Abstract is missing.
- DSS Scheme for Anti-malicious User's Queries Based on BlockchainYating Guo, Yanbo Yang, Lili Gao, Jiawei Zhang, Jianfeng Ma, Yuqing Mao. 1-14 [doi]
- Internet of Vehicle Privacy Protection Solution Based on Blockchain and Zero Knowledge ProofQingshui Xue, Sida Fan, Mengyao Shi. 15-31 [doi]
- A New Asymmetric Three-Party Key Agreement Protocol Based on Secure Multiparty ComputationShanchuan Pang, Quanrun Li, Hu Ma, Jiaming Wen. 32-44 [doi]
- TCAu: Time-Controllable Air-Space-Ground AuthenticationBoyuan Ye, Xiaofei Zhang, Yu Cao, Xiangshang Gao, Shengchao Li. 45-58 [doi]
- A NIZK-Based Linkable Ring Signature Scheme for Anonymous Blockchain System on LatticeXuechun Mao, Xiaqing Zhou, Zengyou Zhang, Ying Chen. 59-73 [doi]
- CP-ABZP: A CP-ABE Cross-Chain Privacy Protection Scheme Combined with Zero-Knowledge ProofCong Shen, Guofeng Zhang 0015, Yue Wang 0107. 74-88 [doi]
- A Novel Dual-Layer Access Control Model Based on Blockchain for the Case-Involved Property ManagementPeng Wang, Guofeng Zhang 0015, Yue Wang 0107. 89-104 [doi]
- MUSES: Secure Multi-user Encrypted Speech Search in Cloud-Edge-End EnvironmentsKaifa Zheng, Jiayi Liu, Shuai Ou, Zhen Xu, Xu Wu, Tiejun Wu. 105-119 [doi]
- Secure and Effective Key Management for Vehicle Ad Hoc NetworksZhe Xia, Huxin Qin, Xin Duan, Rui Su, Sha Wu. 120-136 [doi]
- Privacy-Preserving Machine Learning Using Functional Encryptions for Multiple Models with Constant CiphertextYizhen Hua, Jiangtao Li 0003, Yufeng Li 0002. 137-151 [doi]
- A Privacy-Preserving Delegable Auditing Scheme with Edge-Assisted Deduplication in IoTChunfei Pan, Lei Zhou 0026, Longxia Huang, Jiajia Chen 0005, Kang Zhang, Anmin Fu. 152-167 [doi]
- A Multi-KGC Certificateless Anonymous Cloud Sharing Scheme with Threshold-Based TraceabilityLei Zhou 0026, Chunfei Pan, Tian Wang, Zhenzhu Chen, Xiao Yang 0014, Anmin Fu. 168-183 [doi]
- A Differential Privacy Approach to Optimization for Protecting Large ModelsYilei Wang, Yan Lv, Guanyu Jiang, Bohan Li, Guangshun Li, Baopeng Ye. 184-195 [doi]
- Unifying Physical-Layer Security and Post-quantum Cryptography: An Optimized Authentication Encryption ProtocolShihan Fang, Jingguo Bi, Yan Gao, Haipeng Peng. 196-210 [doi]
- Anonymous Batch Authentication and Key Agreement for Internet of ThingsTao Zhang, Huijie Yang, Wenying Zheng, Lingling Wang, Shan Jin. 211-223 [doi]
- A Lightweight Privacy-Preserving kNN Query Framework via Secret Sharing in Cloud ComputingJiaqi Qi, Xiaoying Jia, Siyuan Shen, Lingzhu Li. 224-235 [doi]
- BiLSTMTimeGAN: Enhancing Side-Channel Attacks Through Temporal Data AugmentationJianqiao Liu, Xiaoyong Kou, Wei Yang, Dekun Liu, Gongxuan Zhang. 236-251 [doi]
- An Encrypted Anomaly Traffic Detection Method Integrating Adversarial Training and Multi-scale Contrastive LearningGang Wang, Yunpeng Gao, Yi Chen, Peng Wang, Yong Ding. 252-269 [doi]
- MGtest: Python Coverage-Guided Model-Level Fuzzing for DL FrameworksJiahe Ji, Wei Kong, Yang Liu. 270-284 [doi]
- Collaborative Physical Layer Authentication for Vehicular Networks Based on Dempster-Shafer Evidence TheoryYi Yin, Xiaofan Liang, Lijia Feng, Hongmei Song. 285-300 [doi]
- A Survey of Kernel FuzzingWenyu Zhen, Minhuan Huang, Xiang Li, Yuanping Nie, Lang Chu, Yuxian Wan. 301-315 [doi]
- Federated Learning Against Dynamic Mixed Poisoning Attack and DefenseJianhong Zhang, Qi Li. 316-331 [doi]
- Robust Fake Image Detection via Incremental Training of Siamese Neural NetworksAniello Castiglione, Lucia Cimmino, Michele Nappi, Matteo Polsinelli, Carlo Sorrentino. 332-345 [doi]
- Advancing Deepfake Detection Through Head Pose Estimation on New-Generation DatasetsCarmen Bisogni, Aniello Castiglione, Maddalena Migliaccio, Annalaura Miglino, Michele Nappi, Chiara Pero. 346-361 [doi]
- A Verifiable and Privacy-Preserving Credit Risk Prediction Under Secure Neural NetworkJianyu Wang, Mengya Lei, Zhen Fan, Mingwu Zhang. 362-376 [doi]
- Security Assessment in Optical Networks: A Path Graph-Based Framework for Attack-Induced Fault DiagnosisGang Qu, Liang Zhang, Hongjia Liu. 377-390 [doi]
- Machine Learning Model Construction and Multi-dimensional Evaluation for Pop-Up Text Sentiment AnalysisJingxin Wang, Ling Zhang, Pengquan Shang, Xuanye Chen, Junhua Wu, Yilei Wang. 391-403 [doi]
- Enhancing Double Ratchet Algorithm with Pre-Shared Key Mechanism and Optimal KDF SelectionYutong Chu, Shijia Hong, Huijie Yang, Tianqi Zhou. 404-420 [doi]