Abstract is missing.
- Exposing DeepFakes via Localizing the Manipulated ArtifactsWenxin Li, Qi Wang, Run Wang, Lei Zhao, Lina Wang. 3-20 [doi]
- Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential AnalysisGao Wang, Gaoli Wang. 21-38 [doi]
- Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack MethodYuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng. 39-54 [doi]
- A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning AttacksYang Xiao, Jie Li, Wengui Su. 55-72 [doi]
- Rethinking Adversarial Examples Exploiting Frequency-Based AnalysisSicong Han, Chenhao Lin, Chao Shen 0001, Qian Wang 0002. 73-89 [doi]
- Compressive Sensing Image Steganography via Directional Lifting Wavelet TransformZan Chen, Chaocheng Ma, Yuanjing Feng, Xingsong Hou. 93-109 [doi]
- Remote Recovery of Sound from Speckle Pattern Video Based on Convolutional LSTMDali Zhu, Long Yang, Hualin Zeng. 110-124 [doi]
- Secure Image Coding Based on Compressive Sensing with Optimized Rate-DistortionDi Xiao, Shuwen Lan. 125-141 [doi]
- Black-Box Audio Adversarial Example Generation Using Variational AutoencoderWei Zong, Yang-Wai Chow, Willy Susilo. 142-160 [doi]
- Security Analysis of Even-Mansour Structure Hash FunctionsShiwei Chen, Ting Cui, Chenhui Jin. 163-173 [doi]
- Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid SystemMohammed Shujaa Aldeen, Chuan Zhao. 174-191 [doi]
- Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to ChaskeyYaqi Xu, Baofeng Wu, Dongdai Lin. 192-209 [doi]
- A Novel Approach for Supervisor Synthesis to Enforce Opacity of Discrete Event SystemsNour Elhouda Souid, Kais Klai. 210-227 [doi]
- Lattice-Based Secret Handshakes with Reusable CredentialsZhiyuan An, Zhuoran Zhang, Yamin Wen, Fangguo Zhang. 231-248 [doi]
- When NTT Meets Karatsuba: Preprocess-then-NTT Technique RevisitedYiming Zhu, Zhen Liu, Yanbin Pan. 249-264 [doi]
- Predicting the Concrete Security of LWE Against the Dual Attack Using Binary SearchShuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li, Lei Bi. 265-282 [doi]
- Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSSXiaohan Zhang, Chi Cheng, Ruoyu Ding. 283-300 [doi]
- Efficient and Fully Secure Lattice-Based IBE with Equality TestZhenghao Wu, Jian Weng 0001, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen. 301-318 [doi]
- Forward-Secure Revocable Identity-Based EncryptionBaodong Qin, Xue Bai, Dong Zheng 0001, Hui Cui, Yiyuan Luo. 321-340 [doi]
- An Optimized Inner Product Argument with More Application ScenariosZongyang Zhang, Zibo Zhou, Weihan Li, Hongyu Tao. 341-357 [doi]
- Updatable All-But-One Dual Projective Hashing and Its ApplicationsKai Zhang 0016, Zhe Jiang, Junqing Gong, Haifeng Qian. 358-374 [doi]
- On Tightly-Secure (Linkable) Ring SignaturesGuoFeng Tang. 375-393 [doi]
- More Efficient Construction of Anonymous SignaturesYunfeng Ji, Yang Tao 0001, Rui Zhang 0002. 394-411 [doi]