


default search action
21st Inscrypt 2025: Xi'an, China - Part II
- Rongmao Chen

, Robert H. Deng
, Moti Yung
:
Information Security and Cryptology - 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II. Lecture Notes in Computer Science 16409, Springer 2026, ISBN 978-981-95-6202-2
Secure Multi-party Computation
- Kexin Gao, Shujiao Cao, Rui Xue:

Quantum-Computation Classical-Communication Commitments from SZK-Hardness. 3-22 - Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Li Duan, Zhen Gu, Jianling Sun, Yuan Hong:

Concretely Efficient Constructions for Differentially Private Set Intersection. 23-44 - Peijun Zhao, Lin Liu, Shaojing Fu, Yuchuan Luo:

MSFS: Maliciously Secure 3-Party Feature Selection via Mutual Information. 45-65 - Zhaoyi Liu, Huijie Yang, Jian Shen, Jianfei Sun:

Adaptive Batched K-out-of-N Oblivious Transfers Extension. 66-84 - Kexin Qiao, Mengyu Chang, Junjie Cheng, Changhai Ou, An Wang, Liehuang Zhu:

Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints. 85-106
Anomaly Detection Methodologies and Models
- Lixia Xie, Yazhou Ning, Hongyu Yang, Youwen Zhu, Huiling Hu, Xiang Cheng:

Anomaly Detection for ADS-B Data Based on KAN-LSTM. 109-124 - Hanlei Wang, Yanqing Yang, Jiafei Dong:

Network Intrusion Detection Method Based on Multi-scale Feature Clustering and Improved Honey Badger Algorithm. 125-142 - Haojie Shi, Yong Wang, Lin Zhou:

SAGE: Spatiotemporal Feature Fusion for Anomaly Detection in Multivariate Time Series. 143-156 - Xinxin Wen, Xianfeng Guo, Xinyue Yan, Jiaxi Li, Hongyi Li:

MoE-CNN with Dynamic Feature Selection and CSAM for Network Anomaly Detection. 157-173 - Minhua Su, Jia-Nan Liu, Kai He, Jia-Si Weng, Anjia Yang, Xueqiao Liu, Jian Weng:

PP-MTAD: Privacy-Preserving and Efficient Multivariate Time Series Anomaly Detection. 174-194 - Hongyi Guo, Kun Yang, Kui Ren:

LogWhisperer: Multi-log Semantic Similarity Analysis Based Intelligent Vehicle Anomaly Detection Without Log Template. 195-214 - Sourabh Choudhary, Chunqiang Hu, Syed Murtoza Mushrul Pasha, MD Tanvir Islam, Rashedin Islam, Himo Arnob Barua:

An Early Detection of Risky Crowd Dynamics Scheme Based on Motion Entropy and Scene Semantics. 215-234 - Quan Li, Yuhong Li:

Enhancing Explainability in X-IDS Through Counterfactuals. 235-252 - Yuancheng Xie, Zhaoxin Zhang, Ning Li:

What Interferes with the Accurate Detection of Origin Hijacking Anomalies? 253-271
Network Security and Traffic Analysis
- Zhentao Long, Pengfei Wu, Kai Zhang, Junqing Gong, Jianting Ning:

Verifiable and Privacy-Preserving Deep Packet Inspection for Multiple Rule Service Providers. 275-295 - Chaoqun Guo

, Dalin Zhang:
Towards Adaptive Network Defense: A Self-evolving Threat Detection Framework. 296-312 - Jinchuan Liu, Shuaishuai Tan, Jiaxiong Chen, Zehua Zhang, Qiannan Lin, Zhaoyan Chen, Junhang Fu:

Early Detection of Malicious Traffic Based on Graph Modeling and Spatio-Temporal Attention Approach. 313-331 - Kun Jia, Haizhen Gao, Jiyun Chen, Jiayin Qi:

Revealing the Frailty of Static Benchmarks: The DyNA-IDS Framework for Concept Drift Adaptation in Time-Series Network Intrusion Detection. 332-348 - Xincheng Tang, Jiahao Liu, Jinrong Chen, Yi Wang, Rongmao Chen:

iSSH: Enabling In-Flight SSH Traffic Inspection Without Key Escrow. 349-368 - Xinyu Wei, Yuewu Wang, Lingguang Lei, Peng Wang, Chunjing Kou, Siyuan Ma:

Tracing Your Roots: Exploring the Security Issues of Root Certificates in Android TLS Connections. 369-389 - Yuxiang Shen, Wei Wang, Shushang Wen, Yu Fu, Yunhao Jia, Jingqiang Lin:

Exploring the Root Store Usage in TLS-Based Applications. 390-409 - Chaofeng Zhuang, Haifeng Qian:

LSDBFT: A Loose DAG-Based Asynchronous BFT Consensus Algorithm with Fair Ordering. 410-430 - Qiyuan Gao, Qianhong Wu, Junxiang Nong, Qi Liu:

FRanCS: A Fair and Randomized Anonymous Network Circuit Selection Mechanism with Blockchain. 431-447 - Zuoyu Qiu, Mingwei Zhan, Xianwen Deng, Zhi Xue, Yijun Wang, Ruijie Zhao:

Robust Training of Efficient Traffic Classifier with Noisy Labels. 448-466 - Xiangbin Wang, Qingjun Yuan, Yongjuan Wang, Yu Yan, Xiangyu Wang, Chunxiang Gu:

A Multimodal Asynchronous Federated Learning Approach for Encrypted Traffic Classification. 467-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














