Full Description
This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.
The 119 full papers included in these volumes were carefully reviewed and selected from 341 submissions. They are organized in the following topical sections:
Part I: Distributed and Network Security; ML/AI Security.
Part II: ML/AI Security; CyberSecurity.
Part III: CyberSecurity; Cryptography and Authentication.
Part IV: Cryptography and Authentication; Security and Optimization.
Contents
.- CyberSecurity.
.- XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Based on Traffic Analysis.
.- Causal-Driven Multi-Objective Grey Wolf Optimization Framework for Multidimensional Redundant IoT Traffic Intrusion Detection.
.- Comprehensive Commits Security Testing with Enhanced Multi-Target Directed Fuzzing.
.- FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks.
.- Clark: a Transferable APT Detection Framework via Self-Supervised Contrastive Learning.
.- Document Image Tampering Detection based on Multi-domain Feature Consistency.
.- CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT.
.- Prompting Large Language Models for Data-Flow Analysis: Addressing Common Errors for Better Reasoning.
.- SG-SCA: An Interpretable Side-Channel Analysis Model Based on Shapelet and Graph Attention Network.
.- RADBench: A Comprehensive Benchmark for Internet Routing Anomaly Detection.
.- Complementary Ensemble Empirical Mode Decomposition and Permutation Entropy-Empowered Network Traffic Anomaly Detection for Secure QUIC Communications.
.- Cryptography and Authentication.
.- A lightweight authentication protocol for resource constrained WBAN.
.- A Novel Multi-Graph Spatial-Temporal Graph Neural Network Model for Traffic Prediction.
.- A Social-Relationship and Geospatial-Aware Incentive Mechanism for Privacy-Preserving Mobile Crowdsensing.
.- An Intrusion Detection-Based Location Privacy Protection Algorithm for VANETs.
.- DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control.
.- Decentralized Role Rotation Privacy Protection in Federated Learning.
.- ECC-Based Certificate-less Aggregate Signatures Scheme for VANETs.
.- Efficient Privacy-Preserving and Verifiable Arbitrary Polygon Range Query in Cloud Computing.
.- ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation.
.- Privacy-Enhanced Multi-Modal Feature Fusion for E Commerce: A Novel Approach to Image and Text Retrieval.
.- Privacy-preserving Preselection for Face Identification Based on Packing.
.- Privacy-Preserving Probability Fingerprinting Scheme with Collusion Resistance for Relational Databases.
.- Protecting Medical Image Privacy by Using Chaos Encryption and Blockchain.
.- Revocable and Verifiable Key Aggregate Searchable Encryption for Flexible Data Sharing.
.- SAFE: A Fast Privacy-Preserving Scheme for Multi-Client Face Verification.
.- Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter.
.- Dynamic Dual-Anonymous Lightweight Certificateless Authentication Protocol for Social IoT-Assisted V2G.
.- HIDE: Anonymous Hop-by-Hop Identity Authentication Based on Dynamic Address Label Embedding.
.- Now Let's Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs.



