen Tang |
| 2025 | QUICkly Running Out of Money: Evaluating QUIC Resilience to Traffic Inflating Attacks. Giovanni Menon, Enrico Bassetti, Mauro Conti |
| 2025 | RASKEE: A TEE-Assisted Secure Range Spatial Keyword Query in a Multi-user Setting. Zhen Lv, Yaorong Tan, Hongwei Huo, Yanguo Peng, Youliang Tian |
| 2025 | RESA: RLWE-Based Efficient Secure Aggregation For Federated Learning. Ziming Wang, Liang Zhang, Hang Zhou, Haibin Kan, Jiheng Zhang |
| 2025 | RL-Optimized Lightweight Obfuscation Against Binary Code Similarity Detection. Ran Wei, Hui Shu, Fei Kang |
| 2025 | RaceTEE: Enabling Interoperability of Confidential Smart Contracts. Keyu Zhang, Andrew Martin |
| 2025 | Range Dynamic Searchable Symmetric Encryption: Combating Volume Leakage and Enabling Non-interactive Deletion. Jinguo Li, Qiang Lv, Junqin Huang, Linghe Kong |
| 2025 | ReTainer: Reputation-Aware Containerized Service Deployment in Blockchain Networks. Xiaoxu Ren, Qixin Li, Haipeng Yao, Tianhao Ouyang, Ruichen Zhang |
| 2025 | Real-Time Forgery Detection via Dynamic Frequency-Domain Selection and Phoneme Alignment. Wenbin Li, Peng Yang, Xiaoyu Geng, Kesong Wu, Hongtao Yu |
| 2025 | RecZTA: A Reputation-Based Architecture with Dual-Layer PEPs for Zero Trust Access. Zhi Lin, Lin Yan, Zan Zhou, Yongfeng Yu, Penghui Xiao, Shujie Yang |
| 2025 | Recipient-Agnostic Hash Locks for Cross-Chain Auctions with Bitcoin Bidding. Fuyang Deng, Qianhong Wu, Bo Qin |
| 2025 | RegMix: Adversarial Mutual and Generalization Regularization for Enhancing DNN Robustness. Zhenyu Liu, Varun Ojha |
| 2025 | Reinforcement Learning Enhanced Temporal Generative Adversarial Networks for Blockchain Illicit Transaction Detection. Mengyuan Li, Jiewei Chen, Shao-Yong Guo, Xuesong Qiu, Feng Qi |
| 2025 | Reliable and Robust Watermarking for Data Flooding against Ransomware Random Techniques. Saverio Giallorenzo, Simone Melloni, Pietro Sami |
| 2025 | Resource Allocation and Optimization in Low-altitude D2D Communication Networks. Changyuan Ji, Zongyan Li, Chen Yang, Hao Wang |
| 2025 | Retrieval-Augmented Generation-Based Adaptive State Enhancement for Federated Split Learning. Boyang Dong, Xiukun Yan, Kai Zeng |
| 2025 | Review of Defect Detection Techniques for Power Information Systems. Xingwang Dou, Shanquan Yang, Chaoyang Zhu, Ziqing Lin, Baiji Hu, Jice Wang, Hongyu Sun, Fannv He, Anmin Fu, Yuqing Zhang |
| 2025 | Revisiting the Byzantine Resilience of Federated Reinforcement Learning: A Distillation Perspective. Wenzheng Jiang, Ji Wang, Zhengyi Zhong, Jiangzhou Liao, Xiaomin Zhu, Flint Xiaofeng Fan |
| 2025 | Robust Multi-Scale Gradient Estimation for Query-Efficient Black-box Adversarial Attack. Guorong Wang, Jinchuan Tang, Zehua Ding, Youliang Tian |
| 2025 | Robust Recovery Method Against Malicious Face Swapping in Online Social Networks. Huaquan Yang, Shan Bian, Gongwei Weng |
| 2025 | Robustness Assessment and Enhancement of Text Watermarking for Google's SynthID. Xia Han, Qi Li, Jianbing Ni, Mohammad Zulkernine |
| 2025 | RuDyna: Towards A Dynamic Analysis Framework for Rust. Shanlin Deng, Baojian Hua |
| 2025 | Rusty: Effectively Detecting Multilingual Rust Memory Bugs with Interprocedural Static Analysis. Mingliang Liu, Baojian Hua |
| 2025 | SATA: A Distributed Stealthy and Persistent Backdoor Attack via Trigger Association in Federated Learning. Xin Ai, Yang Cao |
| 2025 | SCodeGen: A Real-Time Trustworthy Constrained Decoding Framework for Secure Code Generation with LLMs. Muzi Qu, Jie Liu, Liangyi Kang, Shuyi Ling, Shuai Wang, Dan Ye, Tao Huang |
| 2025 | SEMA: A Structural Entropy Guided Multimodal Framework for Adversarial Face Attacks. Ruixin Song, Youliang Tian, Mengqian Li, Ze Yang |
| 2025 | SERA: Semantic Entity Recognition and Alignment for Threat Intelligence Representation. Xinyu Liu, Tianbo Wang, Chunhe Xia, Yingming Zeng, Ruidong Wang |
| 2025 | SPFuzz: Program-State-Aware Fuzzing for Mail Protocols. Hangzhou Fei, Xiaobing Xiong, Hui Shu |
| 2025 | SPPF: A Speech-Semantic and Privacy-Preserving Framework with Prompt-Tuning Large Language Models. Ben Niu, Tiantian Kong, Yuqiao Hou, Bohao Li, Guoli Zhao |
| 2025 | SSRCorr: A Self-Supervised Robust Flow Representation Learning Framework for Flow Correlation Attacks on Tor. Chen Chen, Mengyan Liu, Zhong Guan, Yaochen Ren, Yanbo Wu, Yangyang Guan, Zhen Li, Gaopeng Gou, Junzheng Shi |
| 2025 | STAR-Shield: Self-Tuning Adaptive Rules for Web Application Firewall-as-a-Service via Multiple Large Language Models. Letian Sha, Lei Xue, Nan Yi, Fu Xiao |
| 2025 | SafeMLLM: Extending Safety Alignment from Single-Modal LLMs to Multimodal LLMs. Di Jiang, Xiaojie Zhu, Chi Chen |
| 2025 | Safety-Aware DRL Training Based on Reachability Analysis. Yixuan Yang, Min Zhang |
| 2025 | Scalable Distance-aware Fuzzy Private Set Intersection. Zhenyu Xiong, Kai Chen, Xingwei Ren, Yongqiang Li, Mingsheng Wang |
| 2025 | Scalable Private k-Nearest Neighbors Search Based on Secret Sharing. Peizhao Zhou, Lihai Nie, Zheli Liu |
| 2025 | SecuRecNet-IoT: Adaptive Secure Reconfiguration and Session-Aware Communication in IoT Edge Networks. Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Bashair Alrashed, Ibrahim Haddadi |
| 2025 | Secure Communication Protocols and Video Streaming Demonstrations in Open RAN through DTLS and LKH. Sudarson Karmaker, Haitham S. Cruickshank, Mohammad Shojafar |
| 2025 | Secure Computation Scheme for the Intersection Area of Polygons Resistant to Malicious Participants. Xin Liu, Anyang Qi, Lanying Liang, Dan Luo, Yuchen Zhang, Wei Ye, Baohua Zhang, Yu Gu, Gang Xu, Xiubo Chen |
| 2025 | Secure Non-Interactive Authentication in Satellite Networks Using Time Lock Encryption. Xinhong Hei, Xi Zuo, Yichuan Wang, Mengjie Tian, Yanhua Feng |
| 2025 | Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks. Jialiang Dong, Zihan Ni, Nan Sun, Sanjay K. Jha, Yiwei Zhang, Elisa Bertino, Surya Nepal, Siqi Ma |
| 2025 | Security Risks of Transpiling C Programs to Rust. Si Wu, Huyao Yang, Baojian Hua |
| 2025 | Security of LLM Agents: A Case Study Approach. Casey Fan, Diyana Tial, Vladislav Dubrovenski, Mengtao Zhang, Yugyung Lee, Dianxiang Xu |
| 2025 | Semantic-Graph-Indistinguishability: A Novel Approach to Location Privacy Protection Under Road Networks. Sai Wang, Huijuan Lian, Lei Shi, Gaolei Li, Yan Cao |
| 2025 | SemiFlow: Website Fingerprinting Using Semi-Supervised Learning. Shanpeng Lv, Ying Yang, Yuling Huang |
| 2025 | SoK: Credential-Based Trust Management in Decentralized Ledger Systems. Yanna Jiang, Haiyu Deng, Qin Wang, Guangsheng Yu, Xu Wang, Yilin Sai, Shiping Chen, Wei Ni, Ren Ping Liu |
| 2025 | Solving Small LWE Instances with the Dropping Meet-in-the-Middle Algorithm. Xiaofei Tong, Jingguo Bi, Shuwen Luo, Licheng Wang, Lixiang Li, Lin Wang |
| 2025 | Splicing Strategy based Chunk Level Deduplication Scheme for Cloud Storage. Xin Tang, Haixin Chen, Siyu He, Yamin Yang, Luchao Jin |
| 2025 | SwCC: A Swapped-Contrastive Clustering Learning for Few-shot Website Fingerprinting Attacks. Jing Bai, Gaopeng Gou, Zheyuan Gu, Wenqi Dong, Gang Xiong, Zhen Li, Zhenzhen Li, Qingya Yang |
| 2025 | T2F2L: Towards Trustworthy Fairness in Federated Learning Through A Verifiable Approach. Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí |
| 2025 | TAR - PCH: Traceable and Revocable Blockchain Rewriting via Partial Policy-Hiding Chameleon Hashing under Cloud Assistance. Lifeng Guo, Jingjing Xie, Runtao Zhang, Wei-Chuen Yau |
| 2025 | TCP-Awareness Augmented Robust TLS Traffic Classification: A Hybrid Deep Learning Approach. Yewa Li, Yitan Huang, Bo Jiang, Zhigang Lu, Zelin Cui |
| 2025 | TF-Detector: Anomaly Detection in Industrial Control System through Process-Aware Time-Frequency Domain Analysis. Shuyuan Chang, Qixiao Lin, Jian Mao, Mengshuo Yuan, Yan Huo |
| 2025 | TGF-JA4: LLM-Aware Multi-Feature Temporal Graph For Malware Detection Under Concept Drift. Xinyan Chen, Yu Wang, Peishuai Sun, He Wang, Yuqing Zhang |
| 2025 | TLSA: Transfer Learning Enhanced Link Stealing Attacks on Graph Neural Networks. Zhenkun Jin, Jiaqi Ma, Yuanyuan He, Wei Xiang, Qiankun Zhang, Tao Zhang |
| 2025 | TSDAs: Enhanced Statistics-Based Query Recovery in Dynamic Searchable Symmetric Encryption via Probabilistic Modeling. Yikang Fan, Xiaojie Zhu, Chi Chen, Yong Li |
| 2025 | Targeted and Transferable Adversarial Attacks on Large Vision-Language Models via Two-Stage Region-Specific Perturbations. Zhuoran Wang, Jiawei Zhao, Liang Zhang, Zheng Wang, Yining Hu |
| 2025 | TeGCN:Temporal Evolution-Aware Trust Evaluation for Dynamic Social Networks. Chunhui Liu, Geming Xia, Chaodong Yu, Yuze Zhang, Jiawen Wu, Hongwei Huang |
| 2025 | The Sound of Reduction: Minimal Inputs, Maximal Coverage. Iaroslav Gridin, Antonis Michalas, Alejandro Cabrera Aldaya |
| 2025 | Theoretical Min-Entropy Bounds for Physical-Layer Key Generation over Weibull Fading Channels. Dongchi Han, Yuan Ma, Xianhui Lu |
| 2025 | Toward Robust Encrypted Traffic Detection via Graph Contrastive Learning. Jiahao Huang, Mohan Li, Yanbin Sun, Yu Jiang |
| 2025 | Towards Automated and Robust Forensic Event Reconstruction. Lukas Schmidt, Sebastian Schinzel |
| 2025 | Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data. Zuan Wang, Juntao Lu, Jiazhuang Wu, Youliang Tian, Wei Song, Qiuxian Li, Duo Zhang |
| 2025 | Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE. Michael Eckel, Janik Gorbracht, Georgios Gkoktsis, Tobias Kaupat |
| 2025 | Towards System-of-Systems Bill of Material Solution for Vulnerability Operational Impact Analysis. Lucas Tesson, Jamal El Hachem, Patrice Guillou, Jérémy Buisson |
| 2025 | Towards a Deep Understanding and Practical Guideline on the SameSite Policy. Shuang Wu, Ying Yu, Yan Liu, Xiangyu Gao, Zhe Qu |
| 2025 | Toxic Ink on Immutable Paper: Content Moderation for Ethereum Input Data Messages (IDMs). Xihan Xiong, Zhipeng Wang, Qin Wang, William Knottenbelt |
| 2025 | Traceable and Revocable Key-Policy Attribute-Based Encryption scheme from Lattices. Yanqi Ma, Yuan Liu, Yongbin Zhou, Yiwen Gao |
| 2025 | Transfer Learning based Fingerprint Database Reconstruction Scheme in Indoor Location Scenarios. Qian Miao, Hui Zhang, Weixin Wang, Yuanji Shi, Lihua Yang |
| 2025 | TrapLLM: An LLM-powered Interactive Log-based Honeypot for Real-world Network Attacks. Yunjun Ma, Gangyan Zeng, Peng Zhang, Yuchen Huang, Fuyuan Zhang, Ran Lin, Huan Qian |
| 2025 | TriDNet: 3D Reconstruction and Generalized Feature Disentanglement for Deepfake Detection. Yaqi Liu, Hanhan Wang, Weichen Zhu, Kunbai Zhang, Chao Xia |
| 2025 | Trust-Aware Rapid Emergency Service Recovery for Low-Altitude Intelligent Networking via Transformer-Enhanced Reinforcement Learning. Lixin Zhang, Peng Yu, Chaochao Li, Can Tan, Xu Chen, Dingshi Liao |
| 2025 | Trust-Aware V2V Charging Coordination via Hierarchical Decision under Mode Uncertainty. Shuohan Liu, Wei Zhang, Yue Cao, Qiang Ni, Lu Zhang, Xinyu Li |
| 2025 | TrustIoT: Building Trust in Human-Thing Interactions for Healthcare Systems Using Machine Learning. Abir Al-Ansari, Kristiaan D'Août, Valerio Selis |
| 2025 | TrustMFA: A Privacy-Preserving Multi-Factor Authentication Scheme with Anonymous Credential. Wenjun Zhu, Jianan Hong, Shiyao Wang, Kunling Li, Kun He |
| 2025 | TrustMonitor: A Secured Container Framework via Virtualization and Pointer Authentication for Cross-Domain Data Sharing. Xin Wang, Yulun Song, Fan Zhang, Feng Qi, Yunlong Xie, Lin Sun |
| 2025 | TrustSciAgent: Towards Rigorous and Trustworthy Agents for Scientific Research. Yang Li, Meng Wang, Mengting Zhang, Zhixiong Zhang, Guangyin Zhang, Hanyu Li |
| 2025 | Trusted Online Key Management Center Architecture and Implementation Method for Train Control Systems. Weihong Ma, Xinxin Li, Xiaoya Hu, Shaohu Li, Qian Wang, Fangyu Li |
| 2025 | TwinGuard: A Proactive RL-Driven Defence Framework for Digital Twin-Enabled O-RAN Security. Neha Gupta, Liam O'Driscoll, Taneya Sharma, Mohammad Shojafar, Chuan Heng Foh, Ioana Boureanu, Helen Treharne, Sotiris Moschoyiannis |
| 2025 | Two-Tier Batch Data Integrity Verification with Identity-Based Signatures and Privacy Preservation in Cloud-Edge-End Architecture. Xiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Xiaolin Chang |
| 2025 | UAV Assisted Multi-Attack Detection Method for Vehicular Ad Hoc Networks. Junhui Zhang, Na Fan, Liping Ye, Jianghui Hu, Yexiong Shang, Yu Shi |
| 2025 | UC Secure Privacy-Preserving and Auditable Transaction System for Permissioned Blockchains Su Hang, Zhaozhong Guo, Maozhi Xu |
| 2025 | Ultra-Reliable Routing Strategy for Large-Scale Optical Free-Space Low Earth Orbit Satellite Networks. Haowen Wu, Wei Ren, Yong Wang, Yan Zhang |
| 2025 | User Demands Based Multi-Agent Reinforcement Learning Satellite Handover Strategy. Qiyun Yu, Yanrong Lu, Weiwei Jiang |
| 2025 | VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching. Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu |
| 2025 | VLAH: A Lightweight and Verifiable Framework for Approximate Nearest Neighbor Search in High-Dimensional Space. Yiping Teng, Yuyao Tang, Gang Wang, Shiqing Wang, Changze Li, Liang Zhao |
| 2025 | VMPL-KMI: Protecting Kernel Module Integrity within Confidential VMs. Benshan Mei, Wenhao Wang, Dongdai Lin |
| 2025 | Validation of a Governance Framework Supporting Security Controls across Emerging Systems. Maysa Sinan, Mojtaba Shahin, Iqbal Gondal |
| 2025 | VarAgent: LLM-Enhanced Variable Name Recovery in Binaries via Reinforcement Learning and Semantic Fusion. Yuyao Huang, Hui Shu, Fei Kang, Cong Li |
| 2025 | Verifiable Outsourced CP-ABE with Authority Audit for Public Computing Devices. Dan Gao, Huanhuan Xu |
| 2025 | Verifiable and Robust Distributed Deep Learning based on Blockchain Infrastructure. Mikolaj Pietrek, Lukasz Krzywiecki, Karol Niczyj, Witold Karas |
| 2025 | WSDNet: A Dual-Branch Wavelet-Structured Network for Image Forgery Detection. Xiao Ke, Song Yun |
| 2025 | When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks. Karla Schäfer, Leon Ludwig |
| 2025 | Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results. Michael Eckel, Georgios Gkoktsis, Markus Horn |
| 2025 | You May Not Be Your Username: Cross-Market Vendor Alias Attribution with Automatic Multi-Signal Evaluation. Wesley Kwan, Lynn Takahashi, Nathan Pham, Apurva Sista, Ericsson Santana Marin |
| 2025 | Zephyr: Secure and Non-interactive Two-Party Inference for Transformers. Wenchao Liu, Huiyu Xie, Tanping Zhou, Shuo Chen, Weidong Zhong, Xiaoyuan Yang |
| 2025 | Zero Trust-Based Dynamic and Continuous Access Control for Mobile Devices. Xiaoya Cao, Zhenya Chen, Ming Yang, Xin Wang, Xiaoming Wu |
| 2025 | Zero-Knowledge Quantized Weighted Majority Algorithm. Li Quan, Xikun Jiang, Boris Düdder |
| 2025 | iSME: Image Steganography with MECS Based on GAN. Yamin Li, Chen Zeng, Liu Duan, Xuansong Li, Can Li, Haofeng Ju |