


default search action
3rd DSPP 2025: Xi'an, China - Part I
- Xiaofeng Chen

, Haibo Hu
, Ding Wang
:
Data Security and Privacy Protection - Third International Conference, DSPP 2025, Xi'an, China, October 16-18, 2025, Proceedings, Part I. Lecture Notes in Computer Science 16176, Springer 2026, ISBN 978-981-95-3181-3
AI and System Security
- Shengyan Huo, Zhonghua Yang, Xixiang Lyu, Jing Ma:

Boosting Transferability of Adversarial Attacks On Vision Transformer. 3-23 - Haolang Feng, Yuling Chen, Hui Dou, Rou Zhou, Long Chen:

DMD: Boosting Adversarial Transferability via Dynamic Momentum Decay. 24-37 - Jialiang Dong, Zihan Ni, Willy Susilo

, Siqi Ma:
Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes. 38-56 - Yongxin Zhao, Chundong Wang, Erkang Zhao, Xiangtian Zheng, Hao Lin:

PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory Publishing Framework for Trustworthy AI Systems. 57-75 - Hongyu Yang, Jingchuan Luo, Xiang Cheng:

A Code Vulnerability Detection Method Integrating Pre-trained Model and Graph Neural Network. 76-84
Blockchain and Related Technologies
- Xudong Zhong, Haibo Tian:

Covert Channels in Bitcoin: Concealing Senders via Transaction Behavior Mimicry. 87-104 - Shengyi Lin, Longshen Huang, Qi Chen, Guoyu Yang:

Hash Time-Locked Contract Scheme Based on Enclave-Based Agent and Stealth Addresses. 105-122 - Yafei Liu, Yuling Chen, Bo Li, Yuxiang Yang, Taiyan Chen:

Smart Contract Ponzi Detection via Contract Transaction Graph. 123-139 - Jinze Du, Chundong Wang, Lihai Nie:

Evading AI-Based Detectors: A Hybrid Covert Communication Method Based on Ethereum Transaction Amount and Address. 140-157 - Wenhan Li, Guokun Yang, Qi Chen, Guoyu Yang:

Hierarchical Byzantine Consensus for Election Security. 158-175 - Md Amin Azad, Weizhi Meng, Xiaojiang Du:

Towards Blockchain-Enabled Cybersecurity Risk Assessment for Cyber-Ship Systems. 176-195 - Mengjiang Liu, Qianhong Wu, Haibin Zheng:

Spectrum Resources Privacy-Preserving Allocation and Certificate Management Technology Based on Blockchain. 196-213 - Zhihui Ke, Chengxiang Xia, Qi Chen, Hai Jiang:

A Blockchain-Based Framework for UAVs in an Asynchronous Network Environment. 214-223 - Qinghe Duan, Wei Luo, Haochen Wang, Gang Han, Yang Li:

BCDAC: Efficient Blockchain-Based Cross Domain Access Control Scheme. 224-241
Privacy Preserving/Enhancing Technologies
- Xiangyang Wang, Xiangyi Fang, Wei Luo, Gang Yi, Jiarui Zhang, Biwen Chen:

An Efficient Private Signaling with Function Secret Sharing. 245-261 - Yu Yan, Jun Ye:

Secure and Efficient Multi-dimensional Task Matching in Spatial Crowdsourcing. 262-279 - Tengyu Ma, Jun Ye:

PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data Sharing and Efficient Aggregation. 280-293 - Peiming Xu, Pu Yin, Huan Xu, Chao Hong, Zhihong Liang:

Efficient Ranking, Order Statistics, and Sorting Under (2, 2)-Threshold Paillier. 294-307 - Zhaozhong Yuan, Yun He:

Personalized Secure Anonymous Traceability Mechanism with Pseudo-Random Hopping of Dynamic ID. 308-317 - Zhicheng Li, Jian Xu, Nan Zhang, Teng Lu, Peijun Li, Nian Wang, Qiuyue Wang:

A Fully Homomorphic Encryption-Based KNN Classification Scheme for Electric Vehicles Data. 318-327 - Lan Ma, Xiaodong Li, Anxu Fu, Yuan Cui, Yimeng Dou, Ruoyun Zhao, Li Guan:

A High-Precision and Scalable Location Privacy Query System Based on FHE. 328-338
Cryptographic Primitives
- Yiru Sun, Baodong Qin, Zhenwu Guo, Wen Gao:

Secure Non-interactive Decision Tree Evaluation via Fully Homomorphic Encryption. 341-358 - Chen Li, Fangguo Zhang:

Strong Designated-Verifier zk-SNARKs. 359-373 - Hao Lei, Fuyu Liu, Wenbin Chen, Peiyan Wu:

Short Lattice-Based Linearly Homomorphic Signatures in the Standard Model. 374-393 - Jan Wolski, Miroslaw Kutylowski:

Kleptographic Fountain - Leakage via a Binary Erasure Channel. 394-411 - Hanyu Wei, Zhiwei Chu, Wenqian Li, Wenyu Wang, Jian Weng, Zhenfeng Zhang, Jingqiang Lin, Zhe Liu, Yunlei Zhao:

Efficient Implementation of NTRU-Based Key Encapsulation Mechanism on Embedded Platform. 412-431 - Yuchen Zou, Hongbo Li, Pingbin Luo, Qiong Huang:

An Efficient Designated-Server Public-Key Encryption Scheme with Keyword Search Based on Lattices. 432-440
Privacy-Aware Federated Learning
- Rou Zhou, Yuling Chen, Hui Dou, Haolang Feng, Long Chen:

Personalized Federated Learning with Adaptive Weight Clustering. 443-458 - Hongjie Luo, Yuling Chen, Hui Dou, Junyu Zhu, Haonan Zhan:

FedVoD: A Robust Federated Learning Defense Strategy Against Hybrid Byzantine Attacks. 459-473 - Xuezhi Liu, Fuan Xiao, Zhenxin Zhang, Lang Li:

A Lightweight Data Leakage Defense Mechanism for Federated Learning Based on Stochastic Gradient Masking. 474-484 - Zhiheng Sun:

PHV-FL: Personalized Hierarchical Verifiable Federated Learning Scheme for Maritime Target Detection. 485-504
AI-based Security Applications and Technologies
- Teng Li, Wei Qiao, Yebo Feng, Jiahua Xu, Paolo Tasca, Weiguo Lin, Zexu Dang, Zhuo Ma, Jianfeng Ma:

Chaos: Robust Spatio-Temporal Fusion for Generalizable APT Provenance Tracing. 507-524

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














