


default search action
27th ICICS 2025: Nanjing, China - Part II
- Jinguang Han

, Yang Xiang
, Guang Cheng
, Willy Susilo
, Liquan Chen
:
Information and Communications Security - 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, 2025, Proceedings, Part II. Lecture Notes in Computer Science 16218, Springer 2026, ISBN 978-981-95-3542-2
Blockchain and Cryptocurrencies
- Jialiang Fan, Qianhong Wu, Minghang Li, Decun Luo, Qin Wang, Bo Qin:

EquinoxBFT: BFT Consensus for Blockchain Emergency Governance. 3-20 - Chang Li, Binqin Lu, Wenyang Zhang, Kaixuan Yang, Huijuan Zhu:

fFuzz: A State-Aware Function-Level Fuzzing Framework for Smart Contract Vulnerabilities Detection. 21-38 - Chaofeng Zhuang, Junqing Gong, Zhili Chen, Haifeng Qian:

TraceBFT: Backtracking-Based Pipelined Asynchronous BFT Consensus for High-Throughput Distributed Systems. 39-59 - Kombou Victor

, Qi Xia
, Jianbin Gao
, Hu Xia
, Kuiche Sop Brinda Leaticia
, Anto Leoba Jonathan:
RADIAL: Robust Adversarial Discrepancy-Aware Framework for Early Detection of Illicit Cryptocurrency Accounts. 60-78 - Yang Shi

, Jintao Xie
, Minyu Teng, Guanxu Liu, Linhai Guo, Jiangfeng Li
:
Enhancing Private Signing Key Protection in Digital Currency Transactions Using Obfuscation. 79-99 - Mingming Huang, Xiaodan Zhang, Wei Mi, Huimei Liao, Yi Sun:

AnsBridge: Towards Secure Cross-Chain Interoperability via Anonymous and Verifiable Validators. 100-118 - Bohang Wei

, Yang Yang
, Shihong Xiong, Minghang Li
, Qianhong Wu
, Bo Qin
:
TrustBlink: A zkSNARK-Powered On-Demand Relay for PoW Cross-Chain Verification With Low Costs. 119-138 - Huibo Yang, Zhize Hao, Tao Liu:

R1-MFSol: a Smart Contract Vulnerability Detection Model Based on LLM and Multi-modal Feature Fusion. 139-158 - Shouchen Zhou

, Lu Zhou
, Yu Tao
:
No Place to Hide: An Efficient and Accurate Backdoor Detection Tool for Ethereum ERC-20 Smart Contracts. 159-177
System and Network Security
- Peng Zhang, Ao Duan, Xianglu Zou, Dongyan Qiu:

Batch-Oriented Element-Wise Approximate Activation for Privacy-Preserving Neural Networks. 181-197 - Jun Tao, Hao Zou:

Social-Aware and Quality-Driven Incentives for Mobile Crowd-Sensing with Two-Stage Game. 198-215 - Hai Liu, Maoze Tian, Yadong Peng, Hongye Peng:

A Distributed Privacy Protection Method for Crowd Sensing Based on Trust Evaluation. 216-235 - Chaoyue Li, Yongming Zhang, Xiaolong Xu:

DBG-LB: A Trustworthy and Efficient Framework for Data Sharing in the Internet of Vehicles. 236-254 - Nikolaos Fotos, Koffi Ismael Ouattara, Dimitrios S. Karas, Ioannis Krontiris, Weizhi Meng, Thanassis Giannetsos:

Actions Speak Louder Than Words: Evidence-Based Trust Level Evaluation in Multi-agent Systems. 255-273 - Sandro Pinto, Luís Cunha, Daniel Oliveira, Michele Grisafi, Emanuele Beozzo, Bruno Crispo:

Bridging the Interoperability Gaps Among Trusted Architectures in MCUs. 274-289
Security and Privacy of AI
- Yufeng Jiang, Jianghua Liu, Chenhao Xu, Cong Zuo, Lei Xu, Jian Lei:

A Dropout-Resilient and Privacy-Preserving Framework for Federated Learning via Lightweight Masking. 293-312 - Xuyang Zhang

, Hua Jin, Peiyuan Guo:
AFedGAN: Adaptive Federated Learning with Generative Adversarial Networks for Non-IID Data. 313-330 - Haocheng Kan, Yuesheng Zhu, Guibo Luo, Hanwen Zhang:

OTTER: Optimized Training with Trustworthy Enhanced Replication via Diffusion and Federated VMUNet for Privacy-Aware Medical Segmentation. 331-346 - Befoum Stephane Richard, Jianbin Gao

, Qi Xia
, Kombou Victor
, Eyezo'o Benjamin Fabien, Mulenga Mukupa Rossini
:
EAGLE: Ensemble Adaptive Graph Learning for Enhanced Ethereum Fraud Detection. 347-366 - Yuantong Li, Xiaofen Wang, Ke Zhang, Bo Zhang, Lei Zheng, Xiaosong Ding, Qing Xu:

BR-CPPFL: A Blockchain-Based Robust Clustered Privacy-Preserving Federated Learning System. 367-386 - Chaoyun Wang

, Kedong Yan
, Chanying Huang
:
Efficient Semi-asynchronous Federated Learning with Guided Selective Participation and Adaptive Aggregation. 387-402 - Xiuhua Wang

, Shikang Li
, Fengrui Fan, Shuai Wang
, Yiwei Li
, Yu Zheng
:
Improving Byzantine-Resilience in Federated Learning via Diverse Aggregation and Adaptive Variance Reduction. 403-423 - Yawen Huang, Huaicong Zhang:

Hierarchical Recovery of Convolutional Neural Networks via Self-embedding Watermarking. 424-441 - Hao Lin, Xiaoming Hu, Shuangjie Bai, Yan Liu:

Personalized Federated Learning Algorithm Based on User Grouping and Group Signatures. 442-459
Machine Learning for Security
- Yuhan Tao, Danwei Chen:

SPCD: A Shot-Based Partial Copy Detection Method. 463-481 - Yong Ding, Chi Zhang, Shijie Tang, Changsong Yang, Hai Liang:

Bayesian-Adaptive Graph Neural Network for Anomaly Detection (BAGNN). 482-500 - Bektemir Saydiev, Xiaohui Cui, Umer Zukaib:

UzPhishNet Model for Phishing Detection. 501-512 - Xinzheng Liu, Wangqun Lin, Zhaoyun Ding:

CyberNER-LLM: Cyber Threat Intelligence Named Entity Recognition With Large Language Model. 513-530 - Xuebo Qiu, Mingqi Lv, Tieming Chen, Tiantian Zhu, Qijie Song:

Provenance-Based Intrusion Detection via Multi-scale Graph Representation Learning. 531-549 - Jiang Luo, ShaoHua Qin, Zhe Wang:

SADGA: A Self Attention GAN-Based Adversarial DGA with High Anti-detection Ability. 550-567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














