Abstract is missing.
- Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation ModelsYi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian, Shouling Ji. 3-23 [doi]
- An Android Malware Detection Method Using Better API Contextual InformationHongyu Yang, Youwei Wang, Liang Zhang 0018, Ze Hu, Laiwei Jiang, Xiang Cheng. 24-36 [doi]
- TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection MethodChangzhi Zhao, Kezhen Huang, Di Wu, Xueying Han, Dan Du, Yutian Zhou, Zhigang Lu 0002, Yuling Liu. 37-52 [doi]
- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch OperationsDong Chen, Zhiyuan Qiu, Guangwu Xu. 53-72 [doi]
- Clustered Federated Learning with Inference Hash Codes Based Local Sensitive HashingZhou Tan, Ximeng Liu, Yan Che, Yuyang Wang. 73-90 [doi]
- TIA: Token Importance Transferable Attack on Vision TransformersTingchao Fu, Fanxiao Li, Jinhong Zhang, Liang Zhu, Yuanyu Wang, Wei Zhou 0011. 91-107 [doi]
- Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-KyberHang Yang, Rongmao Chen, Qiong Wang, Zixuan Wu, Wei Peng. 111-129 [doi]
- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V ArchitectureQingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu 0001. 130-149 [doi]
- Improved Integral Cryptanalysis of Block Ciphers BORON and KhudraYi Guo, Danping Shi, Lei Hu, Yin Lv. 153-171 [doi]
- Automatic Search of Linear Structure: Applications to Keccak and AsconHuina Li, Guozhen Liu, Haochen Zhang, Peng Tang, Weidong Qiu. 172-192 [doi]
- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128Zhichao Xu, Hong Xu, Lin Tan 0003, Wenfeng Qi 0001. 193-208 [doi]
- Improved Herrmann-May's Attack with Merging Variables and Lower LLL BoundQingfeng Cheng, Chunzhi Zhao, Jinzheng Cao, Fushan Wei. 209-229 [doi]
- Full Round Distinguishing and Key-Recovery Attacks on SAND-2Zhuolong Zhang, Shiyao Chen, Wei Wang 0035, Meiqin Wang. 230-250 [doi]
- Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus AnalysisZhen Yang, Jing Li, Fei Cui, Jia-Qi Liu, Yu Cheng, Xi Nan Tang, Shuai Gui. 251-271 [doi]
- Non-malleable Codes from Leakage Resilient Cryptographic PrimitivesAnit Kumar Ghosal, Dipanwita Roychowdhury. 272-290 [doi]
- DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy ProtectionYinghui Zhang 0002, Hao Du 0006, Jin Cao, Gang Han, Dong Zheng 0001. 293-304 [doi]
- A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally PrinciplesXin Sun, Anran Cui, Hui Chen, Xingchi Su. 305-316 [doi]
- Quantum Augmented Lattice Attack on NTRU with Side InformationQingfeng Cheng, Jinzheng Cao, Xiangyang Luo. 317-328 [doi]
- Quantum Attacks: A View of Data Complexity on Offline Simon's AlgorithmBo Yu, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo, Bing Sun. 329-342 [doi]
- FaBFT: Flexible Asynchronous BFT Protocol Using DAGYu Song, Yu Long 0001, Xian Xu 0001, Dawu Gu. 343-355 [doi]
- Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword SearchHusheng Yang, Sha Ma, Pan Zhou, Guiquan Yang, Qiong Huang 0001. 356-367 [doi]
- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud EnvironmentsPeiyi Tu, Xingjun Wang. 368-386 [doi]
- An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of ThingsChangsong Jiang, Chunxiang Xu, Kefei Chen. 389-393 [doi]
- TRGE: A Backdoor Detection After QuantizationRenhua Xie, Xuxin Fang, Bo Ma, Chuanhuang Li, Xiaoyong Yuan. 394-398 [doi]
- Improved Homomorphic Evaluation for Hash Function Based on TFHEBenqiang Wei, Xianhui Lu. 399-402 [doi]
- Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROMZiyi Li, Xianhui Lu, Yao Cheng, Bao Li 0001. 403-406 [doi]
- Partial Key Exposure Attack on Common Prime RSAMengce Zheng. 407-410 [doi]
- An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealthLinghui Chen, Zhiguo Wan, Jun Zhou, Carvajal Roca Ivan Edmar. 411-415 [doi]