- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the 20th International Conference on Information Security Practice and Experience, ISPEC 2025, held in Chengdu, China, during November 7-9, 2025.
The 27 full papers and 8 short papers included in these volumes were carefully reviewed and selected from 72 submissions. They are organized in the following topical sections: Federated Learning; Cryptography and Security Protocols; Cybersecurity and Intrusion Detection; Multimedia Security and Side-Channel Attacks; Privacy Protection and AI Security.
Contents
.- Federated Learning.
.- Secure Aggregation Scheme for Federated Learning with Bilateral Verification in the Internet of Vehicles.
.- A Personalized Federated Matrix Decomposition Recommendation Algorithm Based on Meta-Distillation.
.- Critical Neuron-Based Backdoor Defense for Federated Learning: A Combined Dropout and Local Outlier Factor Approach.
.- A Study on Free-Rider Detection Mechanism for a Fair Federated Learning-Based Intrusion Detection System.
.- A Reputation-Based Dynamic Aggregation Node Selection Method for Federated Learning.
.- Cryptography and Security Protocols.
.- Publicly Verifiable Multi-server Homomorphic Secret Sharing.
.- Meet-in-the-Middle Preimage Attacks with Multi-Match on ASCON-XOF.
.- Mixderive A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha.
.- A New Cryptanalytic Technique on Bit-Oriented Stream Ciphers and Application to ACORN v3.
.- A novel S-box construction technique based on the improved genetic algo-rithms through 2N-round searching.
.- Towards a Lattice-Based Non-Interactive Aggregate Signature Scheme Following the Fiat-Shamir with Aborts Paradigm.
.- Distributed Key Generation for SM2 and Its Applications to Threshold Encryption.
.- Cybersecurity and Intrusion Detection.
.- Zero-recollecting Mobile-app Identification over Drifted Encrypted Network Traffic.
.- An RPKI Certificate Validator for Formal Correctness.
.- Secure and Efficient File De-Duplication in Cloud Storage Using Checksums.
.- Blockchain-Based Real Estate Contract Authentication System for the Ejar Platform.
.- Traceable Multi-signature Scheme with Distributed Combiners and Lightweight Setup for Accountable Blockchain Transactions.
.- APT Attack Detection with Heterogeneous Provenance Graph and Adversarial Knowledge of Tactics, Techniques, and Procedures.
.- Multimedia Security and Side-Channel Attacks.
.- Research on image-based vulnerability detection of embedded firmware.
.- Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN.
.- Research on Video Steganography Based on Optical Flow Perception and Discrete Wavelet Transform.
.- Self-Supervised CNN for Video Double Compression Detection via Artifact Prediction.
.- Privacy Protection and AI Security.
.- Adversarial Defense via Clean-Sample Guided Adaptive Overlapping Patch for Traffic Sign Recognition Systems.
.- NIDS-GPT :A new GPT-based model for anomaly data package detection.
.- Authenticated and Incremental Single-Server Private Information Retrieval.
.- A Fully Anonymous Authentication Scheme with Cryptographic Reverse Firewalls in Vehicle-to-Grid Networks.
.- Enhancing FIDO2 Authentication Security through Markov Decision Process-Based Risk Assessment.
.- Assessing the Security of Vibe Coding: Baseline vs. Security-Oriented Prompts in LLM Code Generation.



