Frontiers in Cyber Security : 8th International Conference, FCS 2025, Guiyang, China, October 24-26, 2025, Proceedings (Communications in Computer and Information Science)

  • 予約

Frontiers in Cyber Security : 8th International Conference, FCS 2025, Guiyang, China, October 24-26, 2025, Proceedings (Communications in Computer and Information Science)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Hardcover:ハードカバー版/ページ数 780 p.
  • 言語 ENG
  • 商品コード 9789819595136

Full Description

The CCIS 2805, constitutes the refereed proceedings of the 8th International Conference on Frontiers in Cyber Security, FCS 2025 held in Guiyang, China, October 24-26, 2025, Proceedings.

The 31 full papers included in this book were carefully reviewed and selected from 75 submissions.

Contents

.-Applied Cryptography.

.- Threshold Signature-Based Roaming Framework Leveraging Blockchain Systems.

.-Strategic Analysis of 51% Attack in Mining Pools via Repeated Games.

.- A Quantum-Resistant Authentication Protocol for Power IoT Networks.

.- Verifiable Multi-level Delegatable Attribute-Based Proxy Re-encryption Scheme for Cloud Computing.

.- A Lattice-based Designated Verifier Signcryption Scheme.

.- A Lattice Based IBE Scheme for Automatic Key Update.

.- Multimedia Security and Application.

.- Temporal Knowledge Graph Representation Learning with Evolutional Representation and Attention Mechanism.

.- A Robust Audio Watermarking Algorithm Based on Adaptive Quantization Strategy and Feature Classification.

.-Temporal Knowledge Graph Reasoning Based on Path-aware Temporal Gating.

.-Multimodal Fake News Detection via Evidence Retrieval with Vision-Language Model.

.-Security Analysis of LWE/RLWE-based Diffie-Hellman-like Post-quantum Authenticated Key Exchange Protocols in the eCK Model.

.-MD-GCN: Multi-view Dependency-enhanced Graph Convolutional Network for Aspect-based Sentiment Analysis.

.- A Cloud Resource Scheduling Approach Based on Deep Reinforcement Learning.

.- AI Security.

.-Certificateless Offline/Online Signcryption for Lightweight Anonymous Authentication in VANETs.

.-A Multi-Modal Data Recommendation Model Based on CNN.

.-Handwritten Signature Verification based on Multimodal Fusion with Global Features.

.-A Quantum-Secure Certiffcateless Aggregate Signature Scheme for Emergency Communication.

.-Cross-Sample Inconsistency-Based Video Forgery Detection Using Graph Convolutional Networks.

.-Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training.

.-SPHINCS+ Based Certiffcation Scheme for Federated Learning Client Models.

.-Research on Integrated Adversarial Attack and Defense Method for Object Detection Models.

.-Privacy Protection.

.-Conditional Privacy-Preserving Authentication Scheme Using Anonymous Credentials.

.-T-DAC: Time-Driven Access-Controlled Cryptography for Streaming Data.

.-Privacy-Protected Classification of Sensitive Personal Information.

.-An Authenticated Certificateless Public Key Searchable Encryption Scheme.

.-Federated Learning Backdoor Attack Using Dynamic Parameter Adjustment and Collaborative Trigger Optimization.

.-Multi-UAV Task Scheduling Optimization Based on the Improved Genetic Algorithm.

.-Data Integrity Auditing Supporting Multi-Ownership Transfer in Cloud Storage.

.- Incentive-Driven Zero-Knowledge Proof-based.

最近チェックした商品