Full Description
This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.
The 119 full papers included in these volumes were carefully reviewed and selected from 341 submissions. They are organized in the following topical sections:
Part I: Distributed and Network Security; ML/AI Security.
Part II: ML/AI Security; CyberSecurity.
Part III: CyberSecurity; Cryptography and Authentication.
Part IV: Cryptography and Authentication; Security and Optimization.
Contents
.- Cryptography and Authentication.
.- Optimized Entanglement Routing for Enhanced Quantum Key Distribution Performance in Quantum Networks.
.- Att-SFI: Attestable software sandboxing with control flow integrity.
.- A Blockchain-based Four-factor Authentication and Key Agreement Protocol for Wireless Medical Sensor Networks.
.- A Re-authentication Scheme based on Blockchain and Reinforcement Learning.
.- Security and Optimization.
.- A Hybrid Adaptive Large Neighborhood Search for Secure and Efficient Single School Routing Problem.
.- A Loop Elimination Method Based on Vector DSP Processor with Immediate Addressing Incorporation.
.- A Maximizing Duty-Cycle network Lifetime Cooperative Routing algorithm in a Smart Community Scenario.
.- A Safety-Optimized Two-Stage Algorithm for Rural School Bus Route Planning with Heterogeneous Fleets and Mixed Loads.
.- An Energy-Aware Scheduling Algorithm for Multi-period Parallel Applications on Heterogeneous Systems.
.- DF TransNet: Dual-channel Fusion Transformer for Image Deraining.
.- DRLPO: A Deep Reinforcement Learning Distributed Partial Offloading Scheme for Fog Computing Networks.
.- BMI: A Bidirectional Spatio-Temporal Selective State Space Model for Data Imputation.
.- Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization.
.- More Bang for Your Buck: Gaining Collateral Benefit from Partial ROV Deployment.
.- On Analyzing SSO Permissions Across Web and Android Platforms.
.- Replication-Based Fault-Tolerant Scheduling Algorithm for Heterogeneous Real-Time Systems.
.- Research on Mixed-precision Optimization Compilation Methods for Loop Programs.
.- ReForGe: A Fusion Model with Recursive Feature Engineering for PdM of Aircraft Engines.
.- Real-World Image Dehazing via Degradation Modeling, Spectral-Spatial Fusion, and Prior Guidance.
.- The Decision of Monotonic Automata.
.- A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games.
.- Investigating How Trading Patterns and Twitter Impact the CryptoPunks NFT Market.
.- A Cyber Threat Intelligence Entity Relation ExtractionMethod Based on Improved OneRel Model.
.- Dependency Tree-based Multi-Task Learning for Extracting Process Models in Safety Management.
.- Joint Beamforming and Reflection Design for Physical Layer Security in RIS-Assisted Integrated Sensing and Communication Systems.
.- OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies.
.- CCGCRN: Cluster and Completion Graph Convolution Recurrent Network for Incomplete Traffic Flow Forecasting.
.- AquaCrossNet: An Underwater Cross-Granularity Complementary Segmentation Network.
.- When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset.



