


default search action
24th TrustCom 2025: Guiyang, China
- 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2025, Guiyang, China, November 14-17, 2025. IEEE 2025, ISBN 979-8-3315-6532-9

- Mingfeng Huang, Ronghui Cao, Xiaoyong Tang, Tan Deng:

Active-Trust Based Security Service Orchestration Framework for 6G Enabled Massive IoT. 1-8 - Ruoyao Zhang, Yuchun Guo, Yishuai Chen, Zhong Cao:

MSG-ImDiffusion: Multi-Scale Spatio-Temporal Diffusion Modeling for Anomaly Detection in Microservice Systems. 9-16 - Junhui Zhang, Na Fan, Liping Ye, Jianghui Hu, Yexiong Shang, Yu Shi:

UAV Assisted Multi-Attack Detection Method for Vehicular Ad Hoc Networks. 17-24 - Hang Liu, Yang Ming, Aotian Cai, Chenhao Wang, Yi Zhao:

Identity-Based Asymmetric Group Message Franking. 25-32 - Wenzheng Jiang, Ji Wang, Zhengyi Zhong, Jiangzhou Liao, Xiaomin Zhu, Flint Xiaofeng Fan:

Revisiting the Byzantine Resilience of Federated Reinforcement Learning: A Distillation Perspective. 33-41 - Peng Zhang, Peng Yi, Tong Duan, Zhen Zhang, Jiaxin Li, Junfei Li, Jing Yu:

Local Midpoint Guided Topology Control Method for Elimination of Vulnerable Node in UAV Ad-Hoc Networks. 42-53 - Jiasheng Qiu, Lieqing Lin, Qi Zhong, Zhenyu Liang:

Backdoor-Free Node Injection Attacks Against Graph Neural Networks. 54-61 - Keyu Zhang, Andrew Martin:

RaceTEE: Enabling Interoperability of Confidential Smart Contracts. 62-73 - Zhen Lv, Yaorong Tan, Hongwei Huo, Yanguo Peng, Youliang Tian:

RASKEE: A TEE-Assisted Secure Range Spatial Keyword Query in a Multi-user Setting. 74-85 - Zhuangzhuang Zhang, Xinhai Yan, Libing Wu, Bingyi Liu, Enshu Wang, Jianping Wang:

Dual Gradient Evaluation-Based Defense Method Against Poisoning Attacks in Federated Learning. 86-94 - Yiwei Fang, Haoqiang Wang, Ze Jin, Qixu Liu:

Chaos of Functionalities: Understanding Security Risks in Heterogeneity of IoT Matter Controllers. 95-102 - Kejun Zhang, Yufan Yang, Jiahao Cheng, Meijiao Li:

Flatness-Aware Attack: Enhancing Adversarial Transferability via Local Region Stability. 103-110 - Shuyuan Chang, Qixiao Lin, Jian Mao, Mengshuo Yuan, Yan Huo:

TF-Detector: Anomaly Detection in Industrial Control System through Process-Aware Time-Frequency Domain Analysis. 111-118 - Youjun Huang, Xiang Li, Jia Zhang, Haixin Duan:

Detection and Mitigation of Unknown Threats in IPv6 Networks via Layered Data Adaptation. 119-130 - Huancheng Hu, Christian Doerr:

Opening a Can of Worms: A Comprehensive View into the Android Debug Bridge Malware. 131-142 - Li Quan, Xikun Jiang, Boris Düdder:

Zero-Knowledge Quantized Weighted Majority Algorithm. 143-151 - Yuyao Huang, Hui Shu, Fei Kang, Cong Li:

VarAgent: LLM-Enhanced Variable Name Recovery in Binaries via Reinforcement Learning and Semantic Fusion. 152-162 - Yasod Ginige, Akila Niroshan, Sajal Jain, Suranga Seneviratne:

AutoPentester: An LLM Agent-based Framework for Automated Pentesting. 163-174 - Xuefei Chen, Yuqi Zhang, Haohao Liu, Xiaotong Wang, Chen Li, Bibo Tu:

End-to-End Security Policy Automation with Multi-LLM Agents in Cloud-Native Systems. 175-183 - Huizhuo Wang, Zhiyong Zhang, Lei Ju:

Hamster: Private Transformer Inference via Fully Homomorphic Encryption. 184-191 - Karla Schäfer, Leon Ludwig:

When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks. 192-199 - Lukas Schmidt, Sebastian Schinzel:

Towards Automated and Robust Forensic Event Reconstruction. 200-210 - Tianxiang Xu, Zhichao Wen, Xinyu Zhao, Qi Hu, Yan Li, Chang Liu:

GTCN-G: A Residual Graph-Temporal Fusion Network for Imbalanced Intrusion Detection. 211-218 - Kun Jia, Jiyun Chen, Haizhen Gao, Yuxin Zhang, Qiushi Dong, Daixi Zhang, Huimei Chen, Jiayin Qi:

Bias as an Exploit: A Scalable Red-Team Campaign to Uncover Gender-Based Vulnerabilities in Foundational Models. 219-226 - Xuhao Wan, Xiang Lin, Jianhua Li:

CTIGEN: Generating Cyber Threat Intelligence Oriented Summaries Through Summarization Fine-Tuning with Domain-specific NER. 227-235 - Xingyu Lyu, Ning Wang, Yang Xiao, Shixiong Li, Tao Li, Danjue Chen, Yimin Chen:

Buffer is All You Need: Defending Federated Learning against Backdoor Attacks under Non-iids via Buffering. 236-243 - Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li:

Leveraging large language models for SQL behavior-based database intrusion detection. 244-254 - Ze Yang, Youliang Tian, Ruixin Song, Kun Niu, Mengqian Li, Jinbo Xiong:

BDT-RVOC: Block Data Truncation for Verifiable and Private Multi-Cloud Computation. 255-262 - Wenjun Zhu, Jianan Hong, Shiyao Wang, Kunling Li, Kun He:

TrustMFA: A Privacy-Preserving Multi-Factor Authentication Scheme with Anonymous Credential. 263-271 - Yifan Wang, Xinjian Zhao, Zesheng Xi, June Li, Xu Zhong, Yu Li:

HARS:A Dynamic Scheduling Algorithm for Redundant Executors Based on Weighted Hypergraph Heterogeneity. 272-281 - Zhuoran Wang, Jiawei Zhao, Liang Zhang, Zheng Wang, Yining Hu:

Targeted and Transferable Adversarial Attacks on Large Vision-Language Models via Two-Stage Region-Specific Perturbations. 282-289 - Peilin Luo, Wei Teng, Jiachun Li, Yan Meng, Haojin Zhu:

Blind Points Between ASR and Intent Inferring: Vulnerability Discovering via Fuzzing in-Vehicle Voice Assistance. 290-297 - Xianyi Fu, Bin Liu, Cheng Zhu, Dianqiu Ma:

AutoPentestAL: An automated penetration testing framework with active learning capabilities. 298-309 - Ming Liu, Yifeng Shu, Lansheng Han, Xianjun Gu:

Blind Video Watermarking Resisting Camcorder Recording Based on Spatio-temporal Synchronization. 310-320 - Kai Wang, Jieying Zhou, Libo Yang, Weixun Li, Ziguang Jie, Zheyu Jiang, Zhiliang Wang:

MEB: A Backdoor Detection Framework for Pre-training Based Malicious Traffic Detection. 321-331 - Nathan Ross, Oluwafemi Olukoya, Jesús Martínez del Rincón:

On the Limitations of Fuzzy Hashing for Malware Similarity: An Analysis of Vulnerable Code Detection in Malware. 332-343 - Xiang Wang, Lei Tian, Chen Yang, Feilong Lin, Minglu Li:

Enhancing Federated Learning under Partial Participation via Proportional Variance Reduction. 344-351 - XuTao Xiang, Yanqing Yang, Yurong Qian, Kai Zhao, Linlin Zhang:

Provenance graph-based advanced persistent threats detection via self-supervised contrastive learning. 352-359 - Nianqi Yang, Zhijian Zhao, Bing Chen:

EdgeTrace: A Context-Aware Anomalous Edge Detection Framework for APT Traceback. 360-368 - Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:

T2F2L: Towards Trustworthy Fairness in Federated Learning Through A Verifiable Approach. 369-376 - Zuan Wang, Juntao Lu, Jiazhuang Wu, Youliang Tian, Wei Song, Qiuxian Li, Duo Zhang:

Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data. 377-388 - Zhenyu Xiong, Kai Chen, Xingwei Ren, Yongqiang Li, Mingsheng Wang:

Scalable Distance-aware Fuzzy Private Set Intersection. 389-400 - Iaroslav Gridin, Antonis Michalas, Alejandro Cabrera Aldaya:

The Sound of Reduction: Minimal Inputs, Maximal Coverage. 401-409 - Ben Niu, Tiantian Kong, Yuqiao Hou, Bohao Li, Guoli Zhao:

SPPF: A Speech-Semantic and Privacy-Preserving Framework with Prompt-Tuning Large Language Models. 410-417 - Shiguo Wang, Jie Ma:

Antenna Selection and Artificial Noise-based Security Transmission for Large-Scale MIMO Systems. 418-424 - Ben Niu, Fanyu Gan, Jinyu Peng, Qian Yang, Jin Cao:

FlexiGrain: A Flexible and Fine-Grained Privacy Control Framework for Dynamic Social Networks. 425-432 - Yuhang Wang, Ziang Hu, Guang Wang, Yu Shang, Jizhong Han, Tao Guo:

Multi-Directional Dynamical Framework for Information Propagation Prediction. 433-440 - Jiahao Huang, Mohan Li, Yanbin Sun, Yu Jiang:

Toward Robust Encrypted Traffic Detection via Graph Contrastive Learning. 441-448 - Mengkun Zhao, Jing Liu, Wenqiang Hao, Xiaobing Pei:

APT-GCM: Advanced Persistent Threats Detection via Graph Contrastive Masked Representation Learning. 449-460 - Marius Brockhoff, Lukas Schmidt, Fabian Ising, Sebastian Schinzel:

BreachHydra: Measuring the Resilience of an Underground Data Breach Forum. 461-471 - Jiaxiong Chen, Shuaishuai Tan, Jinchuan Liu, Zehua Zhang, Jianjun Zhou, Qiannan Lin, Haowen Tan:

Mixture of Experts Representation Learning Scheme for Multi-View Android Malware Detection. 472-483 - Shuohan Liu, Wei Zhang, Yue Cao, Qiang Ni, Lu Zhang, Xinyu Li:

Trust-Aware V2V Charging Coordination via Hierarchical Decision under Mode Uncertainty. 484-491 - Muzi Qu, Jie Liu, Liangyi Kang, Shuyi Ling, Shuai Wang, Dan Ye, Tao Huang:

SCodeGen: A Real-Time Trustworthy Constrained Decoding Framework for Secure Code Generation with LLMs. 492-503 - Xiaoxu Zhang, Zhipeng Cai, Keyan Chen, Guanxiong Ha, Chunfu Jia:

Efficient Auditing and Querying in Verifiable Redactable Blockchain: A Lightweight VDS Protocol with Integrity Verification. 504-511 - Dongchi Han, Yuan Ma, Xianhui Lu:

Theoretical Min-Entropy Bounds for Physical-Layer Key Generation over Weibull Fading Channels. 512-523 - Yibin Fu, Zhaoyun Ding, Sheng Zhang, Deqi Cao, Yi Wang:

LLM-Driven APT Analysis and Detection Based on Provenance Graph by Threat Pattern. 524-531 - Mengfan Li, Xinxin Fan, Quanliang Jing, Shaoye Luo, Yunfeng Lu, Jingping Bi:

LDP: Latent Diffusion-based Adversarial Purification towards Transformer-based Visual Encoders. 532-539 - Simon Unger, Sven Gebauer, Stefan Katzenbeisser:

Non-Restrictive Hardware-Based Trust in Embedded High-Level Operating Systems. 540-547 - Yuling Luo, Minjiao Pei, Shunsheng Zhang, Xue Ouyang, Qiang Fu, Sheng Qin, Junxiu Liu:

Compacting Side-Channel Measurements With Peak-Anchor-Based Alignment. 548-555 - Siqi Pei, Shiyue Huang, Hongbo Liu, Haitao Jia, Yanzhi Ren, Huan Dai, Jiadi Yu:

Proactive Radio Frequency Fingerprinting-Based Authentication Leverage IQ Perturbation. 556-565 - Saverio Giallorenzo, Simone Melloni, Pietro Sami:

Reliable and Robust Watermarking for Data Flooding against Ransomware Random Techniques. 566-577 - Ce Sun, Liancheng Zhang, Ruijuan Wang, Yakai Fang, Hongtao Zhang, Haojie Zhu, Luyang Li:

Finder6: Efficient IPv6 Addresses Scanning Based on Hostname Correlation in IPv6-Only Network. 578-585 - Zhi Lin, Lin Yan, Zan Zhou, Yongfeng Yu, Penghui Xiao, Shujie Yang:

RecZTA: A Reputation-Based Architecture with Dual-Layer PEPs for Zero Trust Access. 586-593 - Yewa Li, Yitan Huang, Bo Jiang, Zhigang Lu, Zelin Cui:

TCP-Awareness Augmented Robust TLS Traffic Classification: A Hybrid Deep Learning Approach. 594-601 - Victor Delfour, Marc-Olivier Killijian:

OUF: Oblivious Universal Function with domain specific optimizations. 602-609 - Sudarson Karmaker, Haitham S. Cruickshank, Mohammad Shojafar:

Secure Communication Protocols and Video Streaming Demonstrations in Open RAN through DTLS and LKH. 610-617 - Songgao Tu:

Defending Federated Learning against Backdoor Attacks by Inspecting Sparsity-Guided Out-of-Distribution Model Behavior. 618-625 - Weilai Guo, Shuaichao Song, Yeming Yang, Yuming Liao, Jiyuan Li, Songhui Guo:

Privacy-Preserving Facial Authentication with Hybrid Fuzzy Commitment and Cancelable Transformation. 626-635 - Fatima Jahan Sarmin, Atiquer Rahman Sarkar, Noman Mohammed:

Assessing the Effectiveness of Singling-Out Attacks on Synthetic Data: Is the Current GDPR Guidance Adequate? 636-643 - Ashish Nanda

, Robin Doss, Folmer Heikamp, Abhi Kumar, Haftu Reda, Adnan Anwar, Zubair A. Baig, Praveen Gauravaram, Debi Prasad Pati, Salil S. Kanhere, Mohan Baruwal Chhetri
:
Enhancing Physical Security in Smart Environments with Ambient Intelligence. 644-655 - Wenjing Hu, Weiwei Qi, Yanlu Li, Xinzhe Huang:

CVshield: Interpretable Black-Box Adversarial Defense for LLMs via CoT Guided Semantic Verification. 656-663 - Guofeng Zhang, Yang Zhang, Bingbing Wang:

An Efficient Feature Extraction Model Based on Asymmetric Deep Convolutional Autoencoder for Abnormal Traffic Detection. 664-671 - Jiaxuan Zhao, Qi Feng, Qin Liu, Min Luo, Wei Zhao, Debiao He:

KSFed: A Defense against Poisoning Attacks in Federated Learning using Statistical Analysis. 672-680 - Hengyu Zhang, Guang Cheng, Yuyang Zhou, Zongyao Chen:

MalShield: Enhancing Android Malware Detection with Stateful Defense against Query Attacks. 681-689 - Yunhao Wang, Yong Wang, Lin Zhou:

MBCGAN-SGFM: Detecting Rare and Unknown Attacks via Generative Augmentation and Semantic Memory. 690-699 - Yikai Liang, Mengqing Liu:

Can We Distinguish? A Deep Learning Approach to AI-Generated Content Detection. 700-707 - Shanlin Deng, Baojian Hua:

RuDyna: Towards A Dynamic Analysis Framework for Rust. 708-719 - Xiang Zhong, Yong Wang, Lin Zhou:

DCIAD:Dual CNN with Informer for Time-Series Anomaly Detection. 720-729 - Xiaofei Tong, Jingguo Bi, Shuwen Luo, Licheng Wang, Lixiang Li, Lin Wang:

Solving Small LWE Instances with the Dropping Meet-in-the-Middle Algorithm. 730-737 - Xinzhu Feng, Gaopeng Gou, Chang Liu, Zheyuan Gu, Wenqi Dong, Famei He, Xuren Wang:

ET-FS: Functional Specialization Method for Multi-Task Learning in Encrypted Traffic Classification. 738-749 - Jing Wang, Wenhao Yuan, Xianjun Deng, Qiankun Zhang, Jing Fan, Xue Yuan:

APER: An Efficient and Privacy-Preserving Scheme for E-Health Recommendations. 750-760 - Hai Liu, Yadong Peng:

A Trust-Based Data Quality Assessment Mechanism in Crowdsensing Services. 761-768 - Mingliang Liu, Baojian Hua:

Rusty: Effectively Detecting Multilingual Rust Memory Bugs with Interprocedural Static Analysis. 769-780 - Saida Elouardi, Mohammed Jouhari, Anas Motii:

OptiFLIDS: Optimized Federated Learning for Energy-Efficient Intrusion Detection in IoT. 781-792 - Lisha Yao, Jian Weng, Pengfei Wu, Guofeng Tang, Haiyang Xue, Guomin Yang, Robert H. Deng:

Attribute-Based Conditional PRE: A Novel Construction from LWE for Cloud Data-Sharing. 793-804 - Changsong Yang, Yueling Liu, Yong Ding, Hai Liang, Shuo Wang:

A secure and provable deletion method over outsourced data for fog-based smart grid. 805-812 - Yuqi Qiu, Juan Wang, Chenjun Ma, Yunfeng Kang, Jie Wang:

MLSBOX: Automated Sandbox for Fine-Grained Isolation of Multiple Third-Party Libraries*. 813-824 - Ran Wei, Hui Shu, Fei Kang:

RL-Optimized Lightweight Obfuscation Against Binary Code Similarity Detection. 825-836 - Chenghao Chen, Xiaolin Zhang, Kailun Qin, Tengfei Wang, Yipeng Shi, Tianyi Huang, Chi Zhang, Dawu Gu:

Building Provably Secure Pseudo-Strong PUFs via Weak PUFs and Pseudorandom Functions for Cryptographic Protocols. 837-844 - Xiaoyu Geng, Ning An, Boyuan Xu, Xiaobo Yang, Bo Jiang, Baoxu Liu, Junrong Liu:

Controller Makes Pentesting Better: An Improved Multi-Agent Automated Penetration Testing Framework. 845-852 - Chenxiang Zhang, Tongxi Qu, Zhong Li, Tian Zhang, Jun Pang, Sjouke Mauw:

Bits for Privacy: Evaluating Post-Training Quantization via Membership Inference. 853-860 - Samed Saka

, Valerio Selis
, Alan Marshall:
AlignAD-VAE: A Variational Autoencoder with MMD-Based Dataset Alignment for Network Anomaly Detection. 861-867 - Ruohan Wang, Gaode Chen, Miaobo Hu, Ji Xiang, Ruixin Song, Cong Xue, Lei Wang, Haoyuan Teng:

PANDA-CDR: Perturbation-Aware and Neural Dual-Channel Alignment for Cross-Domain Recommendation. 868-877 - Mauro Clavijo-Herrera

, Rolando Trujillo-Rasua, Carles Angles-Tafalla:
Decentralizing Photo Forensics for Public and Verifiable Trust. 878-885 - Jianxing He, Xi Chen, Shan Yao, Xiaoyan Liang, Ruizhong Du:

ConCloneDep: A Confidence-Aware Clone-Based Dependency Identification Approach in C/C++ Open-Source Components. 886-893 - Yucen Liao, Junping Wan, Jingjing Fan, Zoe L. Jiang:

ComplexMM: Efficient and Generic Homomorphic Matrix Multiplication via Complexification and BSGS Alignment. 894-902 - Saurabh Chamotra, Ferdous Ahmed Barbhuiya:

EFSM-Based Modeling of Siemens S7comm for Adaptive Cyber Deception in ICS Honeypots. 903-913 - Jialiang Dong

, Zihan Ni, Nan Sun, Sanjay K. Jha, Yiwei Zhang, Elisa Bertino, Surya Nepal, Siqi Ma:
Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber Risks. 914-925 - Yingying Qi, Jiabei Wang, Tiancheng Zhu, Yongbin Zhou:

Mitigating Leakage Amplification in DP-Enhanced Encrypted Search Across Multiple Users. 926-933 - Saranya Vijayakumar, Christos Faloutsos, Matt Fredrikson:

Prototype-Integrated Representation Learning for Novelty Detection. 934-941 - Xia Han, Qi Li, Jianbing Ni, Mohammad Zulkernine:

Robustness Assessment and Enhancement of Text Watermarking for Google's SynthID. 942-949 - Lixia Xie, Pengcheng Kang, Hongyu Yang, Juncheng Hu:

Clean Label Backdoor Attack Based on Feature Distance Guided Sample Selection and Noise Optimization. 950-957 - Shubha Dhali, Kuntal Ghosh, Siddhartha Prakash Duttagupta:

Data Driven Based Attention Mechanism for Optimal Anomaly Detection in Complex Multivariate Time Series Data. 958-965 - Bahareh Parhizkari, Antonio Ken Iannillo, Ed Zulkoski, Christof Ferreira Torres, Radu State:

On-Chain Risk Signals: Predicting Security Threats in DeFi Projects. 966-977 - Canhua Chen, Yang Song, Yunpeng Li, Yun Feng, Xiaoyu Wang, Yuling Liu, Qixu Liu:

PROV-LLM: Advanced Persistent Threat Detection Based on Process Behavior Subgraphs Using Large Language Models. 978-985 - Mengyuan Li, Jiewei Chen, Shao-Yong Guo, Xuesong Qiu, Feng Qi:

Reinforcement Learning Enhanced Temporal Generative Adversarial Networks for Blockchain Illicit Transaction Detection. 986-995 - Lina Ge, Zhipeng Cao, Ming Jiang, Liang Zhao:

A Zero-Trust Empowered Continuous Authentication System for Drivers: Integrating Federated Learning with Conditional Transformer GAN. 996-1006 - Xiaoxu Ren, Qixin Li, Haipeng Yao, Tianhao Ouyang, Ruichen Zhang:

ReTainer: Reputation-Aware Containerized Service Deployment in Blockchain Networks. 1007-1014 - Weihong Ma, Xinxin Li, Xiaoya Hu, Shaohu Li, Qian Wang, Fangyu Li:

Trusted Online Key Management Center Architecture and Implementation Method for Train Control Systems. 1015-1022 - Shiguo Wang, Yun Zhao:

Artificial Noise-Based Countermeasure Against Full-Duplex (FD) Active Eavesdropping. 1023-1029 - Ruoyao Xiao, Yu Luo, Weifeng Xu, Dianxiang Xu:

From Text to STIX: Reducing Hallucinations through Fine-Tuned LLMs. 1030-1037 - Zhangting Lin, Mingfu Xue, Wenmao Liu, Liquan Chen:

Adversarial Example Based Fingerprint Embedding for Robust Copyright Protection in Split Learning. 1038-1045 - Peizhao Zhou, Lihai Nie, Zheli Liu:

Scalable Private k-Nearest Neighbors Search Based on Secret Sharing. 1046-1053 - Yuan Chang, Siran Wang, Tom H. Luan, Yuntao Wang, Zhou Su:

PrivRAG: A Privacy-Preserving Retrieval-Augmented Generation Protocol for LLM-Driven Voice Assistants. 1054-1061 - Rong Ren, JingYi Wu, HongBo Jin, QingYu Song, Bing Zhang, Qian Wang:

Interprocedural Call Graph Embedding with GAT for Memory safety Vulnerability Detection. 1062-1071 - Tao Chen, Dongming Li, Xianglin Fan, Yi Lou:

PUF-Enhanced Physical-Layer Key Generation for Secure Drone Communication with Untrusted Relays. 1072-1079 - Dilli Prasad Sharma, Liang Xue, Xiaowei Sun, Xiaodong Lin, Pulei Xiong:

Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting. 1080-1091 - Nanqing Luo, Haizhou Wang, Zhilong Wang, Lan Zhang, Ping Chen, Peng Liu:

Deep Learning Assisted Reverse Engineering: Recognizing Encryption Loops in Ransomware. 1092-1102 - Jiajun Guo, Hao Ying, Zhezhao Yang, Xinyue Yu, Tianqi Shi, Jie Xiao:

KHAD: K-Hop and Activation-aware Defense against Bit-Flip Attacks in Deep Neural Networks. 1103-1110 - Pei Gan, Xuehu Yan, Hu Deng, Rongtao Liao, Feng Chen:

Flow-Based Screen-Shooting Robust Watermarking with Invertible Noise Simulation Network. 1111-1118 - Wesley Kwan, Lynn Takahashi, Nathan Pham, Apurva Sista, Ericsson Santana Marin:

You May Not Be Your Username: Cross-Market Vendor Alias Attribution with Automatic Multi-Signal Evaluation. 1119-1126 - Chaoyi Sun, Henglin Pu, Junyi Zhou, Chao Cai:

Establishing Secure Intra-Solid Communication Networks via Acoustic Transceivers. 1127-1134 - Siyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu:

ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models. 1135-1146 - Jialing He, Zhuo Chen, Yijing Lin, Jiacheng Wang, Liehuang Zhu, Zhu Han, Rahim Tafazolli, Tao Xiang:

Overcoming Data Mining in Blockchain-Based Covert Communication: Transaction Withdrawal and Multisig Embedding. 1147-1157 - Yuanhao Shen, Ying Wang, Yiran Liu, Zili Yao, Qiu Xue-Song, Shaoyong Guo:

Dynamic Hybrid Backdoor Attack: Saliency-Guided Composite Triggers for Image Classification. 1158-1165 - Karla Schäfer, Martin Steinebach:

Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling. 1166-1173 - Omodolapo Babalola, José Cano, Somrudee Deepaisarn, Nguyen Truong:

FedRand: A Federated Random Forest Learning Technique for Anomaly Detection in IoT Networks. 1174-1181 - Zhenkun Jin, Jiaqi Ma, Yuanyuan He, Wei Xiang, Qiankun Zhang, Tao Zhang:

TLSA: Transfer Learning Enhanced Link Stealing Attacks on Graph Neural Networks. 1182-1189 - Aoqi Ruan, Hui Xia, Rui Zhang, Xiaoxue Song, Zhengheng Li, Mengyuan Song:

AMD: Adaptive Adversarial Training Method Based on Mahalanobis Distance. 1190-1197 - Michael Eckel, Georgios Gkoktsis, Markus Horn:

Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results. 1198-1209 - Xuke Yan, Linxi Zhang:

Hardware-Aware Neural Architecture Search for Real-Time Automotive Intrusion Detection. 1210-1217 - Xuan Chen, Shujie Cui, Joseph K. Liu, Shifeng Sun, Shangqi Lai:

PrivANN: Practical and Efficient Private Approximate Nearest Neighbor Search. 1218-1226 - Xiaoxian Liu, Chen Chen, Xueqiao Liu, Xiaoyang Wang:

Efficient and Privacy-Preserving (α, β)-Core Community Search over Encrypted Bipartite Graphs. 1227-1234 - Kesong Wu, Maowei Li, Peng Yang, Wanting Yang, Jiangtian Nie, Xianbin Cao:

Hyperchaos and HVS-Adaptive Video Watermarking Embedding. 1235-1242 - Jinguo Li, Qiang Lv, Junqin Huang, Linghe Kong:

Range Dynamic Searchable Symmetric Encryption: Combating Volume Leakage and Enabling Non-interactive Deletion. 1243-1251 - Kaixuan Luo, Chuanxiang Ma:

Multidimensional Dynamic Trust Evaluation towards Intelligent Transportation. 1252-1259 - Yunqiao Zhang, Shunquan Tan, Jiwu Huang:

Identification of Generative Forged Western Blot Images. 1260-1267 - Hang Chen, Bo Yin, Binyao Xu:

NFDP: Enabling Noise-Adaptive and Fast-Converging Privacy Protection in Graph Neural Network Training. 1268-1274 - Jingjing Hu, Yu Li, Yuanhang Sun, Chidan Zhu, Qinrang Liu, Jiangxing Wu:

An Adaptive Fast Recovery Scheme Based on Checkpoints: Analysis and Application in Asymmetric Multiprocessor Systems. 1275-1282 - Hanyu Zhao, Yinyan Zhang:

Privacy-Preserving Average Consensus by One-Step Perturbation. 1283-1290 - Danhuai Zhao, Chen Tian, Zhenyu Ju, Yi Rong, Xiaoming He, Wanting Yang:

A Blockchain-Enabled AIoT Framework for Secure Metaverse in Wireless Communication Networks. 1291-1297 - Yuxuan Xiong, Yinyan Zhang:

Privacy-Preserving Distributed Optimal Consensus of High-Order Nonlinear Multi-Agent Systems. 1298-1306 - Xingyu Lu, Yang Cao:

FABA: Breaking Defenses in Production-Grade Federated Learning for Mobile Malware Detection Services. 1307-1316 - Xinguang Wang

, Nguyen Linh Trung, Oliver Y. Chen, Jeroen Van Schependom, Stijn Denissen, Guy Nagels:
PDD-FANs: Personalized Decentralized Federated Adversarial Networks with Defense Mechanism in Non-IID Setting. 1317-1326 - Jinhao You, Zan Zhou, Shujie Yang, Yi Sun, Lei Zhang, Changqiao Xu:

PLAA: Packet-level Adversarial Attacks in Network Traffic Detection. 1327-1336 - Junzheng Li, Hongtao Yu, Ruiyang Huang, Suchang Yang:

Adaptive Temperature-Enhanced Hypergraph Contrastive Learning with Reliable Data Sampling Augmentation. 1337-1342 - Ruixin Song, Youliang Tian, Mengqian Li, Ze Yang:

SEMA: A Structural Entropy Guided Multimodal Framework for Adversarial Face Attacks. 1343-1350 - Ruoting Xiong, Yi Ren, Xin Shi, Wei Ren, Gerard Parr:

Location Privacy Protection for Network-RTK VRS Positioning Users via Mobile Networks. 1351-1356 - Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi

, Mustafa A. Al Sibahee, Junchao Ma, Zaid Alaa Hussien, Ali Hasan Ali, Husam A. Neamah, Ahmed Ali Ahmed:
A Robust and Efficient Authentication Protocol for Intelligent Systems in Smart Healthcare IoMT. 1357-1364 - Disen Tang:

Pure Object Detection for Text-CAPTCHAs - YOVO: A Lightweight Recognition Model and Annotation Framework Derived from YOLOv8n. 1365-1373 - Zhiyuan Fu, Junfan Chen, Lan Zhang, Ting Yang, Jun Niu, Hongyu Sun, Ruidong Li, Peng Liu, Jice Wang, Fannv He, Yuqing Zhang:

FDLLM: A Dedicated Detector for Black-Box LLMs Fingerprinting. 1374-1379 - Yixuan Yang, Min Zhang:

Safety-Aware DRL Training Based on Reachability Analysis. 1380-1387 - Zhipeng Fu, FanPing Zeng:

ETCFF: An Encrypted Traffic Classification Method Based on Fusion Features. 1388-1395 - Longji Li, Yifeng Zheng, Songlei Wang, Zhongyun Hua, Lei Xu, Yansong Gao:

Privacy-Assured Analytics on Decentralized Graphs:The Case of Graph Learning. 1396-1405 - Hai Lin, Xingchen Zhu, Zhihong Chen, Yue Cao:

FTE: Filter-Based Trust Evaluation for the Internet of Vehicles. 1406-1415 - Yuyang Wang, Wei Song, Ruisi Song, Yuan Shen, Xiaohui Wang:

Efficient and Dynamic Multi-Source Data Analytics over Encrypted Cloud Data with Bitmap-Based Indexing. 1416-1424 - Xufeng Wang

, Yuqi Ma, Hongxian Liu, Sanfeng Zhang:
PPFDroid: An Android Malware Detection Method Based on Pre-Training and Prompt-Based Fine-Tuning. 1425-1434 - Xinzheng Liu, Zhaoyun Ding:

CyberSOIE-LLM: Cybersecurity Semi-Open Information Extraction with Large Language Models. 1435-1442 - Shibo Jin, Shiqi Liu, Lujuan Dang:

A Class of Semi-Supervised Weighted Nonnegative Matrix Factorization for Community Detection. 1443-1450 - Yaqi Liu, Hanhan Wang, Weichen Zhu, Kunbai Zhang, Chao Xia:

TriDNet: 3D Reconstruction and Generalized Feature Disentanglement for Deepfake Detection. 1451-1456 - Di Jiang, Xiaojie Zhu, Chi Chen:

SafeMLLM: Extending Safety Alignment from Single-Modal LLMs to Multimodal LLMs. 1457-1465 - Jianwen Xiang, Junwei Jiang, Songsong Liao, Xueming Zhang, Rui Hao:

BayesFuzz: Bayesian-Based Greybox Fuzzing for Stateful Protocols. 1466-1471 - Ming Zhang, Zhendong Wu, Hu Li, Jin Li, Ling Pang, Cheng Qian:

Attention-Inverse Perturbation: A Novel Adversarial Attack Strategy by Targeting Non-Attentive Regions. 1472-1478 - Yikang Fan, Xiaojie Zhu, Chi Chen, Yong Li:

TSDAs: Enhanced Statistics-Based Query Recovery in Dynamic Searchable Symmetric Encryption via Probabilistic Modeling. 1479-1488 - Aiyao Zhang, Xiaodong Lee, Zhixian Zhuang, Jiuqi Wei, Yufan Fu, Botao Peng:

POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization. 1489-1498 - Zhenlei Wu, Xiaoqin Pan, Lei Zhou:

Granular Ball and Curriculum Learning-Based Fuzzy Support Vector Machine. 1499-1506 - Gerrit Klause, Niklas Bunzel:

Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks. 1507-1512 - Bosong Zhang, Linna Zhang, Qian Sun, Hai Wang, Danyang Li:

Model Evaluation-Driven Aggregation: FedMEDA for Robust Non-IID Federated Learning. 1513-1521 - Filip Lauterbach, Lukas Kapicak, Sergej Jakovlev, Miralem Mehic, Stefan Rass, Miroslav Voznák:

Post-Quantum Cryptography for Secure Authentication Key Distribution in QKD Networks. 1522-1532 - Yuliang Liu, Yuan Liu, Yiwen Gao, Yongbin Zhou, Licheng Wang, Peng Gao:

Fine-Grained Revocable Lattice-Based ABE: Dual User and Attribute Revocation with Low Overhead for Cloud Environments. 1533-1540 - Xin Wang, Yulun Song, Fan Zhang, Feng Qi, Yunlong Xie, Lin Sun:

TrustMonitor: A Secured Container Framework via Virtualization and Pointer Authentication for Cross-Domain Data Sharing. 1541-1552 - Chen Zhang, Zhenyong Zhang, Cong Wang, Ruilong Deng:

Disguised Attack in the Metaverse: A New Threat to Avatar-Based Identity Security. 1553-1560 - Boyang Dong, Xiukun Yan, Kai Zeng:

Retrieval-Augmented Generation-Based Adaptive State Enhancement for Federated Split Learning. 1561-1568 - Shen Du, Xinrui Ge, Chengliang Tian:

Efficient and Secure Spatial Keyword Similarity Query with User Preference. 1569-1577 - Yunjun Ma, Gangyan Zeng, Peng Zhang, Yuchen Huang, Fuyuan Zhang, Ran Lin, Huan Qian:

TrapLLM: An LLM-powered Interactive Log-based Honeypot for Real-world Network Attacks. 1578-1585 - Yihan Wang, Xiangjun Xue, Jingyong Liang, Donghai Guan, Çetin Kaya Koç:

An Efficient FHE-based Ciphertext Matrix Multiplication Algorithm. 1586-1591 - Ruijia Li, Zijiao Zhang, Ximin Huang, Hongwei Hu, Xining Gao:

Cross-Modal Collaborative Recovery: Breaking Multimodal Unlearnable Examples Protection. 1592-1597 - Anders Mølmen Høst, Pierre Lison, Leon Moonen:

A Systematic Approach to Predict the Impact of Cybersecurity Vulnerabilities Using LLMs. 1598-1607 - Yiping Teng, Yuyao Tang, Gang Wang, Shiqing Wang, Changze Li, Liang Zhao:

VLAH: A Lightweight and Verifiable Framework for Approximate Nearest Neighbor Search in High-Dimensional Space. 1608-1616 - Jiangyi Yin, Chenxu Wang, Zhao Li, Zhuojun Jiang, Jiangchao Chen, Dongfang Hao, Qingyun Liu:

Leveraging Cross-Layer Network Probing to Detect Stealth Services. 1617-1625 - JiaYv An, Yankun Gao, Lei Han:

Post-Quantum Anonymity of Key Encapsulation Mechanism and Its Applications in Password Authenticated Key Exchange Protocols. 1626-1633 - Yalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen, Sumanta Sarkar, Christopher J. P. Newton, Carsten Maple, Ugur-Ilker Atmaca:

An Improved Vector Commitment Construction with Applications to Signatures. 1634-1639 - Qiyun Yu, Yanrong Lu, Weiwei Jiang:

User Demands Based Multi-Agent Reinforcement Learning Satellite Handover Strategy. 1640-1648 - Xiaopang Wang, Lihui Wang, Limin Guo:

Privacy-preserving Location-Based Services with A New Private Information Retrieval Scheme. 1649-1660 - Zhe Liu, Kun Zhou, Chengkai Chen, Jianfei Mao, Hongbing Cheng:

No Touch, No Trace: A Paradigm for Remote Voltage Side-Channel Attacks on FPGA-Based Computing Platforms. 1661-1670 - Chen Ling, Yifei Li, Ziqing Feng, Bin Liu, Qiuyun Wang, Liling Xin, Zhengwei Jiang, Huamin Feng:

Automated Attack Graph Construction for Cross-host Threat Detection Using Cyber Threat Intelligence. 1671-1678 - Binquan Guo, Junteng Cao, Marie Siew, Bin Bin Chen, Tony Q. S. Quek, Zhu Han:

Accelerating Privacy-Preserving Federated Learning in Large-Scale LEO Satellite Systems. 1679-1686 - Xihan Xiong, Zhipeng Wang, Qin Wang, William Knottenbelt:

Toxic Ink on Immutable Paper: Content Moderation for Ethereum Input Data Messages (IDMs). 1687-1696 - Yanna Jiang, Haiyu Deng, Qin Wang, Guangsheng Yu, Xu Wang, Yilin Sai, Shiping Chen, Wei Ni, Ren Ping Liu:

SoK: Credential-Based Trust Management in Decentralized Ledger Systems. 1697-1706 - Xinyu Liu, Tianbo Wang, Chunhe Xia, Yingming Zeng, Ruidong Wang:

SERA: Semantic Entity Recognition and Alignment for Threat Intelligence Representation. 1707-1715 - Xinyan Chen, Yu Wang, Peishuai Sun, He Wang, Yuqing Zhang:

TGF-JA4: LLM-Aware Multi-Feature Temporal Graph For Malware Detection Under Concept Drift. 1716-1723 - Xiangfu Liu, Teng Huang, Caiyan Tan, Jiahui Huang, Qiong Wang, Yan Pang:

CrossMiner: Smart Contract Vulnerability Detection in Interactive Scenarios. 1724-1732 - Xingyu Lu, Yang Cao:

Adaptive Neuron Honeypot: Trapping Malicious Backdoors in Federated Learning. 1733-1741 - Yuanyuan Xie, Ming Luo, Han Wang, Mingsheng Wang:

Optimizing FHE-Based Secure Matrix Computation for Untrusted Cloud Environments. 1742-1751 - Yongxin Li, Yuwei Xu, Xinhe Fan, Yujie Hou, Yali Yuan, Qiao Xiang, Guang Cheng:

CoDA: Cross-Domain Few-Shot Website Fingerprinting via Contrastive Prototype Alignment. 1752-1758 - Wenjun Zhu, Jianan Hong, Yingjie Xue, Jiayue Zhou, Shiyao Wang:

A Privacy-Preserving and Highly Fault-Tolerant Cross-Chain Atomic Swap Scheme. 1759-1764 - Peiyan Chen, Changsheng Wan, Hao Zou, Tian Wen, Zhiyuan Wu:

Exploring Subtle Manipulation Vulnerabilities in Federated Distillation. 1765-1774 - Sayedali Sheykholeslamzadeh, Dima Alhadidi:

PACT: A Passive Accuracy-Based Trust Metric for Malicious Client Detection in Federated Learning. 1775-1781 - Minghui Chen, Keming Wang, Chenlin Huang, Fengyuan Yu, Renyu Yang, Hua Cheng, Mantun Chen:

LASEFlow: A Label-Aware Security Enhancement Framework for Serverless Workflows. 1782-1790 - Xin Feng, Cong Li, Weizhi Meng, Zilong Wang, Xinsheng Ji:

A Dual-Stage Anomaly Detection Framework for Stealthy Attacks in 5G Core Networks. 1791-1798 - Dishanika Denipitiyage, Bhanuka Silva, Suranga Seneviratne, Aruna Seneviratne, Sanjay Chawla:

Detecting Content Rating Violations in Android Applications: A Vision-Language Approach. 1799-1808 - Yueming Li, Long Chen, Zhenfeng Zhang:

A Comprehensive Analysis of the AKMA+ Protocol. 1809-1818 - Mingyong Yin, Tong Liu, Hejun Wang, Yulong Wang, Run Yang:

From Sample Generation to Efficacy Transfer: Optimization of Privacy-Preserving LLMs for Content Moderation. 1819-1828 - Zirui Jiang, Yisen Wang, Xingyu Bai, Jiajun Du, Tianchan Yang, Bing Zhu:

MR-Patch: A Retrieval-Augmented Generation Approach for Patch Presence Test. 1829-1838 - Jing Bai, Gaopeng Gou, Zheyuan Gu, Wenqi Dong, Gang Xiong, Zhen Li, Zhenzhen Li, Qingya Yang:

SwCC: A Swapped-Contrastive Clustering Learning for Few-shot Website Fingerprinting Attacks. 1839-1848 - Maulidi Adi Prasetia, Muhamad Risqi U. Saputra, Guntur Dharma Putra:

FedPPA: Progressive Parameter Alignment for Personalized Federated Learning. 1849-1856 - Jiahui Shang, Luning Zhang, Zhongxiang Zheng:

Beyond Algorithmic Proofs: Towards Implementation-Level Provable Security. 1857-1866 - Haiwei Lai, Baojian Hua:

DFAFuzz: Fuzzing for Embedded JavaScript Virtual Machines with Type-Directed DFA. 1867-1876 - Si Wu, Huyao Yang, Baojian Hua:

Security Risks of Transpiling C Programs to Rust. 1877-1886 - Alexandru Kiraly, Darius Bufnea:

DoNotSurf - Low-Latency DNS IP Tunneling. 1887-1894 - Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu:

VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching. 1895-1904 - Xukui Li, Guang Cheng, Wei Chen, Zhen Zhang, Zechen Xu, Xing Qiu:

MVL-AD:A Multi-View Learning Framework for Class-Incremental Unknown Attack Detection. 1905-1913 - Yanqi Ma, Yuan Liu, Yongbin Zhou, Yiwen Gao:

Traceable and Revocable Key-Policy Attribute-Based Encryption scheme from Lattices. 1914-1920 - Xinhong Hei, Xi Zuo, Yichuan Wang, Mengjie Tian, YanHua Feng:

Secure Non-Interactive Authentication in Satellite Networks Using Time Lock Encryption. 1921-1928 - Quan Li, Yuhong Li:

Intrusion Detection via Federated Learning: Tackling Non-IID Data and Poisoning Attacks. 1929-1935 - Manzhou Li, Xinjin Ge, Yan Li, Yan Zhang:

PathFed: Trustworthy and Efficient Federated Aggregation via Path Attention. 1936-1943 - Lingyun Xiang, Fangbo Luo, Xiangli Jin:

High-fidelity Dual-layer Backdoor Watermarking Scheme based on Private Model Embedding. 1944-1951 - Casey Fan, Diyana Tial, Vladislav Dubrovenski, Mengtao Zhang, Yugyung Lee, Dianxiang Xu:

Security of LLM Agents: A Case Study Approach. 1952-1957 - Michael Eckel:

LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices. 1958-1967 - Letian Sha, Lei Xue, Nan Yi, Fu Xiao:

STAR-Shield: Self-Tuning Adaptive Rules for Web Application Firewall-as-a-Service via Multiple Large Language Models. 1968-1975 - Fuyang Deng, Qianhong Wu, Bo Qin:

Recipient-Agnostic Hash Locks for Cross-Chain Auctions with Bitcoin Bidding. 1976-1984 - Lei Zhao, Yujia Zhu, Baiyang Li, Yong Sun, Yuedong Zhang, Qingyun Liu:

Broken Chains: An Empirical Analysis of DNS Resolution in IPv6-only Environments. 1985-1992 - Wenhui Kong, Pengfei Wen, Bo Li, Heng Gao, Runshan Hu, Ning Hu, Xingjun Wang:

A Threshold Distributed Key Generation and Dynamic Key Management Scheme in Wireless Sensor Networks. 1993-2001 - Shain Saharan, Vishal Gupta:

PoDIBC: Prevention of DrDoS Attacks Using Identity -Based Cryptography in Software-Defined Networking Environment. 2002-2009 - Lukasz Krzywiecki, Witold Karas, Adam Niezgoda, Karol Niczyj:

Hierarchical Ring Signatures with Hidden Signature Functionality over Blockchain Infrastructure. 2010-2015 - Catalin V. Bîrjoveanu, Mirela Bîrjoveanu:

Multi-Party Contract Signing Ensuring Trust in Complex Transactions. 2016-2024 - Soufiane Essahli, Oussama Sarsar, Imane Fouad, Ahmed Bentajer, Anas Motii:

FakeZero: Real-Time, Privacy-Preserving Misinformation Detection for Facebook and X. 2025-2035 - N'Famoussa Kounon Nanamou

, Rim Ben Salem, Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens:
From static to dynamic risk indicators in predicting and detecting insider attacks. 2036-2043 - Mikolaj Pietrek, Lukasz Krzywiecki, Karol Niczyj, Witold Karas:

Verifiable and Robust Distributed Deep Learning based on Blockchain Infrastructure. 2044-2049 - Wenchao Liu, Huiyu Xie, Tanping Zhou, Shuo Chen, Weidong Zhong, Xiaoyuan Yang:

Zephyr: Secure and Non-interactive Two-Party Inference for Transformers. 2050-2059 - Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy:

Fairness-Constrained Optimization Attack in Federated Learning. 2060-2065 - Neha Gupta, Liam O'Driscoll, Taneya Sharma, Mohammad Shojafar, Chuan Heng Foh, Ioana Boureanu, Helen Treharne, Sotiris Moschoyiannis:

TwinGuard: A Proactive RL-Driven Defence Framework for Digital Twin-Enabled O-RAN Security. 2066-2071 - Lina Ge, Haisong Zhu, Ming Jiang, Zhe Wang:

Leader-Follower Federated Learning Framework: Heterogeneous Federated Learning based on Asymmetric Distillation. 2072-2077 - Jiawen Sun, Rui Tian, Shangru Zhao, Xiangming Zhou, He Wang, Yuqing Zhang:

LLM-Assisted IDOR Detection in Hospital Mini-Programs: Risks to PII and PHI. 2078-2086 - Md Yeasin Ali, Touhid Islam Udoy, Md. Ishmam Tasin, Masum Alam Nahid, Fairuz Rahaman Chowdhury, Farida Chowdhury, Md Sadek Ferdous:

AuthVR: Securing Authentication Against Shoulder Surfing and Keystroke Inference Attacks using Virtual Reality. 2087-2096 - Jiaxin Jiang, Zhiwen Chen, Hui Zhou, Wenjun Yan, Tianshuo Jiao, Bohan Tan, Zhuo Zhang, Hao Chen, Zheng Qin:

LDInfer: Landmarks Inference-Based for Facial Forgery Detection of Different Quality. 2097-2104 - Reem Al-Saidi, Erman Ayday, Ziad Kobti:

Comparing Reconstruction Attacks on Pretrained Versus Full Fine-tuned Large Language Model Embeddings on Homo Sapiens Splice Sites Genomic Data. 2105-2114 - Yue Cui, Guangshun Li, Kexin Yang, Junhua Wu:

GMFuzz: Integrating Hierarchical Mutation and Fidelity Constraints for Coverage-Guided DNN Security Testing. 2115-2122 - Chen Chen, Mengyan Liu, Zhong Guan, Yaochen Ren, Yanbo Wu, Yangyang Guan, Zhen Li, Gaopeng Gou, Junzheng Shi:

SSRCorr: A Self-Supervised Robust Flow Representation Learning Framework for Flow Correlation Attacks on Tor. 2123-2130 - Zhenyu Liu, Varun Ojha:

RegMix: Adversarial Mutual and Generalization Regularization for Enhancing DNN Robustness. 2131-2138 - Shuang Wu, Ying Yu, Yan Liu, Xiangyu Gao, Zhe Qu:

Towards a Deep Understanding and Practical Guideline on the SameSite Policy. 2139-2148 - Yanfeng Chen, Jing Liang, Hongliang He, Peiya Li:

A New End-to-End Encrypted Image Retrieval Scheme in Cloud Environment. 2149-2155 - Wenbin Li, Peng Yang, Xiaoyu Geng, Kesong Wu, Hongtao Yu:

Real-Time Forgery Detection via Dynamic Frequency-Domain Selection and Phoneme Alignment. 2156-2162 - Peiyao Sun, Qifan Wang, David F. Oswald, Mark Dermot Ryan, Vladimiro Sassone, Ahmad Atamli:

FaultSpy: On the Insecurity of SPDM Protocols under Fault Injection. 2163-2172 - Giovanni Menon, Enrico Bassetti, Mauro Conti:

QUICkly Running Out of Money: Evaluating QUIC Resilience to Traffic Inflating Attacks. 2173-2180 - Haitao Mei, Zhangzhuo Du, Chao Cai, Chi Cheng, Jian Chen:

CatPoison: Category-Oriented Knowledge Poisoning Attacks in Retrieval-Augmented Generation Systems. 2181-2189 - Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Oussama Azrara, Jaafar Chbili:

CyberNER: A Harmonized STIX Corpus for Cybersecurity Named Entity Recognition. 2190-2197 - Tianxiang Xu, Zhichao Wen, Xinyu Zhao, Jun Wang, Yan Li, Chang Liu:

L2M-AID: Autonomous Cyber-Physical Defense by Fusing Semantic Reasoning of Large Language Models with Multi-Agent Reinforcement Learning. 2198-2203 - Zhaojun Dai, Xiaodong Lee, Yufan Fu, Botao Peng:

DeFiAD: A Unified Method for Early-Stage Domain Abuse Detection Through Automated Deep Feature Interaction. 2204-2213 - Tongwei Zhang, Baojian Hua:

ORThrus: Detecting Deep Learning Compiler Bugs via Optimization Resistance Transformations. 2214-2223 - Honglei Wang, Lin Ding, Zhengting Li, Xinhai Wang:

Improved Differential-Linear Distinguishes on the ChaCha256 Stream Cipher. 2224-2230 - Yue Wu, Fenghua Li, Feng Lu, Zifu Li, Yixuan Zhang, Yanru He:

A Watermarking Framework for Secure Distribution of Meteorological Images. 2231-2238 - Hao Ying, Jiajun Guo, Xinyue Yu, Zhezhao Yang, Tianqi Shi, Jie Xiao:

Pruning for Security: Mitigating Stealthy Bit-Flip Attacks with Efficiency Gains. 2239-2246 - Qing Fan, Yumeng Xie, Zhitao Guan, Yongshuang Wei, Yajie Wang, Chuan Zhang, Liehuang Zhu:

Privacy-Preserving and Control-Compliant Authenticated Access for the AI-Enabled Industrial Internet of Things. 2247-2258 - Meng Yang

, Peirou Liang, Zhiqian Wu, Yong Liao:
Jailbreaking Multimodal Large Language Models via Consistent Cross-Modal Backgrounds. 2259-2266 - Xiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Xiaolin Chang:

Two-Tier Batch Data Integrity Verification with Identity-Based Signatures and Privacy Preservation in Cloud-Edge-End Architecture. 2267-2272 - Lingyu Qiu, Zhen Liu, Bitao Peng, Ruoyu Wang, Changji Wang, Qingqing Gan:

Incorporating Statistic and Semantic Dependencies for Enhancing the Robustness of Android Malware Detection. 2273-2282 - Hongliang Yin, Hongjiao Li:

D3FL: Label-Free and Heterogeneity-Robust Defense for Federated Learning via Distilled Reference Model against Data Poisoning Attacks. 2283-2290 - Lifeng Guo, Jingjing Xie, Runtao Zhang, Wei-Chuen Yau:

TAR - PCH: Traceable and Revocable Blockchain Rewriting via Partial Policy-Hiding Chameleon Hashing under Cloud Assistance. 2291-2300 - Mingshu He, XiaoWei Zhao, Liu Yang:

NFD-TRG: Network Flow Detection via Traffic Relationship Graphs with Statistical Feature Embedding. 2301-2310 - Zhipeng Lyu, Xiumei Li, Junmei Sun:

A Transferable Adversarial Attack Framework for Object Detection via Spatial-Frequency Information Masking. 2311-2318 - Zhenya Chen, Xueying Bian, Ming Yang, Chensheng Liu, Xiaoming Wu, Sihan Lu:

FST-AD: Anomaly Detection for Cyber-Physical Systems via Frequency-Spatio-Temporal GNNs. 2319-2326 - Zhen Gao, Tao Sun:

Model Reduction of Colored Petri Nets Based on Unrelated Transitions. 2327-2336 - Qing Yang, Shangru Zhao, Yuqing Zhang:

FBFISADetector: A Method based on Filter Mechanism to detect the Instruction Set Architecture of Monolithic Firmware. 2337-2345 - Haishuo Zhang, Huiran Yang, Hongjia Li, Yan Zhang, Peng Chen, Weiping Wang, Ding Tang:

A Heterogeneous GNN Based Trust Evaluation Method for Remote Desktop Access. 2346-2354 - Ya Lin, Iftekhar Salam:

Hybrid Fault Attack on Grain-128AEAD: Signature or Machine Learning Localization with Bandit-Guided Recovery. 2355-2362 - Lucas Tesson, Jamal El Hachem, Patrice Guillou, Jérémy Buisson:

Towards System-of-Systems Bill of Material Solution for Vulnerability Operational Impact Analysis. 2363-2372 - Alison Gonçalves Schemitt, Henrique Fan da Silva, Roben Castagna Lunardi, Diego Kreutz, Rodrigo Brandão Mansilha, Avelino Francisco Zorzo:

Assessing the Impact of Post-Quantum Digital Signature Algorithms on Blockchains. 2373-2380 - Lixin Zhang, Peng Yu, Chaochao Li, Can Tan, Xu Chen, Dingshi Liao:

Trust-Aware Rapid Emergency Service Recovery for Low-Altitude Intelligent Networking via Transformer-Enhanced Reinforcement Learning. 2381-2386 - Areeb Saldin, Ammar Hawbani, Yunchong Guan, Yunhe Sun, Saeed Hamood Alsamhi, Liang Zhao:

Adaptive Cooperative Spectrum Sharing in HSTNs with Hardware Impairments and Realistic Fading for Enhanced Reliability. 2387-2392 - Xiuping Li, Yong Li, Yangbai Zhang, Xiaowei Li, Xiaolin Chang:

Improving Reliability of Electric-Vehicle Charging Service: A Scalable Modeling Approach. 2393-2398 - Liangyu Zhang, Junyu Cheng, Xin Tang, Jiaxin Li:

Hotness Strategy based Secure Cross-user Deduplication for Cloud Storage. 2399-2406 - Xin Yi, Shangru Zhao, Yuqing Zhang:

DataLineage RCA: Root Cause Diagnosis for Data Lineage Issues Using Large Language Model-Based Agents. 2407-2412 - Zhoujie Rong, Jingfeng Rong, Yuqing Zhang:

Comparative Analysis of Cross-Border Data Flow Policies: EU, US, and China. 2413-2418 - Xingwang Dou, Shanquan Yang, Chaoyang Zhu, Ziqing Lin, Baiji Hu, Jice Wang, Hongyu Sun, Fannv He, Anmin Fu, Yuqing Zhang:

Review of Defect Detection Techniques for Power Information Systems. 2419-2426 - Xinzhuo Xue, Shangru Zhao, Yuqing Zhang:

Log Intelligent Knowledge Base Construction Method Based On Streaming Graph Fusion. 2427-2432 - Xiang Hai, Jia Zeng, Zhiyuan Fu, Siyu Chen, Yansong Shi, Hongyu Sun, Jice Wang, Fannv He, Yuqing Zhang:

OSSDetector: Towards a More Accurate Approach for C/C++ Third-Party Library Detection. 2433-2438 - Jice Wang, Fannv He, Yue Fang, Yuqing Zhang:

Beyond Likes: Unraveling the Veil of Personal Data Exposure in Mobile Application GUIs. 2439-2444 - Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Asif Rahman, Olukunle Kolade, Sasidhar Kunapuli:

MAD-OOD: A Deep Learning Cluster-Driven Framework for an Out-of-Distribution Malware Detection and Classification. 2445-2450 - Xuan Zhang, Suzhen Cao, Tianhao Zhang, Guorui Liu, Lei Han, Xiaodong Yang:

Multi-keyword Searchable Encryption Scheme with Policy Hiding Support for User Revocation in Cloud Environment. 2451-2460 - Yamin Li, Chen Zeng, Liu Duan, Xuansong Li, Can Li, Haofeng Ju:

iSME: Image Steganography with MECS Based on GAN. 2461-2470 - Yuning Zhou, Min Wu, Hongxiang Ji, Ziwei Wang:

Diffusion-Driven Video Steganography: A Three-Stage Framework for Robust and High-Capacity Data Concealment. 2471-2478 - Yu Zhang:

DAPUR: A Decentralized Anonymous Payment Under Regulation from Bitcoin. 2479-2485 - Niklas Bunzel, Aino Schwarte:

Evasion Attacks in Continual Learning. 2486-2491 - Dan Gao, Huanhuan Xu:

Verifiable Outsourced CP-ABE with Authority Audit for Public Computing Devices. 2492-2499 - Shanpeng Lv, Ying Yang, Yuling Huang:

SemiFlow: Website Fingerprinting Using Semi-Supervised Learning. 2500-2508 - Samy Bettaieb, Serena Lucca, Charles-Henry Bertrand Van Ouytsel, Etienne Rivière:

Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware Detection. 2509-2516 - Mingchuang Zhang, Hongbo Tang, Wei You, Xingxing Liao, Jie Yang, Hang Qiu:

A Region Dual-Factor Aware Federated Learning Framework for NWDAF in B5G/6G Core Network. 2517-2526 - Chunhui Liu, Geming Xia, Chaodong Yu, Yuze Zhang, Jiawen Wu, Hongwei Huang:

TeGCN:Temporal Evolution-Aware Trust Evaluation for Dynamic Social Networks. 2527-2535 - Jiaran Qiu, Peng Cheng, Jun Zhou:

An Evolutionary Algorithm with Advanced Initial Solutions for Association Rules Hiding. 2536-2543 - Zongmin Wang, Qiang Wang, Fucai Zhou, Bao Li, Jian Xu, Haoyan Huang:

Blockchain-Verified Attribute-Based Keyword Search with User-Generated Keys in Multi-owner Setting for IoT. 2544-2551 - Zheng Chen, Buhui Yao:

Goal Hijacking Attack on Large Language Models via Pseudo-Conversation Injection. 2552-2557 - Xiaodong Yang, Junru He, Na Wang, Duojia Wang, Yuanxin Zhang, Yatong Zhong:

A Privacy-Preserving Aggregation Scheme Based on Dual-Masking and Threshold Signature in Computing Power Network. 2558-2565 - Haimiao Li, Changbo Tian, Runqing Zhang, Shiyi Yuan, Bo Sun:

ProfilE: Self-Supervised Communication Relationship Profiling for Imbalanced Smart Grid Anomaly Detection. 2566-2573 - Jiahao Chen, Yu Pan, Lin Wang, Yi Du:

Bad-PoseDiff: Pose-Guided Backdoor Triggering in Diffusion Models. 2574-2581 - Xiaomei Yan, Yong Li, Yan Zhu:

Fair Data Exchange Scheme with Cryptographic Commitment and Smart Contract for Data Trading. 2582-2587 - Wei Yu, Cheng Tan, Lvlin Ni, Chengyu Du, Cheng Liu, Qingbing Ji:

P3G: A Privacy-Preserving Password Guessing Model via Cross-Task Feature Sharing. 2588-2597 - Xin Ai, Yang Cao:

SATA: A Distributed Stealthy and Persistent Backdoor Attack via Trigger Association in Federated Learning. 2598-2605 - Songyan Zhang, Hanyu Lu, Hongfa Ding:

PrivFGL: Differentially Private Federated Graph Learning via Personalized Data Transformation. 2606-2611 - Peiliang Zuo, Yuexiang Wang, Zhen Fang, Xuegang Wang:

A Blockchain-Based Spectrum Allocation Scheme Based on Beneficial Consensus Mechanism. 2612-2621 - Ye Qin, Kexian Liu, Jianli Liu, Xiaolong Hu, Zejun Lan, Jianfeng Guan:

Learning to Co-Design Routing and Processing in Computing Power Networks. 2622-2631 - Lanai Huang, Winston Ellis, Sana Belguith:

Ghost Vehicle: A Game-Theoretical Attack Strategy Targeting CAV Platoons. 2632-2641 - Yangqi Liu, Xuemin Wang, Liang Chang, Heng Yang:

IAGNN: Mitigating Quantity and Topological Imbalance for Fair Graph Learning. 2642-2651 - Qingwen Han, Shiyu Sun, Jianmei Lei, Lingqiu Zeng, Yang Liu, Lei Ye, Kaiwei Fan:

GraphAss: Multi-dimensional dependency semantics graph-based Automobile software vulnerability detection method. 2652-2659 - Hangzhou Fei, Xiaobing Xiong, Hui Shu:

SPFuzz: Program-State-Aware Fuzzing for Mail Protocols. 2660-2669 - Xin Yu, Juan Xu, Xiaoxiao Zhang, Jian Lei:

A New Key Expansion Scheme for SM4 based on Sponge Construction. 2670-2675 - Jiafu Liu, YeDong, Yuqi Zhou, Jun Huang:

Improved Rsqrt for Faster Secure Neural Networks Inference. 2676-2682 - Zhengheng Li, Hui Xia, Rui Zhang, Mengyuan Song, Aoqi Ruan, Shaoqiang Wang:

GPEA: Grad-CAM-Guided Perceptibility-Reduced Ensemble Attack in Object Detection. 2683-2688 - Shengjia Chang, Baojiang Cui, Shaocong Feng:

BinFuse: Binary Code Similarity Detection via Lightweight Fused Semantic Embedding. 2689-2696 - Huaquan Yang, Shan Bian, Gongwei Weng:

Robust Recovery Method Against Malicious Face Swapping in Online Social Networks. 2697-2702 - Kunlong Jin, Youliang Tian, Lujia Shi:

FedProbe: Attacking Federated Model Ownership Verification via Fine-Grained Watermark Detection and Erasure. 2703-2710 - Chidan Zhu, Jingjing Hu, Yuanhang Sun, Yu Li:

Improving the SEU Reliability of TMR Designs Implemented on SRAM-Based FPGAs with Redundant Module Restructuring. 2711-2718 - Junfeng Tian, Tingting Jin, Ni Rui:

CLEK-HP: A certificate-less efficient key agreement scheme based on hybrid PUF in VANETs. 2719-2728 - Shuhan Xia, Jing Dai, Hui Ouyang, Yadong Shang, Dongxiao Zhao, Peipei Li:

CAHS-Attack: CLIP-Aware Heuristic Search Attack Method for Stable Diffusion. 2729-2734 - Yujie Lai, Huiyong Liu, Wei Zhang:

GVTMC: A Novel Cryptocurrency Mining Traffic Classification Method. 2735-2742 - Ninghui Zhang, Chun Long, Jing Li, Fan Yang, Yuhao Fu, Wei Wan, Haojie Nie, Xingbo Pan:

PPIA-MTL: Efficient Property Proportion Inference Attacks on Tabular Generative Models via Multi-Task Learning. 2743-2752 - Haowen Wu, Wei Ren, Yong Wang, Yan Zhang:

Ultra-Reliable Routing Strategy for Large-Scale Optical Free-Space Low Earth Orbit Satellite Networks. 2753-2758 - Mingjie Yu, Jiong Yu:

Hybrid Multi-granularity Reconstruction and Contrastive Learning for Graph Anomaly Detection. 2759-2765 - Minghe Zhang, Xuanyu Wang, Lihong Chen, Gang Liu:

A High-Quality Data-Driven Incentive Mechanism for Multi-Platform Mobile Crowdsensing. 2766-2773 - Xiao Ke, Song Yun:

WSDNet: A Dual-Branch Wavelet-Structured Network for Image Forgery Detection. 2774-2780 - Ahmed Mahfouz, Rawad Abdulghafor, Alaa A. K. Ismaeel:

Passkeys in Practice: An Empirical Evaluation of FIDO2/WebAuthn Compliance and Interoperability. 2781-2788 - Jinyang Zhang, Shengli Pan, Shanwu Chen, Anandarup Roy, Peng Li:

A Trustworthy and Efficient Inference Scheduling Scheme for Edge MoEs Using DRL. 2789-2794 - Xingxing Liao, Wei You, Jie Yang, Jian Tao, Runhan Feng, Xinsheng Ji:

5GC-PDA:A Novel Proactive Defense Architecture for Enhancing 5G Core Network Security. 2795-2802 - Shuo Wang, Alessandro Brighente, Valeria Loscri, Junqing Zhang, Mauro Conti:

Capodoglio: Tackling Multi-Armed Bandit Jamming Attacks. 2803-2810 - Ben Chen, Xingyu Yang, Hui Cui, Joseph K. Liu:

Asteroid X: A Decentralized Finance Platform for Mining Sectors. 2811-2817 - Zhenya Chen, Rongbin Yao, Chensheng Liu, Ming Yang, Xiaoming Wu, Wenting Wang:

A Cross-Layer Attribution Method Based on Cyber-Physical Coupling Under Load Redistribution Attack. 2818-2826 - Xin Tang, Haixin Chen, Siyu He, Yamin Yang, Luchao Jin:

Splicing Strategy based Chunk Level Deduplication Scheme for Cloud Storage. 2827-2834 - Bing Zhang, Guijuan Wang, Zhongyuan Yu, Anming Dong, Hongliang Zhang

:
Lattice-based Dynamic Privacy-preserving Cross-chain Payment Scheme. 2835-2842 - Jinhui Li, Guang Cheng, Zihan Chen:

Early Classification and Improved Performance: A Multi-Model Serial Encrypted Traffic Classification Framework. 2843-2851 - Ziming Wang, Liang Zhang, Hang Zhou, Haibin Kan, Jiheng Zhang:

RESA: RLWE-Based Efficient Secure Aggregation For Federated Learning. 2852-2859 - Guangyuan Liu, Shigong Long:

PIRL: A Robust and Privacy-Preserving Learning Method from an Information-Theoretic Perspective. 2860-2867 - Kaichuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng:

Log2Sig: Frequency-Aware Insider Threat Detection via Multivariate Behavioral Signal Decomposition. 2868-2876 - Qikang Fan, Jingdian Ming, Yiwen Gao, Yongbin Zhou:

Multi-Channel Attacks on Dilithium: Bridging Power Gaps with EM-Guided Synthetic Traces. 2877-2884 - Junxuan Lv, Qiwei Zhao, Hongbo Tang, Hang Qiu, Wei You, Yu Zhao:

FedDHKD: A Lightweight Federated Learning Framework Based on Dynamic Hierarchical Knowledge Distillation for 5G IoT. 2885-2893 - Felix Wruck, Maximilian Peisl, Michael Weiß:

Engine-Agnostic Evaluation of Container Isolation Characteristics. 2894-2903 - Xiaoya Cao, Zhenya Chen, Ming Yang, Xin Wang, Xiaoming Wu:

Zero Trust-Based Dynamic and Continuous Access Control for Mobile Devices. 2904-2910 - Qianli Zhao, Zhen Wang, Linlin Zong, Chao Jin, Xiaohuan Li:

HOT-SPT: Hierarchical Optimal Transport for Robust and Fair Cross-Domain Video Expression Recognition. 2911-2916 - Ye Feng, Siqi Lu, Liujia Cai, Xingyun Hu, Xinxin Wang, Yongjuan Wang:

PSI-TR-ABE: A Traceable and Policy-Hidden Attribute-Based Encryption Scheme for Medical Data Sharing. 2917-2926 - Shengqi Jin, Weihan Li, Zongyang Zhang:

Efficient Zero-Knowledge Proofs for Typical Non-Linear Functions in Machine Learning. 2927-2936 - Chunqing Yu, Chengxiang Tan, Zhishuo Zhang, Jiacheng Xu, Jianpeng Hu, Xiangyun Kong:

Clue Discovery based on Multi-modal Entity Alignment enhanced by Image Generation and Structure Embedding. 2937-2943 - Zihao Luo, Baojian Hua:

DeepLancet: Effectively Detecting Deep Learning Library Bugs via LLM-assisted Testcase Generation. 2944-2953 - Michael Eckel, Janik Gorbracht, Georgios Gkoktsis, Tobias Kaupat:

Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE. 2954-2965 - Yong Zeng, Jiaze Li, Hao Liu, Zhihong Liu, Jianfeng Ma:

Layered Website Fingerprinting Defense Against Adversarial Training. 2966-2971 - Juntao Zhang, Chensheng Liu, Xin Wang, Ming Yang, Xiaoming Wu:

An Autoencoder-Based Black-Box Adversarial False Data Injection Attack Against Smart Grid. 2972-2977 - Su Hang, Zhaozhong Guo, Maozhi Xu:

UC Secure Privacy-Preserving and Auditable Transaction System for Permissioned Blockchains*. 2978-2985 - Hao Yuan, Yuejun Liu, Jingdian Ming, Yongbin Zhou:

Diverse Fault Attacks on Dilithium and Variant Implementation: Skipping, Aborting and Zeroing. 2986-2993 - Jizhe Li, Yongjun Wang, Haoran Xu, Lin Peng, Muxin Xu, Tian Xia:

LLM-Guided Mutation Location Selection for Vulnerability-Aware JavaScript Engine Fuzzing. 2994-2999 - Xiaopeng Zhao, Zhusen Liu, Jiawei Qian:

Combining Evolutionary Learning and Window Method for Finding Short Addition Chains for Large Integers. 3000-3004 - Krzysztof Talalaj, Lukasz Krzywiecki, Marcin Zawada:

Privacy for AI Generated Images: Conditional Generative Adversarial Networks Trained Over Obfuscated Data. 3005-3010 - Yimin Wang, Qian Huang, Kaizhi Wu, Kai Guo:

LDFS: LLMs with Dynamic Few-Shot for Offensive Language Detection. 3011-3016 - Zichao Deng, Han Yu:

FedEdge: Federated Self-Supervised Graph Learning with Personalized Fine-Tuning for Node Classification. 3017-3023 - Yixuan Cao, Aniket Mahanti, Ranesh Naha

:
A Real-Time Defense Framework Using PPPO in Deep Reinforcement Learning for CyberBattleSim. 3024-3031 - Benshan Mei

, Wenhao Wang, Dongdai Lin:
VMPL-KMI: Protecting Kernel Module Integrity within Confidential VMs. 3032-3037 - Maysa Sinan, Mojtaba Shahin, Iqbal Gondal:

Validation of a Governance Framework Supporting Security Controls across Emerging Systems. 3038-3046 - Lina Ge, JianWei Zhai, Qinchun Su:

A Robust Federated Learning Framework Integrating Principal Component Analysis and Dual Detection Mechanisms. 3047-3052 - Yibin Zhou, Yunxiao Shi, Xiao Yang, Da Xiao, Gaolei Li, Jianhua Li:

HyBiGraph: Toward Multi-Order Malicious Encrypted Traffic Classification via Hyper-Bipartite Graph Fusion. 3053-3062 - Vincent Bittard, Rim Ben Salem, Ahmed Bouzid, Sara Imene Boucetta, Frédéric Cuppens, Nora Cuppens-Boulahia:

A Privilege Creep-Aware Role Mining Method for Enhanced Access Control Security. 3063-3071 - Sai Wang, Huijuan Lian, Lei Shi, Gaolei Li, Yan Cao:

Semantic-Graph-Indistinguishability: A Novel Approach to Location Privacy Protection Under Road Networks. 3072-3080 - Guorong Wang, Jinchuan Tang, Zehua Ding, Youliang Tian:

Robust Multi-Scale Gradient Estimation for Query-Efficient Black-box Adversarial Attack. 3081-3086 - Lexin Feng, Jiayin Wei, Youjun Lu, Fujian Feng:

DTAHF-Net: Domain-Trust Alignment and Hierarchical Fusion for Multimodal Fake News Detection. 3087-3096 - Osama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Bashair Alrashed, Ibrahim Haddadi

:
SecuRecNet-IoT: Adaptive Secure Reconfiguration and Session-Aware Communication in IoT Edge Networks. 3097-3102 - Rahul K. Patel, Puya Pakshad, Sumeet Batra, Shubhayan Das, Alapan Ghosh:

IEPIS: An Intelligent Endpoint Protection and Insight System. 3103-3110 - Jorge Marina-Metola, José María de Fuentes, Lorena González-Manzano, Luis Ibañez-Lissen:

Detecting Multi-Turn Jailbreak Attacks in Large Language Models via Linear Probes. 3111-3120 - Yifan Zhang, Kailong Zhu, Qian Chen, Zixiong Li, Yuliang Lu, Yingchun Chen:

DerandomPre: An LLM-based Stability Enhancement Method for Network Protocol Fuzzing. 3121-3130 - Ze Chai, Yijing Lin, Zhipeng Gao, Zhiqiang Xie, Dusit Niyato:

Proactive Federated Backdoor Unlearning via Two-Phase Optimization and State Replacement. 3131-3136 - Qingze Peng, Daifeng Li:

AdaptiveWatermark: Dynamic Watermarking for Large Language Models with Agent. 3137-3142 - Daniele D'Ugo, Saverio Giallorenzo, Simone Melloni:

Contrasting Crypto and Exfiltration Ransomware with Shamir's Secret Sharing Data Flooding. 3143-3151 - Xiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Junchao Fan, Xiaolin Chang:

GAPPO: Graph-Attention Enhanced Reinforcement Learning for Efficient Attack Path Planning. 3152-3157 - Louis Agnese, Xiaojie Lin, Guangsheng Yu, Xu Wang:

Fed-CMA: Federated Clustering and Matched Averaging for Personalized Intra-Vehicular Network Intrusion Detection. 3158-3163 - Abir Al-Ansari, Kristiaan D'Août, Valerio Selis

:
TrustIoT: Building Trust in Human-Thing Interactions for Healthcare Systems Using Machine Learning. 3164-3170 - Avinash Awasthi, Pritam Vediya, Hemant Miranka, Ramesh Babu Battula, Priyadarsi Nanda:

HiFi-XAI: A Fidelity-Aware, LLM-Powered Framework for Trustworthy Intrusion Detection. 3171-3176 - Mingjian Tang, Weiqi Wang, Shui Yu:

Incentive-Compatible Pricing for Truthful Data Sharing. 3177-3184 - Xin Liu, Anyang Qi, Lanying Liang, Dan Luo, Yuchen Zhang, Wei Ye, Baohua Zhang, Yu Gu, Gang Xu, Xiubo Chen:

Secure Computation Scheme for the Intersection Area of Polygons Resistant to Malicious Participants. 3185-3194 - Dunkai Mao, Lifeng Xi, Fujia Zhang:

Enhancing Data Security in RISC-V Embedded Systems: A Lightweight Architecture. 3195-3200 - Xiangyu Jiang, Yixiong Feng, Zhi-Wu Li, MengChu Zhou, Xuanyu Wu, Jianrong Tan:

Online Reliability Assessment of Nuclear Power Components via Mechanistic and Data-Driven Modeling. 3201-3206 - Yang Li, Meng Wang, Mengting Zhang, Zhixiong Zhang, Guangyin Zhang, Hanyu Li:

TrustSciAgent: Towards Rigorous and Trustworthy Agents for Scientific Research. 3207-3214 - Junhan Li, XiuBo Chen, Gang Xu:

Blockchain-Enabled Privacy-Preserving Medical Data Sharing with Verifiable Insurance Evaluation. 3215-3220 - Zhengqin Zhu, Junjie Song, Peiyan Pan, Yixiong Feng, Zhifeng Zhang:

Human-Machine Collaborative Cognition for Intelligent Operation of Cascade Filtration Systems: A Dynamic Decision Framework Based on Fuzzy Inference and Uncertainty Analysis. 3221-3225 - Chen Yucheng, Li Yang, Li Qiao, Yajiao Wang, Wang Meng, Hanyu Li:

From Survey to Application Vision: LLM Watermarking Techniques and Prospects in Scientific Scenarios. 3226-3231 - PeiYan Pan, ZhiFeng Zhang, Yixiong Feng, Zhengqin Zhu, Junjie Song, Jianrong Tan:

Optimization Design Method for Nets in Multi- Stage Filtration System of Nuclear Power Plant Using Cognitive Intelligence Techniques. 3232-3237 - Wei Li, Jianjun Li, Hui Shao, Junjie Li, Wei Zhang:

A Semantic-Aware Network Intelligence Framework for Anomaly Detection using Large Language Models. 3238-3242 - Can Zhang:

DPDA: Decentralized Identity-Based Privacy-Preserving Data Aggregation for AIoT. 3243-3249 - Ruoying Wang, Linghui Li, Xiaotian Si, Kaiguo Yuan, Zhaoyu Wang:

Adaptive Multi-Feature Hierarchical Framework for Generative Model Attribution. 3250-3257 - Mingyang Chen, Linghui Li, Zhaoyu Wang, Kaiguo Yuan, Bingyu Li:

DCARL: Decoupled-Curriculum for Adversarial Robustness Learning under Long-Tailed Distributions. 3258-3265 - Bingzhen Li, Zihan Wang, Pengfei Du, Yupeng Jiang:

OmniNova: A General Multimodal Multi-Agent Framework. 3266-3272 - Qian Miao, Hui Zhang, Weixin Wang, Yuanji Shi, Lihua Yang:

Transfer Learning based Fingerprint Database Reconstruction Scheme in Indoor Location Scenarios. 3273-3278 - Qianqian Zhu, Hui Zhang, Yuewei Zhang, Yuanji Shi, Shuyi Wang:

A Dynamic Low-cost 3D Indoor Localization Algorithm Based on Error Optimal Estimation. 3279-3284 - Changyuan Ji, Zongyan Li, Chen Yang, Hao Wang:

Resource Allocation and Optimization in Low-altitude D2D Communication Networks. 3285-3290 - Hanxiao Li, Hongmei Wang, Shuo Liu, Weilong Zhang:

MIMO Channel Modeling Based on Physics-Constrained Generative Neural Networks. 3291-3296 - Mengyao Zhang, Ding Mu, Zihan Wang, Na Fan:

Privacy Protection Method for 3D Trajectories Integrating Semantic Information. 3297-3302 - Ding Mu, Mengyao Zhang, Zihan Wang, Yexiong Shang:

3D trajectory personalization privacy protection method based on multi-feature classification and spatio-temporal attention. 3303-3308 - Tianle Li, Qingyu Liu, Peixi Peng:

Optimizing Spectrum Sharing in Low-Altitude Intelligent Networks: A Model-Based Reinforcement Learning Approach. 3309-3315 - Bingcheng Liu, Xiao Qian, Xiuxuan Shen:

CEE-MLIA: A Multi-Level Imbalance-Aware Framework for Contract Element Extraction. 3316-3321 - Linlin Chen:

Generating Structured BPMN Models from Smart Contracts Using LLMs. 3322-3327 - Haoxiang Chen, Ning Zhang, Jiayue Liu:

From Electronic Contracts to Smart Legal Contracts: A Template-Based Approach. 3328-3333 - Xinjian Li, Chang Wang, Yuwei Le, Yutong Wu, Hongwang Zhu, Jiaheng Wang, Jianjun Zhang:

Blockchain-Enhanced Random Access in Untrusted Wireless Networks: An Evolutionary Game Analysis. 3334-3340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














