researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2024
2025
2026
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Bo Li
C. V. Ravikumar
Chundong Wang
Chunhua Su
Fangguo Zhang
Guoyu Yang
Haibo Tian
Haolang Feng
Hui Dou
Jian Xu
Joonsang Baek
Jun Ye
K. Sathish
Long Chen
Pei-Gen Ye
Pengyu Chen
Qi Chen
Rou Zhou
Willy Susilo
Yuling Chen
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
blockchain
china
data
detection
efficient
encryption
federated
framework
key
learning
networks
personalized
preserving
privacy
protection
scheme
secure
security
via
DSPP (1) (dspp)
Editions
Publications
Viewing Publication 1 - 85 from 85
2026
Data Security and Privacy Protection - Third International Conference, DSPP 2025, Xi'an, China, October 16-18, 2025, Proceedings, Part I
Xiaofeng Chen 0001
,
Haibo Hu 0001
,
Ding Wang 0002
, editors,
Volume 16176 of
Lecture Notes in Computer Science
, Springer,
2026.
[doi]
Data Security and Privacy Protection - Third International Conference, DSPP 2025, Xi'an, China, October 16-18, 2025, Proceedings, Part II
Xiaofeng Chen 0001
,
Haibo Hu 0001
,
Ding Wang 0002
, editors,
Volume 16177 of
Lecture Notes in Computer Science
, Springer,
2026.
[doi]
2025
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II
Xiaofeng Chen 0001
,
Xinyi Huang 0001
,
Moti Yung
, editors,
Volume 15216 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I
Xiaofeng Chen 0001
,
Xinyi Huang 0001
,
Moti Yung
, editors,
Volume 15215 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Chaos: Robust Spatio-Temporal Fusion for Generalizable APT Provenance Tracing
Teng Li 0003
,
Wei Qiao
,
Yebo Feng
,
Jiahua Xu 0002
,
Paolo Tasca
,
Weiguo Lin
,
Zexu Dang
,
Zhuo Ma 0001
,
Jianfeng Ma 0001
.
dspp 2026
:
507-524
[doi]
Towards Blockchain-Enabled Cybersecurity Risk Assessment for Cyber-Ship Systems
Md Amin Azad
,
Weizhi Meng
,
Xiaojiang Du
.
dspp 2026
:
176-195
[doi]
Robust Ownership Verification in Large Language Models via Equivalent Neuron Pair Encoding
Zhuorong Chen
,
Pei-Gen Ye
.
dspp 2026
:
197-206
[doi]
FreMark: Frequency-Domain Watermark Embedding in Quantized LLMs
Pengyu Chen
,
Ziyu Ding
,
Yaqi Wu
,
Peigen Ye
.
dspp 2026
:
207-220
[doi]
Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes
Jialiang Dong
,
Zihan Ni
,
Willy Susilo
,
Siqi Ma
.
dspp 2026
:
38-56
[doi]
Evading AI-Based Detectors: A Hybrid Covert Communication Method Based on Ethereum Transaction Amount and Address
Jinze Du
,
Chundong Wang
,
Lihai Nie
.
dspp 2026
:
140-157
[doi]
BCDAC: Efficient Blockchain-Based Cross Domain Access Control Scheme
Qinghe Duan
,
Wei Luo
,
Haochen Wang
,
Gang Han
,
Yang Li
.
dspp 2026
:
224-241
[doi]
SemBits: Multi-bit Semantic Watermarking with Sentence-Level Hashing for LLMs
Xiangyu Feng
,
Pei-Gen Ye
.
dspp 2026
:
183-196
[doi]
DMD: Boosting Adversarial Transferability via Dynamic Momentum Decay
Haolang Feng
,
Yuling Chen
,
Hui Dou
,
Rou Zhou
,
Long Chen
.
dspp 2026
:
24-37
[doi]
Attacks on Implementations of Lindell 17 and Its Variants
Jianhong He
,
Wenping Ma
.
dspp 2026
:
118-136
[doi]
An Efficient Explainability Framework for Graph Neural Networks
Dehan Hu
,
Chenyang Chen
,
Xiaoyu Zhang
.
dspp 2026
:
69-77
[doi]
Post-quantum Privacy-Preserving Smart Meter Data Collection Scheme from Coding
Yixuan Huang
,
Fangguo Zhang
.
dspp 2026
:
81-98
[doi]
Boosting Transferability of Adversarial Attacks On Vision Transformer
Shengyan Huo
,
Zhonghua Yang
,
Xixiang Lyu
,
Jing Ma
.
dspp 2026
:
3-23
[doi]
A Blockchain-Based Framework for UAVs in an Asynchronous Network Environment
Zhihui Ke
,
Chengxiang Xia
,
Qi Chen
,
Hai Jiang
.
dspp 2026
:
214-223
[doi]
Short Lattice-Based Linearly Homomorphic Signatures in the Standard Model
Hao Lei
,
Fuyu Liu
,
Wenbin Chen
,
Peiyan Wu
.
dspp 2026
:
374-393
[doi]
A Fully Homomorphic Encryption-Based KNN Classification Scheme for Electric Vehicles Data
Zhicheng Li
,
Jian Xu
,
Nan Zhang
,
Teng Lu
,
Peijun Li
,
Nian Wang
,
Qiuyue Wang
.
dspp 2026
:
318-327
[doi]
Strong Designated-Verifier zk-SNARKs
Chen Li
,
Fangguo Zhang
.
dspp 2026
:
359-373
[doi]
Security Weaknesses in ISO 15118-Based CCS2 Charging
Xian Li
,
Sheng Wen
,
Yang Xiang
.
dspp 2026
:
163-180
[doi]
Hierarchical Byzantine Consensus for Election Security
Wenhan Li
,
Guokun Yang
,
Qi Chen
,
Guoyu Yang
.
dspp 2026
:
158-175
[doi]
A Key Derivation Tree-Based Encryption and Verification Scheme for EV Data Auditing
Zhicheng Li
,
Jian Xu
,
Fan Wu
,
Aokang Qiao
,
Xiaomin Wu
,
Xiangliang Fang
.
dspp 2026
:
153-162
[doi]
Hash Time-Locked Contract Scheme Based on Enclave-Based Agent and Stealth Addresses
Shengyi Lin
,
Longshen Huang
,
Qi Chen
,
Guoyu Yang
.
dspp 2026
:
105-122
[doi]
Dual-FER: A Dual-Network Approach to Facial Expression Recognition with Enhanced Generalization
Junwei Liu
,
Qingwu Fu
,
Hongyang Yan
,
Shaowei Wang 0003
.
dspp 2026
:
3-13
[doi]
A Lightweight Data Leakage Defense Mechanism for Federated Learning Based on Stochastic Gradient Masking
Xuezhi Liu
,
Fuan Xiao
,
Zhenxin Zhang
,
Lang Li
.
dspp 2026
:
474-484
[doi]
Spectrum Resources Privacy-Preserving Allocation and Certificate Management Technology Based on Blockchain
Mengjiang Liu
,
Qianhong Wu
,
Haibin Zheng
.
dspp 2026
:
196-213
[doi]
Evaluating Deep Learning in Gait Recognition
Haotian Liu
,
Zheng Zhu
,
Weizhi Meng
,
Xiaojiang Du
.
dspp 2026
:
33-50
[doi]
Smart Contract Ponzi Detection via Contract Transaction Graph
Yafei Liu
,
Yuling Chen
,
Bo Li
,
Yuxiang Yang
,
Taiyan Chen
.
dspp 2026
:
123-139
[doi]
FedVoD: A Robust Federated Learning Defense Strategy Against Hybrid Byzantine Attacks
Hongjie Luo
,
Yuling Chen
,
Hui Dou
,
Junyu Zhu
,
Haonan Zhan
.
dspp 2026
:
459-473
[doi]
PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data Sharing and Efficient Aggregation
Tengyu Ma
,
Jun Ye
.
dspp 2026
:
280-293
[doi]
Composite Weather Image Restoration Based on Two-Stage Feature Learning
Chenbo Ma
,
Zihan Chen
,
Maoyi Xiong
,
Wentao Zhao
.
dspp 2026
:
51-68
[doi]
A High-Precision and Scalable Location Privacy Query System Based on FHE
Lan Ma
,
Xiaodong Li
,
Anxu Fu
,
Yuan Cui
,
Yimeng Dou
,
Ruoyun Zhao
,
Li Guan
.
dspp 2026
:
328-338
[doi]
Digital Forensics in Ransomware Analysis for Windows-Based Computer Systems
Hoang Anh Nguyen
,
John Le
,
Joonsang Baek
,
Willy Susilo
.
dspp 2026
:
14-32
[doi]
High-Throughput Threshold SM2 Signatures with Robustness
Zheng Qian
,
Yanmei Cao
,
Ling Liu
,
Jing Pan
.
dspp 2026
:
99-117
[doi]
Bypassing Cross-Domain Restrictions with Unsupervised Visual Translation
Huali Ren
,
Pengyu Chen
,
Ziyu Ding
,
Weitong Chen
,
Jiachao Li
,
Chong-zhi Gao
.
dspp 2026
:
221-233
[doi]
PHV-FL: Personalized Hierarchical Verifiable Federated Learning Scheme for Maritime Target Detection
Zhiheng Sun
.
dspp 2026
:
485-504
[doi]
Secure Non-interactive Decision Tree Evaluation via Fully Homomorphic Encryption
Yiru Sun
,
Baodong Qin
,
Zhenwu Guo
,
Wen Gao 0010
.
dspp 2026
:
341-358
[doi]
An Efficient Private Signaling with Function Secret Sharing
Xiangyang Wang
,
Xiangyi Fang
,
Wei Luo
,
Gang Yi
,
Jiarui Zhang
,
Biwen Chen
.
dspp 2026
:
245-261
[doi]
Efficient Implementation of NTRU-Based Key Encapsulation Mechanism on Embedded Platform
Hanyu Wei
,
Zhiwei Chu
,
Wenqian Li
,
Wenyu Wang
,
Jian Weng 0001
,
Zhenfeng Zhang
,
Jingqiang Lin 0001
,
Zhe Liu 0001
,
Yunlei Zhao
.
dspp 2026
:
412-431
[doi]
Kleptographic Fountain - Leakage via a Binary Erasure Channel
Jan Wolski
,
Miroslaw Kutylowski
.
dspp 2026
:
394-411
[doi]
Efficient Ranking, Order Statistics, and Sorting Under (2, 2)-Threshold Paillier
Peiming Xu
,
Pu Yin
,
Huan Xu
,
Chao Hong
,
Zhihong Liang
.
dspp 2026
:
294-307
[doi]
Secure and Efficient Multi-dimensional Task Matching in Spatial Crowdsourcing
Yu Yan
,
Jun Ye
.
dspp 2026
:
262-279
[doi]
RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium for VANETs
Yatao Yang
,
Deng Pan
,
Liangyu Chen
,
Xin Chang
.
dspp 2026
:
137-152
[doi]
A Code Vulnerability Detection Method Integrating Pre-trained Model and Graph Neural Network
Hongyu Yang
,
Jingchuan Luo
,
Xiang Cheng
.
dspp 2026
:
76-84
[doi]
Personalized Secure Anonymous Traceability Mechanism with Pseudo-Random Hopping of Dynamic ID
Zhaozhong Yuan
,
Yun He
.
dspp 2026
:
308-317
[doi]
PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory Publishing Framework for Trustworthy AI Systems
Yongxin Zhao
,
Chundong Wang
,
Erkang Zhao
,
Xiangtian Zheng
,
Hao Lin
.
dspp 2026
:
57-75
[doi]
Covert Channels in Bitcoin: Concealing Senders via Transaction Behavior Mimicry
Xudong Zhong
,
Haibo Tian
.
dspp 2026
:
87-104
[doi]
Personalized Federated Learning with Adaptive Weight Clustering
Rou Zhou
,
Yuling Chen
,
Hui Dou
,
Haolang Feng
,
Long Chen
.
dspp 2026
:
443-458
[doi]
An Efficient Designated-Server Public-Key Encryption Scheme with Keyword Search Based on Lattices
Yuchen Zou
,
Hongbo Li 0004
,
Pingbin Luo
,
Qiong Huang 0001
.
dspp 2026
:
432-440
[doi]
2024
Public Auditing with Aggregated Tags for Multiple Users
Yumei Li 0003
,
Willy Susilo
,
Fuchun Guo
.
dspp 2025
:
122-139
[doi]
Extended Withdrawable Signature
Xin Liu 0074
,
Willy Susilo
,
Joonsang Baek
.
dspp 2025
:
119-140
[doi]
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine
Jiayi An
,
Haibo Tian
.
dspp 2025
:
21-38
[doi]
More Efficient Two-Stage Sampling Technique and Its Applications
Chongshen Chen
,
Qiqi Lai
,
Yang Lu
,
Yong Yu
.
dspp 2025
:
88-108
[doi]
Hierarchical Identity-Based Encryption Based on SM9
Yi Chuai
,
Leyou Zhang
,
Shuwei Xie
,
Runze Tian
,
Zhuang Shan
.
dspp 2025
:
106-118
[doi]
UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions
Yingli Duan
,
Weizhi Meng 0001
,
Wei-Yang Chiu
.
dspp 2025
:
195-210
[doi]
In-Context Learning with Differentially Private Text Sanitization in Large Language Models
Jiluan Fan
,
Pei-Gen Ye
,
Anli Yan
.
dspp 2025
:
294-303
[doi]
Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection
Kazi Fatema
,
Mehrin Anannya
,
Samrat Kumar Dey
,
Chunhua Su
,
Rashed Mazumder
.
dspp 2025
:
260-275
[doi]
An Efficient Public Key Searchable Encryption Scheme for the Healthcare Cloud
Jingjie Gan
,
Meijuan Huang
,
Yanqi Zhao
,
Sirui Ji
.
dspp 2025
:
178-194
[doi]
Secure Monero on Corrupted Machines with Reverse Firewalls
Shichuan Guo
.
dspp 2025
:
52-68
[doi]
Enhancing Utility in Differential Privacy Models Through Feature Extraction and Knowledge Distillation
Shuyao He
,
Ting Xu
,
Fangzhou Shen
,
Weijie He
,
Haowei Yang
.
dspp 2025
:
109-121
[doi]
Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices
Yichi Huang
,
Futai Zhang
,
Wenjie Yang
,
Shaojun Yang
.
dspp 2025
:
67-87
[doi]
Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration
Zi Jiao
,
Fucai Zhou
,
Qiang Wang 0005
,
Jintong Sun
.
dspp 2025
:
3-20
[doi]
Decentralized Real-Time IIoT Data Integrity Verification System and Its Comprehensive Analysis
Hoseok Kwon
,
Yaechan Moon
,
Yongho Ko
,
Bonam Kim
,
Ilsun You
.
dspp 2025
:
156-164
[doi]
Cross-Chain Asset Trading Scheme Without Trusted Third-Party
Bo Li
,
Yuling Chen
,
Siyuan Huang
,
Yuxiang Yang
.
dspp 2025
:
39-51
[doi]
Detection and Identification of Power Quality Disturbance Signals in New Power System Based on Quantum Classic Hybrid Convolutional Neural Networks
Yue Li
,
Xinhao Li
,
Haopeng Jia
,
Anjiang Liu
,
Qingle Wang
,
Shuqing Hao
,
Hao Liu
.
dspp 2025
:
187-203
[doi]
Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained Processing Approach
Zhenhua Liu
,
Wenxin Wang
,
Han Liang
,
Yujing Yuan
.
dspp 2025
:
47-66
[doi]
Secure Key Exchange via Transparent Reverse Firewalls
Jiahao Liu
,
Jinshu Su
,
Yi Wang 0055
,
Xincheng Tang
.
dspp 2025
:
160-177
[doi]
Design and Analysis of Piezoelectric Energy Harvester for Wireless Sensor Networks
C. V. Ravikumar
,
K. Sathish
,
Chunhua Su
.
dspp 2025
:
239-254
[doi]
MEMS Design Process Based Simulation and Analysis of a Hypothetical Sensor Design with Electromechanics Interface
K. Sathish
,
C. V. Ravikumar
,
Chunhua Su
.
dspp 2025
:
221-238
[doi]
ETD-SAC: A Series-Wise Auto-correlation Mechanism Based Electricity Theft Detector for Smart Grids
Zhen Si
,
Zhaoqing Liu
,
Changchun Mu
,
Xiaofang Xia
.
dspp 2025
:
255-266
[doi]
A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures
Hao Song
,
Jiacheng Yao
,
Xuanze Chen
,
Shaocong Xu
,
Shibo Jin
,
Jiajun Zhou
,
Chenbo Fu
,
Qi Xuan
,
Shanqing Yu
.
dspp 2025
:
225-243
[doi]
SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networks
Jingwei Song
,
Xuru Li
,
Lifei Wei
,
Xinyu Meng
,
Le Yu
.
dspp 2025
:
141-159
[doi]
Targeted Universal Adversarial Attack Based on Fourier Transform
Yancheng Sun
,
Yuling Chen
,
Ziyang Liu
,
Hui Dou
,
Chaoyue Tan
.
dspp 2025
:
244-259
[doi]
Efficient and Privacy-Preserving Multi-user, Multi-database and Multi-dimensional Range Query
Xinya Tao
,
Aiqing Zhang
,
Sultan Basudan
.
dspp 2025
:
165-184
[doi]
Efficient Zero-Knowledge Argument for Bilinear Matrix Relation over the Residue Ring
Yuan Tian
,
Yongda Pang
.
dspp 2025
:
87-105
[doi]
Append-Only Authenticated Data Sets Based on RSA Accumulator
Qiang Tong
,
Long Yin
,
Yulong Liu
,
Jian Xu
.
dspp 2025
:
140-155
[doi]
Blockchain Solutions for Pediatric Vaccination Security: Encrypted NFTs
Phan H. T. Trung
,
Loc Van Cao Phu
,
Khoa Tran Dang
,
Kha Nguyen Hoang
,
Bao Tran Quoc
,
Hieu Doan Minh
,
Trong Nguyen Duong Phu
,
Ngan Nguyen Thi Kim
.
dspp 2025
:
69-84
[doi]
EBVS: An Efficient Pseudonymous Batch Verification Scheme for Vehicular Networks
Ping Wang
,
Shuokang Wang
.
dspp 2025
:
27-46
[doi]
An Efficient Threshold Ring Signature from G+G Identification Protocol
Chunhui Wu
,
Siwei Jiang
,
Fangguo Zhang
,
Yusong Du
,
Qiping Lin
.
dspp 2025
:
211-221
[doi]
PTFix: Rule-Based and LLM Techniques for Java Path Traversal Vulnerability
Xiaowei Zhang
,
Shigang Liu
,
Jun Zhang
,
Yang Xiang
.
dspp 2025
:
276-293
[doi]
Social Media User Geolocation Based on Large Language Models
Meng Zhang
,
Xiangyang Luo
,
Ningbo Huang
.
dspp 2025
:
304-312
[doi]
The Framework of General Channel Key Generation Based on Physical Layer
Hong Zhao
,
Enting Guo
,
Xiuheng Liao
,
Kouichi Sakurai
,
Chunhua Su
.
dspp 2025
:
204-220
[doi]
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments
Yi Zhao
,
Sen Zhao
,
Siyi Lv
.
dspp 2025
:
3-26
[doi]
Sign in
or
sign up
to see more results.