


default search action
CSS 2025: Hangzhou, China
- Yang Xiang

, Jian Shen:
Cyberspace Safety and Security - 15th International Symposium, CSS 2025, Hangzhou, China, July 4-7, 2025, Proceedings. Lecture Notes in Computer Science 16195, Springer 2026, ISBN 978-981-95-3550-7 - Yating Guo, Yanbo Yang, Lili Gao, Jiawei Zhang, Jianfeng Ma, Yuqing Mao:

DSS Scheme for Anti-malicious User's Queries Based on Blockchain. 1-14 - Qingshui Xue, Sida Fan, Mengyao Shi:

Internet of Vehicle Privacy Protection Solution Based on Blockchain and Zero Knowledge Proof. 15-31 - Shanchuan Pang, Quanrun Li, Hu Ma, Jiaming Wen:

A New Asymmetric Three-Party Key Agreement Protocol Based on Secure Multiparty Computation. 32-44 - Boyuan Ye, Xiaofei Zhang, Yu Cao, Xiangshang Gao, Shengchao Li:

TCAu: Time-Controllable Air-Space-Ground Authentication. 45-58 - Xuechun Mao

, Xiaqing Zhou, Zengyou Zhang, Ying Chen
:
A NIZK-Based Linkable Ring Signature Scheme for Anonymous Blockchain System on Lattice. 59-73 - Cong Shen

, Guofeng Zhang
, Yue Wang
:
CP-ABZP: A CP-ABE Cross-Chain Privacy Protection Scheme Combined with Zero-Knowledge Proof. 74-88 - Peng Wang, Guofeng Zhang

, Yue Wang
:
A Novel Dual-Layer Access Control Model Based on Blockchain for the Case-Involved Property Management. 89-104 - Kaifa Zheng, Jiayi Liu, Shuai Ou, Zhen Xu, Xu Wu, Tiejun Wu:

MUSES: Secure Multi-user Encrypted Speech Search in Cloud-Edge-End Environments. 105-119 - Zhe Xia, Huxin Qin, Xin Duan, Rui Su, Sha Wu:

Secure and Effective Key Management for Vehicle Ad Hoc Networks. 120-136 - Yizhen Hua, Jiangtao Li

, Yufeng Li
:
Privacy-Preserving Machine Learning Using Functional Encryptions for Multiple Models with Constant Ciphertext. 137-151 - Chunfei Pan, Lei Zhou

, Longxia Huang
, Jiajia Chen
, Kang Zhang
, Anmin Fu
:
A Privacy-Preserving Delegable Auditing Scheme with Edge-Assisted Deduplication in IoT. 152-167 - Lei Zhou

, Chunfei Pan, Tian Wang
, Zhenzhu Chen
, Xiao Yang
, Anmin Fu
:
A Multi-KGC Certificateless Anonymous Cloud Sharing Scheme with Threshold-Based Traceability. 168-183 - Yilei Wang, Yan Lv, Guanyu Jiang, Bohan Li, Guangshun Li, Baopeng Ye:

A Differential Privacy Approach to Optimization for Protecting Large Models. 184-195 - Shihan Fang, Jingguo Bi, Yan Gao, Haipeng Peng:

Unifying Physical-Layer Security and Post-quantum Cryptography: An Optimized Authentication Encryption Protocol. 196-210 - Tao Zhang, Huijie Yang, Wenying Zheng, Lingling Wang, Shan Jin:

Anonymous Batch Authentication and Key Agreement for Internet of Things. 211-223 - Jiaqi Qi, Xiaoying Jia, Siyuan Shen, Lingzhu Li:

A Lightweight Privacy-Preserving kNN Query Framework via Secret Sharing in Cloud Computing. 224-235 - Jianqiao Liu, Xiaoyong Kou, Wei Yang, Dekun Liu, Gongxuan Zhang:

BiLSTMTimeGAN: Enhancing Side-Channel Attacks Through Temporal Data Augmentation. 236-251 - Gang Wang, Yunpeng Gao, Yi Chen, Peng Wang, Yong Ding:

An Encrypted Anomaly Traffic Detection Method Integrating Adversarial Training and Multi-scale Contrastive Learning. 252-269 - Jiahe Ji, Wei Kong, Yang Liu:

MGtest: Python Coverage-Guided Model-Level Fuzzing for DL Frameworks. 270-284 - Yi Yin, Xiaofan Liang, Lijia Feng, Hongmei Song:

Collaborative Physical Layer Authentication for Vehicular Networks Based on Dempster-Shafer Evidence Theory. 285-300 - Wenyu Zhen, Minhuan Huang, Xiang Li, Yuanping Nie, Lang Chu, Yuxian Wan:

A Survey of Kernel Fuzzing. 301-315 - Jianhong Zhang, Qi Li:

Federated Learning Against Dynamic Mixed Poisoning Attack and Defense. 316-331 - Aniello Castiglione

, Lucia Cimmino
, Michele Nappi
, Matteo Polsinelli
, Carlo Sorrentino:
Robust Fake Image Detection via Incremental Training of Siamese Neural Networks. 332-345 - Carmen Bisogni, Aniello Castiglione, Maddalena Migliaccio, Annalaura Miglino, Michele Nappi, Chiara Pero:

Advancing Deepfake Detection Through Head Pose Estimation on New-Generation Datasets. 346-361 - Jianyu Wang, Mengya Lei, Zhen Fan, Mingwu Zhang:

A Verifiable and Privacy-Preserving Credit Risk Prediction Under Secure Neural Network. 362-376 - Gang Qu, Liang Zhang, Hongjia Liu:

Security Assessment in Optical Networks: A Path Graph-Based Framework for Attack-Induced Fault Diagnosis. 377-390 - Jingxin Wang, Ling Zhang, Pengquan Shang, Xuanye Chen, Junhua Wu, Yilei Wang:

Machine Learning Model Construction and Multi-dimensional Evaluation for Pop-Up Text Sentiment Analysis. 391-403 - Yutong Chu, Shijia Hong, Huijie Yang, Tianqi Zhou:

Enhancing Double Ratchet Algorithm with Pre-Shared Key Mechanism and Optimal KDF Selection. 404-420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














