Abstract is missing.
- Active-Trust Based Security Service Orchestration Framework for 6G Enabled Massive IoTMingfeng Huang, Ronghui Cao, Xiaoyong Tang, Tan Deng. 1-8 [doi]
- MSG-ImDiffusion: Multi-Scale Spatio-Temporal Diffusion Modeling for Anomaly Detection in Microservice SystemsRuoyao Zhang, Yuchun Guo, Yishuai Chen, Zhong Cao. 9-16 [doi]
- UAV Assisted Multi-Attack Detection Method for Vehicular Ad Hoc NetworksJunhui Zhang, Na Fan, Liping Ye, Jianghui Hu, Yexiong Shang, Yu Shi. 17-24 [doi]
- Identity-Based Asymmetric Group Message FrankingHang Liu, Yang Ming 0001, Aotian Cai, Chenhao Wang 0005, Yi Zhao 0011. 25-32 [doi]
- Revisiting the Byzantine Resilience of Federated Reinforcement Learning: A Distillation PerspectiveWenzheng Jiang, Ji Wang 0002, Zhengyi Zhong, Jiangzhou Liao, Xiaomin Zhu 0001, Flint Xiaofeng Fan. 33-41 [doi]
- Local Midpoint Guided Topology Control Method for Elimination of Vulnerable Node in UAV Ad-Hoc NetworksPeng Zhang, Peng Yi 0003, Tong Duan, Zhen Zhang 0049, Jiaxin Li, Junfei Li, Jing Yu 0030. 42-53 [doi]
- Backdoor-Free Node Injection Attacks Against Graph Neural NetworksJiasheng Qiu, Lieqing Lin, Qi Zhong, Zhenyu Liang. 54-61 [doi]
- RaceTEE: Enabling Interoperability of Confidential Smart ContractsKeyu Zhang, Andrew Martin. 62-73 [doi]
- RASKEE: A TEE-Assisted Secure Range Spatial Keyword Query in a Multi-user SettingZhen Lv 0001, Yaorong Tan, Hongwei Huo 0001, Yanguo Peng, Youliang Tian. 74-85 [doi]
- Dual Gradient Evaluation-Based Defense Method Against Poisoning Attacks in Federated LearningZhuangzhuang Zhang, Xinhai Yan, Libing Wu, Bingyi Liu, Enshu Wang, Jianping Wang. 86-94 [doi]
- Chaos of Functionalities: Understanding Security Risks in Heterogeneity of IoT Matter ControllersYiwei Fang, Haoqiang Wang, Ze Jin, Qixu Liu. 95-102 [doi]
- Flatness-Aware Attack: Enhancing Adversarial Transferability via Local Region StabilityKejun Zhang, Yufan Yang, Jiahao Cheng, Meijiao Li. 103-110 [doi]
- TF-Detector: Anomaly Detection in Industrial Control System through Process-Aware Time-Frequency Domain AnalysisShuyuan Chang, Qixiao Lin, Jian Mao, Mengshuo Yuan, Yan Huo 0001. 111-118 [doi]
- Detection and Mitigation of Unknown Threats in IPv6 Networks via Layered Data AdaptationYoujun Huang, Xiang Li 0108, Jia Zhang 0004, Haixin Duan. 119-130 [doi]
- Opening a Can of Worms: A Comprehensive View into the Android Debug Bridge MalwareHuancheng Hu, Christian Doerr. 131-142 [doi]
- Zero-Knowledge Quantized Weighted Majority AlgorithmLi Quan, Xikun Jiang, Boris Düdder. 143-151 [doi]
- VarAgent: LLM-Enhanced Variable Name Recovery in Binaries via Reinforcement Learning and Semantic FusionYuyao Huang, Hui Shu, Fei Kang, Cong Li. 152-162 [doi]
- AutoPentester: An LLM Agent-based Framework for Automated PentestingYasod Ginige, Akila Niroshan, Sajal Jain, Suranga Seneviratne. 163-174 [doi]
- End-to-End Security Policy Automation with Multi-LLM Agents in Cloud-Native SystemsXuefei Chen, Yuqi Zhang, Haohao Liu, Xiaotong Wang, Chen Li 0066, Bibo Tu. 175-183 [doi]
- Hamster: Private Transformer Inference via Fully Homomorphic EncryptionHuizhuo Wang, Zhiyong Zhang, Lei Ju. 184-191 [doi]
- When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial AttacksKarla Schäfer, Leon Ludwig. 192-199 [doi]
- Towards Automated and Robust Forensic Event ReconstructionLukas Schmidt, Sebastian Schinzel. 200-210 [doi]
- GTCN-G: A Residual Graph-Temporal Fusion Network for Imbalanced Intrusion DetectionTianxiang Xu, Zhichao Wen, Xinyu Zhao, Qi Hu, Yan Li, Chang Liu. 211-218 [doi]
- Bias as an Exploit: A Scalable Red-Team Campaign to Uncover Gender-Based Vulnerabilities in Foundational ModelsKun Jia 0001, Jiyun Chen, Haizhen Gao, Yuxin Zhang, Qiushi Dong, Daixi Zhang, Huimei Chen, Jiayin Qi. 219-226 [doi]
- CTIGEN: Generating Cyber Threat Intelligence Oriented Summaries Through Summarization Fine-Tuning with Domain-specific NERXuhao Wan, Xiang Lin, Jianhua Li. 227-235 [doi]
- Buffer is All You Need: Defending Federated Learning against Backdoor Attacks under Non-iids via BufferingXingyu Lyu, Ning Wang 0022, Yang Xiao 0010, Shixiong Li, Tao Li 0042, Danjue Chen, Yimin Chen 0004. 236-243 [doi]
- Leveraging large language models for SQL behavior-based database intrusion detectionMeital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li. 244-254 [doi]
- BDT-RVOC: Block Data Truncation for Verifiable and Private Multi-Cloud ComputationZe Yang, Youliang Tian, Ruixin Song, Kun Niu, Mengqian Li, Jinbo Xiong. 255-262 [doi]
- TrustMFA: A Privacy-Preserving Multi-Factor Authentication Scheme with Anonymous CredentialWenjun Zhu, Jianan Hong, Shiyao Wang, Kunling Li, Kun He 0008. 263-271 [doi]
- HARS:A Dynamic Scheduling Algorithm for Redundant Executors Based on Weighted Hypergraph HeterogeneityYifan Wang, Xinjian Zhao, Zesheng Xi, June Li, Xu Zhong, Yu Li. 272-281 [doi]
- Targeted and Transferable Adversarial Attacks on Large Vision-Language Models via Two-Stage Region-Specific PerturbationsZhuoran Wang, Jiawei Zhao, Liang Zhang, Zheng Wang, Yining Hu. 282-289 [doi]
- Blind Points Between ASR and Intent Inferring: Vulnerability Discovering via Fuzzing in-Vehicle Voice AssistancePeilin Luo, Wei Teng, Jiachun Li 0001, Yan Meng 0001, Haojin Zhu. 290-297 [doi]
- AutoPentestAL: An automated penetration testing framework with active learning capabilitiesXianyi Fu, Bin Liu, Cheng Zhu, Dianqiu Ma. 298-309 [doi]
- Blind Video Watermarking Resisting Camcorder Recording Based on Spatio-temporal SynchronizationMing Liu, Yifeng Shu, Lansheng Han, Xianjun Gu. 310-320 [doi]
- MEB: A Backdoor Detection Framework for Pre-training Based Malicious Traffic DetectionKai Wang, Jieying Zhou, Libo Yang, Weixun Li, Ziguang Jie, Zheyu Jiang, Zhiliang Wang. 321-331 [doi]
- On the Limitations of Fuzzy Hashing for Malware Similarity: An Analysis of Vulnerable Code Detection in MalwareNathan Ross, Oluwafemi Olukoya, Jesús Martínez del Rincón. 332-343 [doi]
- Enhancing Federated Learning under Partial Participation via Proportional Variance ReductionXiang Wang, Lei Tian, Chen Yang, Feilong Lin, Minglu Li. 344-351 [doi]
- Provenance graph-based advanced persistent threats detection via self-supervised contrastive learningXuTao Xiang, Yanqing Yang, Yurong Qian, Kai Zhao, Linlin Zhang. 352-359 [doi]
- EdgeTrace: A Context-Aware Anomalous Edge Detection Framework for APT TracebackNianqi Yang, Zhijian Zhao, Bing Chen. 360-368 [doi]
- T2F2L: Towards Trustworthy Fairness in Federated Learning Through A Verifiable ApproachGhazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí. 369-376 [doi]
- Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted DataZuan Wang, Juntao Lu, Jiazhuang Wu, Youliang Tian, Wei Song, Qiuxian Li, Duo Zhang. 377-388 [doi]
- Scalable Distance-aware Fuzzy Private Set IntersectionZhenyu Xiong, Kai Chen, Xingwei Ren, Yongqiang Li 0001, Mingsheng Wang. 389-400 [doi]
- The Sound of Reduction: Minimal Inputs, Maximal CoverageIaroslav Gridin, Antonis Michalas, Alejandro Cabrera Aldaya. 401-409 [doi]
- SPPF: A Speech-Semantic and Privacy-Preserving Framework with Prompt-Tuning Large Language ModelsBen Niu, Tiantian Kong, Yuqiao Hou, BoHao Li, Guoli Zhao. 410-417 [doi]
- Antenna Selection and Artificial Noise-based Security Transmission for Large-Scale MIMO SystemsShiguo Wang, Jie Ma. 418-424 [doi]
- FlexiGrain: A Flexible and Fine-Grained Privacy Control Framework for Dynamic Social NetworksBen Niu 0001, Fanyu Gan, Jinyu Peng, Qian Yang, Jin Cao 0001. 425-432 [doi]
- Multi-Directional Dynamical Framework for Information Propagation PredictionYuhang Wang, Ziang Hu, Guang Wang 0001, Yu Shang, Jizhong Han, Tao Guo 0006. 433-440 [doi]
- Toward Robust Encrypted Traffic Detection via Graph Contrastive LearningJiahao Huang, Mohan Li, Yanbin Sun, Yu Jiang. 441-448 [doi]
- APT-GCM: Advanced Persistent Threats Detection via Graph Contrastive Masked Representation LearningMengkun Zhao, Jing Liu, Wenqiang Hao, Xiaobing Pei. 449-460 [doi]
- BreachHydra: Measuring the Resilience of an Underground Data Breach ForumMarius Brockhoff, Lukas Schmidt, Fabian Ising, Sebastian Schinzel. 461-471 [doi]
- Mixture of Experts Representation Learning Scheme for Multi-View Android Malware DetectionJiaxiong Chen, Shuaishuai Tan, Jinchuan Liu, Zehua Zhang, Jianjun Zhou, Qiannan Lin, Haowen Tan. 472-483 [doi]
- Trust-Aware V2V Charging Coordination via Hierarchical Decision under Mode UncertaintyShuohan Liu, Wei Zhang, Yue Cao 0002, Qiang Ni, Lu Zhang, Xinyu Li. 484-491 [doi]
- SCodeGen: A Real-Time Trustworthy Constrained Decoding Framework for Secure Code Generation with LLMsMuzi Qu, Jie Liu 0008, Liangyi Kang, Shuyi Ling, Shuai Wang, Dan Ye 0004, Tao Huang 0001. 492-503 [doi]
- Efficient Auditing and Querying in Verifiable Redactable Blockchain: A Lightweight VDS Protocol with Integrity VerificationXiaoxu Zhang, Zhipeng Cai, Keyan Chen, Guanxiong Ha, Chunfu Jia. 504-511 [doi]
- Theoretical Min-Entropy Bounds for Physical-Layer Key Generation over Weibull Fading ChannelsDongchi Han, Yuan Ma, Xianhui Lu. 512-523 [doi]
- LLM-Driven APT Analysis and Detection Based on Provenance Graph by Threat PatternYibin Fu, Zhaoyun Ding, Sheng Zhang, Deqi Cao, Yi Wang. 524-531 [doi]
- LDP: Latent Diffusion-based Adversarial Purification towards Transformer-based Visual EncodersMengfan Li, Xinxin Fan, Quanliang Jing, Shaoye Luo, Yunfeng Lu, Jingping Bi. 532-539 [doi]
- Non-Restrictive Hardware-Based Trust in Embedded High-Level Operating SystemsSimon Unger, Sven Gebauer, Stefan Katzenbeisser 0001. 540-547 [doi]
- Compacting Side-Channel Measurements With Peak-Anchor-Based AlignmentYuling Luo, Minjiao Pei, Shunsheng Zhang, Xue Ouyang, Qiang Fu 0019, Sheng Qin, Junxiu Liu. 548-555 [doi]
- Proactive Radio Frequency Fingerprinting-Based Authentication Leverage IQ PerturbationSiqi Pei, Shiyue Huang, Hongbo Liu 0002, Haitao Jia, Yanzhi Ren, Huan Dai, Jiadi Yu. 556-565 [doi]
- Reliable and Robust Watermarking for Data Flooding against Ransomware Random TechniquesSaverio Giallorenzo, Simone Melloni, Pietro Sami. 566-577 [doi]
- Finder6: Efficient IPv6 Addresses Scanning Based on Hostname Correlation in IPv6-Only NetworkCe Sun, Liancheng Zhang, Ruijuan Wang, Yakai Fang, Hongtao Zhang, Haojie Zhu, Luyang Li. 578-585 [doi]
- RecZTA: A Reputation-Based Architecture with Dual-Layer PEPs for Zero Trust AccessZhi Lin, Lin Yan 0006, Zan Zhou 0001, Yongfeng Yu, Penghui Xiao, Shujie Yang. 586-593 [doi]
- TCP-Awareness Augmented Robust TLS Traffic Classification: A Hybrid Deep Learning ApproachYewa Li, Yitan Huang, Bo Jiang 0013, Zhigang Lu 0002, Zelin Cui. 594-601 [doi]
- OUF: Oblivious Universal Function with domain specific optimizationsVictor Delfour, Marc-Olivier Killijian. 602-609 [doi]
- Secure Communication Protocols and Video Streaming Demonstrations in Open RAN through DTLS and LKHSudarson Karmaker, Haitham S. Cruickshank, Mohammad Shojafar. 610-617 [doi]
- Defending Federated Learning against Backdoor Attacks by Inspecting Sparsity-Guided Out-of-Distribution Model BehaviorSonggao Tu. 618-625 [doi]
- Privacy-Preserving Facial Authentication with Hybrid Fuzzy Commitment and Cancelable TransformationWeilai Guo, Shuaichao Song, Yeming Yang, Yuming Liao, Jiyuan Li, Songhui Guo. 626-635 [doi]
- Assessing the Effectiveness of Singling-Out Attacks on Synthetic Data: Is the Current GDPR Guidance Adequate?Fatima Jahan Sarmin, Atiquer Rahman Sarkar, Noman Mohammed. 636-643 [doi]
- Enhancing Physical Security in Smart Environments with Ambient IntelligenceAshish Nanda, Robin Doss, Folmer Heikamp, Abhi Kumar, Haftu Reda, Adnan Anwar, Zubair A. Baig, Praveen Gauravaram, Debi Prasad Pati, Salil S. Kanhere, Mohan Baruwal Chhetri. 644-655 [doi]
- CVshield: Interpretable Black-Box Adversarial Defense for LLMs via CoT Guided Semantic VerificationWenjing Hu, Weiwei Qi, Yanlu Li, Xinzhe Huang. 656-663 [doi]
- An Efficient Feature Extraction Model Based on Asymmetric Deep Convolutional Autoencoder for Abnormal Traffic DetectionGuofeng Zhang, Yang Zhang, Bingbing Wang. 664-671 [doi]
- KSFed: A Defense against Poisoning Attacks in Federated Learning using Statistical AnalysisJiaxuan Zhao, Qi Feng, Qin Liu 0003, Min Luo 0002, Wei Zhao 0054, Debiao He. 672-680 [doi]
- MalShield: Enhancing Android Malware Detection with Stateful Defense against Query AttacksHengyu Zhang, Guang Cheng 0001, Yuyang Zhou, Zongyao Chen. 681-689 [doi]
- MBCGAN-SGFM: Detecting Rare and Unknown Attacks via Generative Augmentation and Semantic MemoryYunhao Wang, Yong Wang, Lin Zhou. 690-699 [doi]
- Can We Distinguish? A Deep Learning Approach to AI-Generated Content DetectionYikai Liang, Mengqing Liu. 700-707 [doi]
- RuDyna: Towards A Dynamic Analysis Framework for RustShanlin Deng, Baojian Hua. 708-719 [doi]
- DCIAD:Dual CNN with Informer for Time-Series Anomaly DetectionXiang Zhong, Yong Wang, Lin Zhou. 720-729 [doi]
- Solving Small LWE Instances with the Dropping Meet-in-the-Middle AlgorithmXiaofei Tong, Jingguo Bi, Shuwen Luo, Licheng Wang, Lixiang Li 0001, Lin Wang. 730-737 [doi]
- ET-FS: Functional Specialization Method for Multi-Task Learning in Encrypted Traffic ClassificationXinzhu Feng, Gaopeng Gou, Chang Liu, Zheyuan Gu, Wenqi Dong, Famei He, Xuren Wang. 738-749 [doi]
- APER: An Efficient and Privacy-Preserving Scheme for E-Health RecommendationsJing Wang, Wenhao Yuan, Xianjun Deng, Qiankun Zhang 0001, Jing Fan, Xue Yuan. 750-760 [doi]
- A Trust-Based Data Quality Assessment Mechanism in Crowdsensing ServicesHai Liu, Yadong Peng. 761-768 [doi]
- Rusty: Effectively Detecting Multilingual Rust Memory Bugs with Interprocedural Static AnalysisMingliang Liu, Baojian Hua. 769-780 [doi]
- OptiFLIDS: Optimized Federated Learning for Energy-Efficient Intrusion Detection in IoTSaida Elouardi, Mohammed Jouhari, Anas Motii. 781-792 [doi]
- Attribute-Based Conditional PRE: A Novel Construction from LWE for Cloud Data-SharingLisha Yao, Jian Weng 0001, Pengfei Wu 0003, GuoFeng Tang, Haiyang Xue, Guomin Yang, Robert H. Deng. 793-804 [doi]
- A secure and provable deletion method over outsourced data for fog-based smart gridChangsong Yang, Yueling Liu, Yong Ding, Hai Liang, Shuo Wang. 805-812 [doi]
- *Yuqi Qiu, Juan Wang, Chenjun Ma, Yunfeng Kang, Jie Wang. 813-824 [doi]
- RL-Optimized Lightweight Obfuscation Against Binary Code Similarity DetectionRan Wei, Hui Shu, Fei Kang. 825-836 [doi]
- Building Provably Secure Pseudo-Strong PUFs via Weak PUFs and Pseudorandom Functions for Cryptographic ProtocolsChenghao Chen, Xiaolin Zhang, Kailun Qin, Tengfei Wang, Yipeng Shi, Tianyi Huang, Chi Zhang, Dawu Gu. 837-844 [doi]
- Controller Makes Pentesting Better: An Improved Multi-Agent Automated Penetration Testing FrameworkXiaoyu Geng, Ning An, Boyuan Xu, Xiaobo Yang, Bo Jiang 0013, Baoxu Liu, Junrong Liu. 845-852 [doi]
- Bits for Privacy: Evaluating Post-Training Quantization via Membership InferenceChenxiang Zhang, Tongxi Qu, Zhong Li, Tian Zhang 0001, Jun Pang 0001, Sjouke Mauw. 853-860 [doi]
- AlignAD-VAE: A Variational Autoencoder with MMD-Based Dataset Alignment for Network Anomaly DetectionSamed Saka, Valerio Selis, Alan Marshall 0001. 861-867 [doi]
- PANDA-CDR: Perturbation-Aware and Neural Dual-Channel Alignment for Cross-Domain RecommendationRuohan Wang, Gaode Chen, Miaobo Hu, Ji Xiang, Ruixin Song, Cong Xue, Lei Wang 0135, HaoYuan Teng. 868-877 [doi]
- Decentralizing Photo Forensics for Public and Verifiable TrustMauro Clavijo-Herrera, Rolando Trujillo-Rasua, Carles Angles-Tafalla. 878-885 [doi]
- ConCloneDep: A Confidence-Aware Clone-Based Dependency Identification Approach in C/C++ Open-Source ComponentsJianxing He, Xi Chen, Shan Yao, Xiaoyan Liang, Ruizhong Du. 886-893 [doi]
- ComplexMM: Efficient and Generic Homomorphic Matrix Multiplication via Complexification and BSGS AlignmentYucen Liao, Junping Wan, Jingjing Fan, Zoe L. Jiang. 894-902 [doi]
- EFSM-Based Modeling of Siemens S7comm for Adaptive Cyber Deception in ICS HoneypotsSaurabh Chamotra, Ferdous Ahmed Barbhuiya. 903-913 [doi]
- Securing AI Code Generation - A Prompt Rectification Approach for Mitigating Cyber RisksJialiang Dong, Zihan Ni, Nan Sun 0002, Sanjay K. Jha, Yiwei Zhang 0008, Elisa Bertino, Surya Nepal, Siqi Ma. 914-925 [doi]
- Mitigating Leakage Amplification in DP-Enhanced Encrypted Search Across Multiple UsersYingying Qi, Jiabei Wang, Tiancheng Zhu, Yongbin Zhou. 926-933 [doi]
- Prototype-Integrated Representation Learning for Novelty DetectionSaranya Vijayakumar, Christos Faloutsos, Matt Fredrikson. 934-941 [doi]
- Robustness Assessment and Enhancement of Text Watermarking for Google's SynthIDXia Han, Qi Li, Jianbing Ni, Mohammad Zulkernine. 942-949 [doi]
- Clean Label Backdoor Attack Based on Feature Distance Guided Sample Selection and Noise OptimizationLixia Xie, Pengcheng Kang, Hongyu Yang, Juncheng Hu. 950-957 [doi]
- Data Driven Based Attention Mechanism for Optimal Anomaly Detection in Complex Multivariate Time Series DataShubha Dhali, Kuntal Ghosh, Siddhartha Prakash Duttagupta. 958-965 [doi]
- On-Chain Risk Signals: Predicting Security Threats in DeFi ProjectsBahareh Parhizkari, Antonio Ken Iannillo, Ed Zulkoski, Christof Ferreira Torres, Radu State. 966-977 [doi]
- PROV-LLM: Advanced Persistent Threat Detection Based on Process Behavior Subgraphs Using Large Language ModelsCanhua Chen, Yang Song, Yunpeng Li, Yun-feng, Xiaoyu Wang, Yuling Liu, Qixu Liu. 978-985 [doi]
- Reinforcement Learning Enhanced Temporal Generative Adversarial Networks for Blockchain Illicit Transaction DetectionMengyuan Li, Jiewei Chen, Shao-Yong Guo 0001, Xuesong Qiu 0001, Feng Qi 0004. 986-995 [doi]
- A Zero-Trust Empowered Continuous Authentication System for Drivers: Integrating Federated Learning with Conditional Transformer GANLina Ge, Zhipeng Cao, Ming Jiang, Liang Zhao. 996-1006 [doi]
- ReTainer: Reputation-Aware Containerized Service Deployment in Blockchain NetworksXiaoxu Ren, Qixin Li, Haipeng Yao, Tianhao Ouyang, Ruichen Zhang. 1007-1014 [doi]
- Trusted Online Key Management Center Architecture and Implementation Method for Train Control SystemsWeihong Ma, Xinxin Li, Xiaoya Hu, Shaohu Li, Qian Wang, Fangyu Li. 1015-1022 [doi]
- Artificial Noise-Based Countermeasure Against Full-Duplex (FD) Active EavesdroppingShiguo Wang, Yun Zhao. 1023-1029 [doi]
- From Text to STIX: Reducing Hallucinations through Fine-Tuned LLMsRuoyao Xiao, Yu Luo, Weifeng Xu, Dianxiang Xu. 1030-1037 [doi]
- Adversarial Example Based Fingerprint Embedding for Robust Copyright Protection in Split LearningZhangting Lin, Mingfu Xue, Wenmao Liu, Liquan Chen. 1038-1045 [doi]
- Scalable Private k-Nearest Neighbors Search Based on Secret SharingPeizhao Zhou, Lihai Nie, Zheli Liu. 1046-1053 [doi]
- PrivRAG: A Privacy-Preserving Retrieval-Augmented Generation Protocol for LLM-Driven Voice AssistantsYuan Chang, Siran Wang, Tom H. Luan, Yuntao Wang 0004, Zhou Su. 1054-1061 [doi]
- Interprocedural Call Graph Embedding with GAT for Memory safety Vulnerability DetectionRong Ren, Jingyi Wu, Hongbo Jin, Qingyu Song, Bing Zhang, Qian Wang. 1062-1071 [doi]
- PUF-Enhanced Physical-Layer Key Generation for Secure Drone Communication with Untrusted RelaysTao Chen, Dongming Li, Xianglin Fan, Yi Lou. 1072-1079 [doi]
- Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution FingerprintingDilli Prasad Sharma, Liang Xue, Xiaowei Sun, Xiaodong Lin, Pulei Xiong. 1080-1091 [doi]
- Deep Learning Assisted Reverse Engineering: Recognizing Encryption Loops in RansomwareNanqing Luo, Haizhou Wang, Zhilong Wang, Lan Zhang, Ping Chen, Peng Liu. 1092-1102 [doi]
- KHAD: K-Hop and Activation-aware Defense against Bit-Flip Attacks in Deep Neural NetworksJiajun Guo, Hao Ying, Zhezhao Yang, Xinyue Yu, Tianqi Shi, Jie Xiao 0003. 1103-1110 [doi]
- Flow-Based Screen-Shooting Robust Watermarking with Invertible Noise Simulation NetworkPei Gan, Xuehu Yan, Hu Deng, Rongtao Liao, Feng Chen 0027. 1111-1118 [doi]
- You May Not Be Your Username: Cross-Market Vendor Alias Attribution with Automatic Multi-Signal EvaluationWesley Kwan, Lynn Takahashi, Nathan Pham, Apurva Sista, Ericsson Santana Marin. 1119-1126 [doi]
- Establishing Secure Intra-Solid Communication Networks via Acoustic TransceiversChaoyi Sun, Henglin Pu, Junyi Zhou, Chao Cai. 1127-1134 [doi]
- ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language ModelsSiyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu. 1135-1146 [doi]
- Overcoming Data Mining in Blockchain-Based Covert Communication: Transaction Withdrawal and Multisig EmbeddingJialing He, Zhuo Chen 0001, Yijing Lin, Jiacheng Wang 0001, Liehuang Zhu, Zhu Han 0001, Rahim Tafazolli, Tao Xiang 0001. 1147-1157 [doi]
- Dynamic Hybrid Backdoor Attack: Saliency-Guided Composite Triggers for Image ClassificationYuanhao Shen, Ying Wang, Yiran Liu, Zili Yao, Qiu Xue-song, Shaoyong Guo. 1158-1165 [doi]
- Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature ModelingKarla Schäfer, Martin Steinebach. 1166-1173 [doi]
- FedRand: A Federated Random Forest Learning Technique for Anomaly Detection in IoT NetworksOmodolapo Babalola, José Cano, Somrudee Deepaisarn, Nguyen-Truong. 1174-1181 [doi]
- TLSA: Transfer Learning Enhanced Link Stealing Attacks on Graph Neural NetworksZhenkun Jin, Jiaqi Ma, Yuanyuan He, Wei Xiang, Qiankun Zhang, Tao Zhang. 1182-1189 [doi]
- AMD: Adaptive Adversarial Training Method Based on Mahalanobis DistanceAoqi Ruan, Hui Xia, Rui Zhang, Xiaoxue Song, Zhengheng Li, Mengyuan Song. 1190-1197 [doi]
- Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated ResultsMichael Eckel, Georgios Gkoktsis, Markus Horn. 1198-1209 [doi]
- Hardware-Aware Neural Architecture Search for Real-Time Automotive Intrusion DetectionXuke Yan, Linxi Zhang. 1210-1217 [doi]
- PrivANN: Practical and Efficient Private Approximate Nearest Neighbor SearchXuan Chen, Shujie Cui, Joseph K. Liu, Shifeng Sun 0001, Shangqi Lai. 1218-1226 [doi]
- Efficient and Privacy-Preserving (α, β)-Core Community Search over Encrypted Bipartite GraphsXiaoxian Liu, Chen Chen, Xueqiao Liu, Xiaoyang Wang. 1227-1234 [doi]
- Hyperchaos and HVS-Adaptive Video Watermarking EmbeddingKesong Wu, Maowei Li, Peng Yang 0009, Wanting Yang, Jiangtian Nie, Xianbin Cao 0001. 1235-1242 [doi]
- Range Dynamic Searchable Symmetric Encryption: Combating Volume Leakage and Enabling Non-interactive DeletionJinguo Li, Qiang Lv, Junqin Huang, Linghe Kong. 1243-1251 [doi]
- Multidimensional Dynamic Trust Evaluation towards Intelligent TransportationKaixuan Luo, Chuanxiang Ma. 1252-1259 [doi]
- Identification of Generative Forged Western Blot ImagesYunqiao Zhang, Shunquan Tan, Jiwu Huang. 1260-1267 [doi]
- NFDP: Enabling Noise-Adaptive and Fast-Converging Privacy Protection in Graph Neural Network TrainingHang Chen, Bo Yin 0004, Binyao Xu. 1268-1274 [doi]
- An Adaptive Fast Recovery Scheme Based on Checkpoints: Analysis and Application in Asymmetric Multiprocessor SystemsJingjing Hu, Yu Li, Yuanhang Sun, Chidan Zhu, Qinrang Liu, Jiangxing Wu. 1275-1282 [doi]
- Privacy-Preserving Average Consensus by One-Step PerturbationHanyu Zhao, Yinyan Zhang. 1283-1290 [doi]
- A Blockchain-Enabled AIoT Framework for Secure Metaverse in Wireless Communication NetworksDanhuai Zhao, Chen Tian, Zhenyu Ju, Yi Rong, Xiaoming He, Wanting Yang. 1291-1297 [doi]
- Privacy-Preserving Distributed Optimal Consensus of High-Order Nonlinear Multi-Agent SystemsYuxuan Xiong, Yinyan Zhang. 1298-1306 [doi]
- FABA: Breaking Defenses in Production-Grade Federated Learning for Mobile Malware Detection ServicesXingyu Lu, Yang Cao. 1307-1316 [doi]
- PDD-FANs: Personalized Decentralized Federated Adversarial Networks with Defense Mechanism in Non-IID SettingXinguang Wang, Nguyen Linh-Trung, Oliver Y. Chen, Jeroen Van Schependom, Stijn Denissen, Guy Nagels. 1317-1326 [doi]
- PLAA: Packet-level Adversarial Attacks in Network Traffic DetectionJinhao You, Zan Zhou 0001, Shujie Yang, Yi Sun 0006, Lei Zhang, Changqiao Xu. 1327-1336 [doi]
- Adaptive Temperature-Enhanced Hypergraph Contrastive Learning with Reliable Data Sampling AugmentationJunzheng Li, Hongtao Yu, Ruiyang Huang, Suchang Yang. 1337-1342 [doi]
- SEMA: A Structural Entropy Guided Multimodal Framework for Adversarial Face AttacksRuixin Song, Youliang Tian, Mengqian Li, Ze Yang. 1343-1350 [doi]
- Location Privacy Protection for Network-RTK VRS Positioning Users via Mobile NetworksRuoting Xiong, Yi Ren 0001, Xin Shi, Wei Ren 0002, Gerard Parr. 1351-1356 [doi]
- A Robust and Efficient Authentication Protocol for Intelligent Systems in Smart Healthcare IoMTZaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Junchao Ma, Zaid Alaa Hussien, Ali Hasan Ali, Husam A. Neamah, Ahmed Ali Ahmed. 1357-1364 [doi]
- Pure Object Detection for Text-CAPTCHAs - YOVO: A Lightweight Recognition Model and Annotation Framework Derived from YOLOv8nDisen Tang. 1365-1373 [doi]
- FDLLM: A Dedicated Detector for Black-Box LLMs FingerprintingZhiyuan Fu, Junfan Chen, Lan Zhang 0008, Ting Yang, Jun Niu, Hongyu Sun, Ruidong Li 0001, Peng Liu 0005, Jice Wang, Fannv He, Yuqing Zhang 0001. 1374-1379 [doi]
- Safety-Aware DRL Training Based on Reachability AnalysisYixuan Yang, Min Zhang. 1380-1387 [doi]
- ETCFF: An Encrypted Traffic Classification Method Based on Fusion FeaturesZhipeng Fu, Fanping Zeng. 1388-1395 [doi]
- Privacy-Assured Analytics on Decentralized Graphs:The Case of Graph LearningLongji Li, Yifeng Zheng 0001, Songlei Wang, Zhongyun Hua, Lei Xu 0015, Yansong Gao 0001. 1396-1405 [doi]
- FTE: Filter-Based Trust Evaluation for the Internet of VehiclesHai Lin 0006, Xingchen Zhu, Zhihong Chen, Yue Cao 0002. 1406-1415 [doi]
- Efficient and Dynamic Multi-Source Data Analytics over Encrypted Cloud Data with Bitmap-Based IndexingYuyang Wang, Wei Song, Ruisi Song, Yuan Shen, Xiaohui Wang. 1416-1424 [doi]
- PPFDroid: An Android Malware Detection Method Based on Pre-Training and Prompt-Based Fine-TuningXufeng Wang, Yuqi Ma, Hongxian Liu, Sanfeng Zhang. 1425-1434 [doi]
- CyberSOIE-LLM: Cybersecurity Semi-Open Information Extraction with Large Language ModelsXinzheng Liu, Zhaoyun Ding. 1435-1442 [doi]
- A Class of Semi-Supervised Weighted Nonnegative Matrix Factorization for Community DetectionShibo Jin, Shiqi Liu, Lujuan Dang. 1443-1450 [doi]
- TriDNet: 3D Reconstruction and Generalized Feature Disentanglement for Deepfake DetectionYaqi Liu, Hanhan Wang, Weichen Zhu, Kunbai Zhang, Chao Xia. 1451-1456 [doi]
- SafeMLLM: Extending Safety Alignment from Single-Modal LLMs to Multimodal LLMsDi Jiang, Xiaojie Zhu, Chi Chen 0001. 1457-1465 [doi]
- BayesFuzz: Bayesian-Based Greybox Fuzzing for Stateful ProtocolsJianwen Xiang, Junwei Jiang, Songsong Liao, Xueming Zhang, Rui Hao. 1466-1471 [doi]
- Attention-Inverse Perturbation: A Novel Adversarial Attack Strategy by Targeting Non-Attentive RegionsMing Zhang, Zhendong Wu, Hu Li, Jin Li, Ling Pang, Cheng Qian. 1472-1478 [doi]
- TSDAs: Enhanced Statistics-Based Query Recovery in Dynamic Searchable Symmetric Encryption via Probabilistic ModelingYikang Fan, Xiaojie Zhu, Chi Chen, Yong Li. 1479-1488 [doi]
- POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based AuthorizationAiyao Zhang, Xiaodong Lee, Zhixian Zhuang, Jiuqi Wei, Yufan Fu, Botao Peng. 1489-1498 [doi]
- Granular Ball and Curriculum Learning-Based Fuzzy Support Vector MachineZhenlei Wu, Xiaoqin Pan, Lei Zhou. 1499-1506 [doi]
- Exploring the Relationship Between Network Similarity and Transferability of Adversarial AttacksGerrit Klause, Niklas Bunzel. 1507-1512 [doi]
- Model Evaluation-Driven Aggregation: FedMEDA for Robust Non-IID Federated LearningBosong Zhang, Linna Zhang, Qian Sun, Hai Wang, Danyang Li. 1513-1521 [doi]
- Post-Quantum Cryptography for Secure Authentication Key Distribution in QKD NetworksFilip Lauterbach, Lukas Kapicak, Sergej Jakovlev, Miralem Mehic, Stefan Rass, Miroslav Voznák. 1522-1532 [doi]
- Fine-Grained Revocable Lattice-Based ABE: Dual User and Attribute Revocation with Low Overhead for Cloud EnvironmentsYuliang Liu, Yuan Liu, Yiwen Gao, Yongbin Zhou, Licheng Wang, Peng Gao. 1533-1540 [doi]
- TrustMonitor: A Secured Container Framework via Virtualization and Pointer Authentication for Cross-Domain Data SharingXin Wang, Yulun Song, Fan Zhang, Feng Qi, Yunlong Xie, Lin Sun. 1541-1552 [doi]
- Disguised Attack in the Metaverse: A New Threat to Avatar-Based Identity SecurityChen Zhang, Zhenyong Zhang, Cong Wang, Ruilong Deng. 1553-1560 [doi]
- Retrieval-Augmented Generation-Based Adaptive State Enhancement for Federated Split LearningBoyang Dong, Xiukun Yan, Kai Zeng. 1561-1568 [doi]
- Efficient and Secure Spatial Keyword Similarity Query with User PreferenceShen Du, Xinrui Ge, Chengliang Tian. 1569-1577 [doi]
- TrapLLM: An LLM-powered Interactive Log-based Honeypot for Real-world Network AttacksYunjun Ma, Gangyan Zeng, Peng Zhang, Yuchen Huang, Fuyuan Zhang, Ran Lin, Huan Qian. 1578-1585 [doi]
- An Efficient FHE-based Ciphertext Matrix Multiplication AlgorithmYihan Wang, Xiangjun Xue, Jingyong Liang, Donghai Guan, Çetin Kaya Koç. 1586-1591 [doi]
- Cross-Modal Collaborative Recovery: Breaking Multimodal Unlearnable Examples ProtectionRuijia Li, Zijiao Zhang, Ximin Huang, Hongwei Hu, Xining Gao. 1592-1597 [doi]
- A Systematic Approach to Predict the Impact of Cybersecurity Vulnerabilities Using LLMsAnders Mølmen Høst, Pierre Lison, Leon Moonen. 1598-1607 [doi]
- VLAH: A Lightweight and Verifiable Framework for Approximate Nearest Neighbor Search in High-Dimensional SpaceYiping Teng, Yuyao Tang, Gang Wang, Shiqing Wang, Changze Li, Liang Zhao. 1608-1616 [doi]
- Leveraging Cross-Layer Network Probing to Detect Stealth ServicesJiangyi Yin, Chenxu Wang 0006, Zhao Li 0010, Zhuojun Jiang, Jiangchao Chen, Dongfang Hao, Qingyun Liu 0001. 1617-1625 [doi]
- Post-Quantum Anonymity of Key Encapsulation Mechanism and Its Applications in Password Authenticated Key Exchange ProtocolsJiaYv An, Yankun Gao, Lei Han. 1626-1633 [doi]
- An Improved Vector Commitment Construction with Applications to SignaturesYalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen 0002, Sumanta Sarkar, Christopher J. P. Newton, Carsten Maple, Ugur-Ilker Atmaca. 1634-1639 [doi]
- User Demands Based Multi-Agent Reinforcement Learning Satellite Handover StrategyQiyun Yu, Yanrong Lu, WeiWei Jiang. 1640-1648 [doi]
- Privacy-preserving Location-Based Services with A New Private Information Retrieval SchemeXiaopang Wang, Lihui Wang, Limin Guo. 1649-1660 [doi]
- No Touch, No Trace: A Paradigm for Remote Voltage Side-Channel Attacks on FPGA-Based Computing PlatformsZhe Liu, Kun Zhou, Chengkai Chen, Jianfei Mao, Hongbing Cheng. 1661-1670 [doi]
- Automated Attack Graph Construction for Cross-host Threat Detection Using Cyber Threat IntelligenceChen Ling, Yifei Li, Ziqing Feng, Bin Liu, Qiuyun Wang, Liling Xin, Zhengwei Jiang, Huamin Feng. 1671-1678 [doi]
- Accelerating Privacy-Preserving Federated Learning in Large-Scale LEO Satellite SystemsBinquan Guo, Junteng Cao, Marie Siew, Bin Bin Chen 0001, Tony Q. S. Quek, Zhu Han 0001. 1679-1686 [doi]
- Toxic Ink on Immutable Paper: Content Moderation for Ethereum Input Data Messages (IDMs)Xihan Xiong, Zhipeng Wang 0009, Qin Wang 0008, William Knottenbelt. 1687-1696 [doi]
- SoK: Credential-Based Trust Management in Decentralized Ledger SystemsYanna Jiang, Haiyu Deng, Qin Wang 0008, Guangsheng Yu, Xu Wang 0004, Yilin Sai, Shiping Chen 0001, Wei Ni 0001, Ren Ping Liu 0001. 1697-1706 [doi]
- SERA: Semantic Entity Recognition and Alignment for Threat Intelligence RepresentationXinyu Liu, Tianbo Wang 0001, Chunhe Xia, Yingming Zeng, Ruidong Wang. 1707-1715 [doi]
- TGF-JA4: LLM-Aware Multi-Feature Temporal Graph For Malware Detection Under Concept DriftXinyan Chen, Yu Wang, Peishuai Sun, He Wang, Yuqing Zhang. 1716-1723 [doi]
- CrossMiner: Smart Contract Vulnerability Detection in Interactive ScenariosXiangfu Liu, Teng Huang 0001, Caiyan Tan, Jiahui Huang, Qiong Wang 0001, Yan Pang. 1724-1732 [doi]
- Adaptive Neuron Honeypot: Trapping Malicious Backdoors in Federated LearningXingyu Lu, Yang Cao. 1733-1741 [doi]
- Optimizing FHE-Based Secure Matrix Computation for Untrusted Cloud EnvironmentsYuanyuan Xie, Ming Luo, Han Wang, Mingsheng Wang. 1742-1751 [doi]
- CoDA: Cross-Domain Few-Shot Website Fingerprinting via Contrastive Prototype AlignmentYongxin Li, Yuwei Xu 0001, Xinhe Fan, Yujie Hou, Yali Yuan, Qiao Xiang, Guang Cheng 0001. 1752-1758 [doi]
- A Privacy-Preserving and Highly Fault-Tolerant Cross-Chain Atomic Swap SchemeWenjun Zhu, Jianan Hong, Yingjie Xue, Jiayue Zhou, Shiyao Wang. 1759-1764 [doi]
- Exploring Subtle Manipulation Vulnerabilities in Federated DistillationPeiyan Chen, Changsheng Wan, Hao Zou, Tian Wen, Zhiyuan Wu. 1765-1774 [doi]
- PACT: A Passive Accuracy-Based Trust Metric for Malicious Client Detection in Federated LearningSayedali Sheykholeslamzadeh, Dima Alhadidi. 1775-1781 [doi]
- LASEFlow: A Label-Aware Security Enhancement Framework for Serverless WorkflowsMinghui Chen, Keming Wang, Chenlin Huang, Fengyuan Yu, Renyu Yang, Hua Cheng, Mantun Chen. 1782-1790 [doi]
- A Dual-Stage Anomaly Detection Framework for Stealthy Attacks in 5G Core NetworksXin Feng, Cong Li, Weizhi Meng 0001, Zilong Wang 0001, Xinsheng Ji. 1791-1798 [doi]
- Detecting Content Rating Violations in Android Applications: A Vision-Language ApproachDishanika Denipitiyage, Bhanuka Silva, Suranga Seneviratne, Aruna Seneviratne, Sanjay Chawla. 1799-1808 [doi]
- A Comprehensive Analysis of the AKMA+ ProtocolYueming Li, Long Chen, Zhenfeng Zhang. 1809-1818 [doi]
- From Sample Generation to Efficacy Transfer: Optimization of Privacy-Preserving LLMs for Content ModerationMingYong Yin, Tong Liu, Hejun Wang, Yulong Wang, Run Yang. 1819-1828 [doi]
- MR-Patch: A Retrieval-Augmented Generation Approach for Patch Presence TestZirui Jiang, Yisen Wang 0011, Xingyu Bai, Jiajun Du, Tianchan Yang, Bing Zhu. 1829-1838 [doi]
- SwCC: A Swapped-Contrastive Clustering Learning for Few-shot Website Fingerprinting AttacksJing Bai, Gaopeng Gou, Zheyuan Gu, Wenqi Dong, Gang Xiong 0001, Zhen Li 0011, Zhenzhen Li, Qingya Yang. 1839-1848 [doi]
- FedPPA: Progressive Parameter Alignment for Personalized Federated LearningMaulidi Adi Prasetia, Muhamad Risqi U. Saputra, Guntur Dharma Putra. 1849-1856 [doi]
- Beyond Algorithmic Proofs: Towards Implementation-Level Provable SecurityJiahui Shang, Luning Zhang, Zhongxiang Zheng. 1857-1866 [doi]
- DFAFuzz: Fuzzing for Embedded JavaScript Virtual Machines with Type-Directed DFAHaiwei Lai, Baojian Hua. 1867-1876 [doi]
- Security Risks of Transpiling C Programs to RustSi Wu, Huyao Yang, Baojian Hua. 1877-1886 [doi]
- DoNotSurf - Low-Latency DNS IP TunnelingAlexandru Kiraly, Darius Bufnea. 1887-1894 [doi]
- VCR: Fast Private Set Intersection with Improved VOLE and CRT-BatchingWeizhan Jing, Xiaojun Chen 0004, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu 0060. 1895-1904 [doi]
- MVL-AD:A Multi-View Learning Framework for Class-Incremental Unknown Attack DetectionXuKui Li, Guang Cheng, Wei Chen, Zhen Zhang, Zechen Xu, Xing Qiu. 1905-1913 [doi]
- Traceable and Revocable Key-Policy Attribute-Based Encryption scheme from LatticesYanqi Ma, Yuan Liu, Yongbin Zhou, Yiwen Gao. 1914-1920 [doi]
- Secure Non-Interactive Authentication in Satellite Networks Using Time Lock EncryptionXinhong Hei 0001, Xi Zuo, Yichuan Wang 0003, Mengjie Tian, Yanhua Feng. 1921-1928 [doi]
- Intrusion Detection via Federated Learning: Tackling Non-IID Data and Poisoning AttacksQuan Li, Yuhong Li. 1929-1935 [doi]
- PathFed: Trustworthy and Efficient Federated Aggregation via Path AttentionManzhou Li, Xinjin Ge, Yan Li, Yan Zhang. 1936-1943 [doi]
- High-fidelity Dual-layer Backdoor Watermarking Scheme based on Private Model EmbeddingLingyun Xiang, Fangbo Luo, Xiangli Jin. 1944-1951 [doi]
- Security of LLM Agents: A Case Study ApproachCasey Fan, Diyana Tial, Vladislav Dubrovenski, Mengtao Zhang, Yugyung Lee, Dianxiang Xu. 1952-1957 [doi]
- LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT DevicesMichael Eckel. 1958-1967 [doi]
- STAR-Shield: Self-Tuning Adaptive Rules for Web Application Firewall-as-a-Service via Multiple Large Language ModelsLetian Sha, Lei Xue, Nan Yi, Fu Xiao. 1968-1975 [doi]
- Recipient-Agnostic Hash Locks for Cross-Chain Auctions with Bitcoin BiddingFuyang Deng, Qianhong Wu, Bo Qin. 1976-1984 [doi]
- Broken Chains: An Empirical Analysis of DNS Resolution in IPv6-only EnvironmentsLei Zhao, Yujia Zhu, Baiyang Li, Yong Sun, Yuedong Zhang, Qingyun Liu 0001. 1985-1992 [doi]
- A Threshold Distributed Key Generation and Dynamic Key Management Scheme in Wireless Sensor NetworksWenhui Kong, Pengfei Wen, Bo Li, Heng Gao, Runshan Hu, Ning Hu, Xingjun Wang. 1993-2001 [doi]
- PoDIBC: Prevention of DrDoS Attacks Using Identity -Based Cryptography in Software-Defined Networking EnvironmentShain Saharan, Vishal Gupta. 2002-2009 [doi]
- Hierarchical Ring Signatures with Hidden Signature Functionality over Blockchain InfrastructureLukasz Krzywiecki, Witold Karas, Adam Niezgoda, Karol Niczyj. 2010-2015 [doi]
- Multi-Party Contract Signing Ensuring Trust in Complex TransactionsCatalin V. Bîrjoveanu, Mirela Bîrjoveanu. 2016-2024 [doi]
- FakeZero: Real-Time, Privacy-Preserving Misinformation Detection for Facebook and XSoufiane Essahli, Oussama Sarsar, Imane Fouad, Ahmed Bentajer, Anas Motii. 2025-2035 [doi]
- From static to dynamic risk indicators in predicting and detecting insider attacksN'Famoussa Kounon Nanamou, Rim Ben Salem, Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens. 2036-2043 [doi]
- Verifiable and Robust Distributed Deep Learning based on Blockchain InfrastructureMikolaj Pietrek, Lukasz Krzywiecki, Karol Niczyj, Witold Karas. 2044-2049 [doi]
- Zephyr: Secure and Non-interactive Two-Party Inference for TransformersWenchao Liu 0002, Huiyu Xie, Tanping Zhou, Shuo Chen, Weidong Zhong, Xiaoyuan Yang 0002. 2050-2059 [doi]
- Fairness-Constrained Optimization Attack in Federated LearningHarsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy. 2060-2065 [doi]
- TwinGuard: A Proactive RL-Driven Defence Framework for Digital Twin-Enabled O-RAN SecurityNeha Gupta, Liam O'Driscoll, Taneya Sharma, Mohammad Shojafar, Chuan Heng Foh, Ioana Boureanu, Helen Treharne, Sotiris Moschoyiannis. 2066-2071 [doi]
- Leader-Follower Federated Learning Framework: Heterogeneous Federated Learning based on Asymmetric DistillationLina Ge, Haisong Zhu, Ming Jiang, Zhe Wang. 2072-2077 [doi]
- LLM-Assisted IDOR Detection in Hospital Mini-Programs: Risks to PII and PHIJiawen Sun, Rui Tian, Shangru Zhao, Xiangming Zhou, He Wang, Yuqing Zhang. 2078-2086 [doi]
- AuthVR: Securing Authentication Against Shoulder Surfing and Keystroke Inference Attacks using Virtual RealityMd Yeasin Ali, Touhid Islam Udoy, Md. Ishmam Tasin, Masum Alam Nahid, Fairuz Rahaman Chowdhury, Farida Chowdhury, Md Sadek Ferdous. 2087-2096 [doi]
- LDInfer: Landmarks Inference-Based for Facial Forgery Detection of Different QualityJiaxin Jiang, Zhiwen Chen, Hui Zhou 0014, Wenjun Yan, Tianshuo Jiao, Bohan Tan, Zhuo Zhang, Hao Chen 0051, Zheng Qin 0001. 2097-2104 [doi]
- Comparing Reconstruction Attacks on Pretrained Versus Full Fine-tuned Large Language Model Embeddings on Homo Sapiens Splice Sites Genomic DataReem Al-Saidi, Erman Ayday, Ziad Kobti. 2105-2114 [doi]
- GMFuzz: Integrating Hierarchical Mutation and Fidelity Constraints for Coverage-Guided DNN Security TestingYue Cui, Guangshun Li, Kexin Yang, Junhua Wu. 2115-2122 [doi]
- SSRCorr: A Self-Supervised Robust Flow Representation Learning Framework for Flow Correlation Attacks on TorChen Chen, Mengyan Liu, Zhong Guan, Yaochen Ren, Yanbo Wu, Yangyang Guan, Zhen Li 0011, Gaopeng Gou, Junzheng Shi. 2123-2130 [doi]
- RegMix: Adversarial Mutual and Generalization Regularization for Enhancing DNN RobustnessZhenyu Liu, Varun Ojha. 2131-2138 [doi]
- Towards a Deep Understanding and Practical Guideline on the SameSite PolicyShuang Wu, Ying Yu, Yan Liu, Xiangyu Gao, Zhe Qu. 2139-2148 [doi]
- A New End-to-End Encrypted Image Retrieval Scheme in Cloud EnvironmentYanfeng Chen, Jing Liang, Hongliang He 0004, Peiya Li. 2149-2155 [doi]
- Real-Time Forgery Detection via Dynamic Frequency-Domain Selection and Phoneme AlignmentWenbin Li, Peng Yang, Xiaoyu Geng, Kesong Wu, Hongtao Yu. 2156-2162 [doi]
- FaultSpy: On the Insecurity of SPDM Protocols under Fault InjectionPeiyao Sun, Qifan Wang, David F. Oswald, Mark Dermot Ryan, Vladimiro Sassone, Ahmad Atamli. 2163-2172 [doi]
- QUICkly Running Out of Money: Evaluating QUIC Resilience to Traffic Inflating AttacksGiovanni Menon, Enrico Bassetti, Mauro Conti. 2173-2180 [doi]
- CatPoison: Category-Oriented Knowledge Poisoning Attacks in Retrieval-Augmented Generation SystemsHaiTao Mei, Zhangzhuo Du, Chao Cai, Chi Cheng, Jian Chen. 2181-2189 [doi]
- CyberNER: A Harmonized STIX Corpus for Cybersecurity Named Entity RecognitionYasir Ech-Chammakhy, Anas Motii, Anass Rabii, Oussama Azrara, Jaafar Chbili. 2190-2197 [doi]
- L2M-AID: Autonomous Cyber-Physical Defense by Fusing Semantic Reasoning of Large Language Models with Multi-Agent Reinforcement LearningTianxiang Xu, Zhichao Wen, Xinyu Zhao, Jun Wang, Yan Li, Chang Liu. 2198-2203 [doi]
- DeFiAD: A Unified Method for Early-Stage Domain Abuse Detection Through Automated Deep Feature InteractionZhaojun Dai, Xiaodong Lee, Yufan Fu, Botao Peng. 2204-2213 [doi]
- ORThrus: Detecting Deep Learning Compiler Bugs via Optimization Resistance TransformationsTongwei Zhang, Baojian Hua. 2214-2223 [doi]
- Improved Differential-Linear Distinguishes on the ChaCha256 Stream CipherHonglei Wang, Lin Ding, Zhengting Li, Xinhai Wang. 2224-2230 [doi]
- A Watermarking Framework for Secure Distribution of Meteorological ImagesYue Wu, FengHua Li, Feng Lu, Zifu Li, Yixuan Zhang, Yanru He. 2231-2238 [doi]
- Pruning for Security: Mitigating Stealthy Bit-Flip Attacks with Efficiency GainsHao Ying, Jiajun Guo, Xinyue Yu, Zhezhao Yang, Tianqi Shi, Jie Xiao. 2239-2246 [doi]
- Privacy-Preserving and Control-Compliant Authenticated Access for the AI-Enabled Industrial Internet of ThingsQing Fan, Yumeng Xie, Zhitao Guan, Yongshuang Wei, Yajie Wang, Chuan Zhang 0003, Liehuang Zhu. 2247-2258 [doi]
- Jailbreaking Multimodal Large Language Models via Consistent Cross-Modal BackgroundsMeng Yang, Peirou Liang, Zhiqian Wu, Yong Liao. 2259-2266 [doi]
- Two-Tier Batch Data Integrity Verification with Identity-Based Signatures and Privacy Preservation in Cloud-Edge-End ArchitectureXiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Xiaolin Chang. 2267-2272 [doi]
- Incorporating Statistic and Semantic Dependencies for Enhancing the Robustness of Android Malware DetectionLingyu Qiu, Zhen Liu 0017, Bitao Peng, Ruoyu Wang 0002, Changji Wang, Qingqing Gan. 2273-2282 [doi]
- 3FL: Label-Free and Heterogeneity-Robust Defense for Federated Learning via Distilled Reference Model against Data Poisoning AttacksHongliang Yin, Hongjiao Li. 2283-2290 [doi]
- TAR - PCH: Traceable and Revocable Blockchain Rewriting via Partial Policy-Hiding Chameleon Hashing under Cloud AssistanceLifeng Guo, Jingjing Xie, Runtao Zhang, Wei-Chuen Yau. 2291-2300 [doi]
- NFD-TRG: Network Flow Detection via Traffic Relationship Graphs with Statistical Feature EmbeddingMingshu He, Xiaowei Zhao, Liu Yang 0016. 2301-2310 [doi]
- A Transferable Adversarial Attack Framework for Object Detection via Spatial-Frequency Information MaskingZhipeng Lyu, Xiumei Li, Junmei Sun. 2311-2318 [doi]
- FST-AD: Anomaly Detection for Cyber-Physical Systems via Frequency-Spatio-Temporal GNNsZhenya Chen, Xueying Bian, Ming Yang 0023, Chensheng Liu, Xiaoming Wu, Sihan Lu. 2319-2326 [doi]
- Model Reduction of Colored Petri Nets Based on Unrelated TransitionsZhen Gao, Tao Sun. 2327-2336 [doi]
- FBFISADetector: A Method based on Filter Mechanism to detect the Instruction Set Architecture of Monolithic FirmwareQing Yang, Shangru Zhao, Yuqing Zhang. 2337-2345 [doi]
- A Heterogeneous GNN Based Trust Evaluation Method for Remote Desktop AccessHaishuo Zhang, Huiran Yang, Hongjia Li, Yan Zhang, Peng Chen, Weiping Wang, Ding Tang. 2346-2354 [doi]
- Hybrid Fault Attack on Grain-128AEAD: Signature or Machine Learning Localization with Bandit-Guided RecoveryYa-lin, Iftekhar Salam. 2355-2362 [doi]
- Towards System-of-Systems Bill of Material Solution for Vulnerability Operational Impact AnalysisLucas Tesson, Jamal El Hachem, Patrice Guillou, Jérémy Buisson. 2363-2372 [doi]
- Assessing the Impact of Post-Quantum Digital Signature Algorithms on BlockchainsAlison Gonçalves Schemitt, Henrique Fan da Silva, Roben Castagna Lunardi, Diego Kreutz, Rodrigo Brandão Mansilha, Avelino Francisco Zorzo. 2373-2380 [doi]
- Trust-Aware Rapid Emergency Service Recovery for Low-Altitude Intelligent Networking via Transformer-Enhanced Reinforcement LearningLixin Zhang, Peng Yu 0001, Chaochao Li, Can Tan, Xu Chen, Dingshi Liao. 2381-2386 [doi]
- Adaptive Cooperative Spectrum Sharing in HSTNs with Hardware Impairments and Realistic Fading for Enhanced ReliabilityAreeb Saldin, Ammar Hawbani, Yunchong Guan, Yunhe Sun, Saeed Hamood Alsamhi, Liang Zhao 0004. 2387-2392 [doi]
- Improving Reliability of Electric-Vehicle Charging Service: A Scalable Modeling ApproachXiuping Li, Yong Li, Yangbai Zhang, Xiaowei Li, Xiaolin Chang. 2393-2398 [doi]
- Hotness Strategy based Secure Cross-user Deduplication for Cloud StorageLiangyu Zhang, Junyu Cheng, Xin Tang, Jiaxin Li. 2399-2406 [doi]
- DataLineage RCA: Root Cause Diagnosis for Data Lineage Issues Using Large Language Model-Based AgentsXin Yi, Shangru Zhao, Yuqing Zhang. 2407-2412 [doi]
- Comparative Analysis of Cross-Border Data Flow Policies: EU, US, and ChinaZhoujie Rong, Jingfeng Rong, Yuqing Zhang. 2413-2418 [doi]
- Review of Defect Detection Techniques for Power Information SystemsXingwang Dou, Shanquan Yang, Chaoyang Zhu, Ziqing Lin, Baiji Hu, Jice Wang, Hongyu Sun, Fannv He, Anmin Fu, Yuqing Zhang 0001. 2419-2426 [doi]
- Log Intelligent Knowledge Base Construction Method Based On Streaming Graph FusionXinzhuo Xue, Shangru Zhao, Yuqing Zhang. 2427-2432 [doi]
- OSSDetector: Towards a More Accurate Approach for C/C++ Third-Party Library DetectionXiang Hai, Jia Zeng, Zhiyuan Fu, Siyu Chen, Yansong Shi, Hongyu Sun, Jice Wang, Fannv He, Yuqing Zhang 0001. 2433-2438 [doi]
- Beyond Likes: Unraveling the Veil of Personal Data Exposure in Mobile Application GUIsJice Wang, Fannv He, Yue Fang, Yuqing Zhang 0001. 2439-2444 [doi]
- MAD-OOD: A Deep Learning Cluster-Driven Framework for an Out-of-Distribution Malware Detection and ClassificationTosin Ige, Christopher Kiekintveld, Aritran Piplai, Asif Rahman, Olukunle Kolade, Sasidhar Kunapuli. 2445-2450 [doi]
- Multi-keyword Searchable Encryption Scheme with Policy Hiding Support for User Revocation in Cloud EnvironmentXuan Zhang, Suzhen Cao, Tianhao Zhang, Guorui Liu, Lei Han, Xiaodong Yang. 2451-2460 [doi]
- iSME: Image Steganography with MECS Based on GANYamin Li, Chen Zeng, Liu Duan, Xuansong Li, Can Li, Haofeng Ju. 2461-2470 [doi]
- Diffusion-Driven Video Steganography: A Three-Stage Framework for Robust and High-Capacity Data ConcealmentYuning Zhou, Min Wu, Hongxiang Ji, Ziwei Wang. 2471-2478 [doi]
- DAPUR: A Decentralized Anonymous Payment Under Regulation from BitcoinYu Zhang. 2479-2485 [doi]
- Evasion Attacks in Continual LearningNiklas Bunzel, Aino Schwarte. 2486-2491 [doi]
- Verifiable Outsourced CP-ABE with Authority Audit for Public Computing DevicesDan Gao, Huanhuan Xu. 2492-2499 [doi]
- SemiFlow: Website Fingerprinting Using Semi-Supervised LearningShanpeng Lv, Ying Yang, Yuling Huang. 2500-2508 [doi]
- Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware DetectionSamy Bettaieb, Serena Lucca, Charles-Henry Bertrand Van Ouytsel, Etienne Rivière. 2509-2516 [doi]
- A Region Dual-Factor Aware Federated Learning Framework for NWDAF in B5G/6G Core NetworkMingchuang Zhang, Hongbo Tang, Wei You, Xingxing Liao, Jie Yang 0085, Hang Qiu 0003. 2517-2526 [doi]
- TeGCN:Temporal Evolution-Aware Trust Evaluation for Dynamic Social NetworksChunhui Liu, GeMing Xia, Chaodong Yu, Yuze Zhang, Jiawen Wu, Hongwei Huang. 2527-2535 [doi]
- An Evolutionary Algorithm with Advanced Initial Solutions for Association Rules HidingJiaran Qiu, Peng Cheng, Jun Zhou. 2536-2543 [doi]
- Blockchain-Verified Attribute-Based Keyword Search with User-Generated Keys in Multi-owner Setting for IoTZongmin Wang, Qiang Wang 0005, Fucai Zhou, Bao Li 0005, Jian Xu 0004, Haoyan Huang. 2544-2551 [doi]
- Goal Hijacking Attack on Large Language Models via Pseudo-Conversation InjectionZheng Chen, Buhui Yao. 2552-2557 [doi]
- A Privacy-Preserving Aggregation Scheme Based on Dual-Masking and Threshold Signature in Computing Power NetworkXiaodong Yang, Junru He, Na Wang, Duojia Wang, Yuanxin Zhang, Yatong Zhong. 2558-2565 [doi]
- ProfilE: Self-Supervised Communication Relationship Profiling for Imbalanced Smart Grid Anomaly DetectionHaimiao Li, Changbo Tian, Runqing Zhang, Shiyi Yuan, Bo Sun. 2566-2573 [doi]
- Bad-PoseDiff: Pose-Guided Backdoor Triggering in Diffusion ModelsJiahao Chen, Yu Pan, Lin Wang, Yi Du. 2574-2581 [doi]
- Fair Data Exchange Scheme with Cryptographic Commitment and Smart Contract for Data TradingXiaomei Yan, Yong Li, Yan Zhu. 2582-2587 [doi]
- 3G: A Privacy-Preserving Password Guessing Model via Cross-Task Feature SharingWei Yu, Cheng Tan, Lvlin Ni, Chengyu Du, Cheng Liu, Qingbing Ji. 2588-2597 [doi]
- SATA: A Distributed Stealthy and Persistent Backdoor Attack via Trigger Association in Federated LearningXin Ai, Yang Cao. 2598-2605 [doi]
- PrivFGL: Differentially Private Federated Graph Learning via Personalized Data TransformationSongyan Zhang, Hanyu Lu, Hongfa Ding. 2606-2611 [doi]
- A Blockchain-Based Spectrum Allocation Scheme Based on Beneficial Consensus MechanismPeiliang Zuo, Yuexiang Wang, Zhen Fang, Xuegang Wang. 2612-2621 [doi]
- Learning to Co-Design Routing and Processing in Computing Power NetworksYe Qin, Kexian Liu, Jianli Liu, Xiaolong Hu, Zejun Lan, Jianfeng Guan. 2622-2631 [doi]
- Ghost Vehicle: A Game-Theoretical Attack Strategy Targeting CAV PlatoonsLanai Huang, Winston Ellis, Sana Belguith. 2632-2641 [doi]
- IAGNN: Mitigating Quantity and Topological Imbalance for Fair Graph LearningYangqi Liu, Xuemin Wang, Liang Chang, Heng Yang. 2642-2651 [doi]
- GraphAss: Multi-dimensional dependency semantics graph-based Automobile software vulnerability detection methodQingwen Han, ShiYu Sun, Jianmei Lei, Lingqiu Zeng, Yang Liu, Lei Ye 0001, Kaiwei Fan. 2652-2659 [doi]
- SPFuzz: Program-State-Aware Fuzzing for Mail ProtocolsHangzhou Fei, Xiaobing Xiong, Hui Shu. 2660-2669 [doi]
- A New Key Expansion Scheme for SM4 based on Sponge ConstructionXin Yu, Juan Xu, Xiaoxiao Zhang, Jian Lei. 2670-2675 [doi]
- Improved Rsqrt for Faster Secure Neural Networks InferenceJiafu Liu, YeDong, Yuqi Zhou, Jun Huang. 2676-2682 [doi]
- GPEA: Grad-CAM-Guided Perceptibility-Reduced Ensemble Attack in Object DetectionZhengheng Li, Hui Xia, Rui Zhang, Mengyuan Song, Aoqi Ruan, Shaoqiang Wang. 2683-2688 [doi]
- BinFuse: Binary Code Similarity Detection via Lightweight Fused Semantic EmbeddingShengjia Chang, Baojiang Cui, Shaocong Feng. 2689-2696 [doi]
- Robust Recovery Method Against Malicious Face Swapping in Online Social NetworksHuaquan Yang, Shan Bian, Gongwei Weng. 2697-2702 [doi]
- FedProbe: Attacking Federated Model Ownership Verification via Fine-Grained Watermark Detection and ErasureKunlong Jin, Youliang Tian, Lujia Shi. 2703-2710 [doi]
- Improving the SEU Reliability of TMR Designs Implemented on SRAM-Based FPGAs with Redundant Module RestructuringChidan Zhu, Jingjing Hu, Yuanhang Sun, Yu Li. 2711-2718 [doi]
- CLEK-HP: A certificate-less efficient key agreement scheme based on hybrid PUF in VANETsJunfeng Tian, Tingting Jin, Ni Rui. 2719-2728 [doi]
- CAHS-Attack: CLIP-Aware Heuristic Search Attack Method for Stable DiffusionShuhan Xia, Jing Dai, Hui Ouyang, Yadong Shang, Dongxiao Zhao, Peipei Li. 2729-2734 [doi]
- GVTMC: A Novel Cryptocurrency Mining Traffic Classification MethodYujie Lai, Huiyong Liu, Wei Zhang. 2735-2742 [doi]
- PPIA-MTL: Efficient Property Proportion Inference Attacks on Tabular Generative Models via Multi-Task LearningNinghui Zhang, Chun Long, Jing Li, Fan Yang, Yuhao Fu, Wei Wan, Haojie Nie, Xingbo Pan. 2743-2752 [doi]
- Ultra-Reliable Routing Strategy for Large-Scale Optical Free-Space Low Earth Orbit Satellite NetworksHaowen Wu, Wei Ren, Yong Wang, Yan Zhang. 2753-2758 [doi]
- Hybrid Multi-granularity Reconstruction and Contrastive Learning for Graph Anomaly DetectionMingjie Yu, Jiong Yu. 2759-2765 [doi]
- A High-Quality Data-Driven Incentive Mechanism for Multi-Platform Mobile CrowdsensingMinghe Zhang, Xuanyu Wang, Lihong Chen, Gang Liu. 2766-2773 [doi]
- WSDNet: A Dual-Branch Wavelet-Structured Network for Image Forgery DetectionXiao Ke, Song Yun. 2774-2780 [doi]
- Passkeys in Practice: An Empirical Evaluation of FIDO2/WebAuthn Compliance and InteroperabilityAhmed Mahfouz, Rawad Abdulghafor, Alaa A. K. Ismaeel. 2781-2788 [doi]
- A Trustworthy and Efficient Inference Scheduling Scheme for Edge MoEs Using DRLJinyang Zhang, Shengli Pan, Shanwu Chen, Anandarup Roy, Peng Li. 2789-2794 [doi]
- 5GC-PDA:A Novel Proactive Defense Architecture for Enhancing 5G Core Network SecurityXingxing Liao, Wei You, Jie Yang, Jian Tao, Runhan Feng, Xinsheng Ji. 2795-2802 [doi]
- Capodoglio: Tackling Multi-Armed Bandit Jamming AttacksShuo Wang, Alessandro Brighente, Valeria Loscri, Junqing Zhang, Mauro Conti. 2803-2810 [doi]
- Asteroid X: A Decentralized Finance Platform for Mining SectorsBen Chen, Xingyu Yang, Hui Cui 0001, Joseph K. Liu. 2811-2817 [doi]
- A Cross-Layer Attribution Method Based on Cyber-Physical Coupling Under Load Redistribution AttackZhenya Chen, Rongbin Yao, Chensheng Liu, Ming Yang 0023, Xiaoming Wu, Wenting Wang. 2818-2826 [doi]
- Splicing Strategy based Chunk Level Deduplication Scheme for Cloud StorageXin Tang, Haixin Chen, Siyu He, Yamin Yang, Luchao Jin. 2827-2834 [doi]
- Lattice-based Dynamic Privacy-preserving Cross-chain Payment SchemeBing Zhang, Guijuan Wang, Zhongyuan Yu, Anming Dong, Hongliang Zhang. 2835-2842 [doi]
- Early Classification and Improved Performance: A Multi-Model Serial Encrypted Traffic Classification FrameworkJinhui Li, Guang Cheng, Zihan Chen. 2843-2851 [doi]
- RESA: RLWE-Based Efficient Secure Aggregation For Federated LearningZiming Wang, Liang Zhang, Hang Zhou, Haibin Kan, Jiheng Zhang. 2852-2859 [doi]
- PIRL: A Robust and Privacy-Preserving Learning Method from an Information-Theoretic PerspectiveGuangyuan Liu 0002, Shigong Long. 2860-2867 [doi]
- Log2Sig: Frequency-Aware Insider Threat Detection via Multivariate Behavioral Signal DecompositionKaichuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li 0003, Guanggang Geng. 2868-2876 [doi]
- Multi-Channel Attacks on Dilithium: Bridging Power Gaps with EM-Guided Synthetic TracesQikang Fan, Jingdian Ming, Yiwen Gao, Yongbin Zhou. 2877-2884 [doi]
- FedDHKD: A Lightweight Federated Learning Framework Based on Dynamic Hierarchical Knowledge Distillation for 5G IoTJunxuan Lv, Qiwei Zhao, Hongbo Tang, Hang Qiu 0003, Wei You, Yu Zhao. 2885-2893 [doi]
- Engine-Agnostic Evaluation of Container Isolation CharacteristicsFelix Wruck, Maximilian Peisl, Michael Weiß. 2894-2903 [doi]
- Zero Trust-Based Dynamic and Continuous Access Control for Mobile DevicesXiaoya Cao, Zhenya Chen, Ming Yang, Xin Wang, Xiaoming Wu. 2904-2910 [doi]
- HOT-SPT: Hierarchical Optimal Transport for Robust and Fair Cross-Domain Video Expression RecognitionQianli Zhao, Zhen Wang, Linlin Zong, Chao Jin, Xiaohuan Li. 2911-2916 [doi]
- PSI-TR-ABE: A Traceable and Policy-Hidden Attribute-Based Encryption Scheme for Medical Data SharingYe Feng, Siqi Lu, Liujia Cai, Xingyun Hu, Xinxin Wang, Yongjuan Wang. 2917-2926 [doi]
- Efficient Zero-Knowledge Proofs for Typical Non-Linear Functions in Machine LearningShengqi Jin, Weihan Li, Zongyang Zhang. 2927-2936 [doi]
- Clue Discovery based on Multi-modal Entity Alignment enhanced by Image Generation and Structure EmbeddingChunqing Yu, Chengxiang Tan, Zhishuo Zhang, Jiacheng Xu, Jianpeng Hu, Xiangyun Kong. 2937-2943 [doi]
- DeepLancet: Effectively Detecting Deep Learning Library Bugs via LLM-assisted Testcase GenerationZihao Luo, Baojian Hua. 2944-2953 [doi]
- Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICEMichael Eckel, Janik Gorbracht, Georgios Gkoktsis, Tobias Kaupat. 2954-2965 [doi]
- Layered Website Fingerprinting Defense Against Adversarial TrainingYong Zeng 0002, Jiaze Li, Hao Liu, Zhihong Liu, Jianfeng Ma 0001. 2966-2971 [doi]
- An Autoencoder-Based Black-Box Adversarial False Data Injection Attack Against Smart GridJuntao Zhang, Chensheng Liu, Xin Wang 0044, Ming Yang 0023, Xiaoming Wu. 2972-2977 [doi]
- *Su Hang, Zhaozhong Guo, MaoZhi Xu. 2978-2985 [doi]
- Diverse Fault Attacks on Dilithium and Variant Implementation: Skipping, Aborting and ZeroingHao Yuan, Yuejun Liu, Jingdian Ming, Yongbin Zhou. 2986-2993 [doi]
- LLM-Guided Mutation Location Selection for Vulnerability-Aware JavaScript Engine FuzzingJiZhe Li, Yongjun Wang, Haoran Xu, Lin Peng, Muxin Xu, Tian Xia. 2994-2999 [doi]
- Combining Evolutionary Learning and Window Method for Finding Short Addition Chains for Large IntegersXiaopeng Zhao, Zhusen Liu, Jiawei Qian. 3000-3004 [doi]
- Privacy for AI Generated Images: Conditional Generative Adversarial Networks Trained Over Obfuscated DataKrzysztof Talalaj, Lukasz Krzywiecki, Marcin Zawada. 3005-3010 [doi]
- LDFS: LLMs with Dynamic Few-Shot for Offensive Language DetectionYimin Wang, Qian Huang, Kaizhi Wu, Kai Guo. 3011-3016 [doi]
- FedEdge: Federated Self-Supervised Graph Learning with Personalized Fine-Tuning for Node ClassificationZichao Deng, Han Yu. 3017-3023 [doi]
- A Real-Time Defense Framework Using PPPO in Deep Reinforcement Learning for CyberBattleSimYixuan Cao, Aniket Mahanti, Ranesh Naha. 3024-3031 [doi]
- VMPL-KMI: Protecting Kernel Module Integrity within Confidential VMsBenshan Mei, Wenhao Wang 0001, Dongdai Lin. 3032-3037 [doi]
- Validation of a Governance Framework Supporting Security Controls across Emerging SystemsMaysa Sinan, Mojtaba Shahin, Iqbal Gondal. 3038-3046 [doi]
- A Robust Federated Learning Framework Integrating Principal Component Analysis and Dual Detection MechanismsLina Ge, Jianwei Zhai, Qinchun Su. 3047-3052 [doi]
- HyBiGraph: Toward Multi-Order Malicious Encrypted Traffic Classification via Hyper-Bipartite Graph FusionYibin Zhou, Yunxiao Shi, Xiao Yang 0016, Da Xiao, Gaolei Li, Jianhua Li 0001. 3053-3062 [doi]
- A Privilege Creep-Aware Role Mining Method for Enhanced Access Control SecurityVincent Bittard, Rim Ben Salem, Ahmed Bouzid, Sara Imene Boucetta, Frédéric Cuppens, Nora Cuppens-Boulahia. 3063-3071 [doi]
- Semantic-Graph-Indistinguishability: A Novel Approach to Location Privacy Protection Under Road NetworksSai Wang, Huijuan Lian, Lei Shi, Gaolei Li, Yan Cao. 3072-3080 [doi]
- Robust Multi-Scale Gradient Estimation for Query-Efficient Black-box Adversarial AttackGuorong Wang, Jinchuan Tang, Zehua Ding, Youliang Tian. 3081-3086 [doi]
- DTAHF-Net: Domain-Trust Alignment and Hierarchical Fusion for Multimodal Fake News DetectionLexin Feng, Jiayin Wei, Youjun Lu, Fujian Feng. 3087-3096 [doi]
- SecuRecNet-IoT: Adaptive Secure Reconfiguration and Session-Aware Communication in IoT Edge NetworksOsama Mohammed Dighriri, Priyadarsi Nanda, Manoranjan Mohanty, Bashair Alrashed, Ibrahim Haddadi. 3097-3102 [doi]
- IEPIS: An Intelligent Endpoint Protection and Insight SystemRahul K. Patel, Puya Pakshad, Sumeet Batra, Shubhayan Das, Alapan Ghosh. 3103-3110 [doi]
- Detecting Multi-Turn Jailbreak Attacks in Large Language Models via Linear ProbesJorge Marina-Metola, José María de Fuentes, Lorena González-Manzano, Luis Ibañez-Lissen. 3111-3120 [doi]
- DerandomPre: An LLM-based Stability Enhancement Method for Network Protocol FuzzingYifan Zhang, Kailong Zhu, Qian Chen, Zixiong Li, Yuliang Lu, Yingchun Chen. 3121-3130 [doi]
- Proactive Federated Backdoor Unlearning via Two-Phase Optimization and State ReplacementZe Chai, Yijing Lin, Zhipeng Gao 0001, Zhiqiang Xie, Dusit Niyato. 3131-3136 [doi]
- AdaptiveWatermark: Dynamic Watermarking for Large Language Models with AgentQingze Peng, Daifeng Li. 3137-3142 [doi]
- Contrasting Crypto and Exfiltration Ransomware with Shamir's Secret Sharing Data FloodingDaniele D'Ugo, Saverio Giallorenzo, Simone Melloni. 3143-3151 [doi]
- GAPPO: Graph-Attention Enhanced Reinforcement Learning for Efficient Attack Path PlanningXiuping Li, Yong Li, Yangbai Zhang, Wen Sun, Xiaowei Li, Junchao Fan, Xiaolin Chang. 3152-3157 [doi]
- Fed-CMA: Federated Clustering and Matched Averaging for Personalized Intra-Vehicular Network Intrusion DetectionLouis Agnese, Xiaojie Lin, Guangsheng Yu, Xu Wang. 3158-3163 [doi]
- TrustIoT: Building Trust in Human-Thing Interactions for Healthcare Systems Using Machine LearningAbir Al-Ansari, Kristiaan D'Août, Valerio Selis. 3164-3170 [doi]
- HiFi-XAI: A Fidelity-Aware, LLM-Powered Framework for Trustworthy Intrusion DetectionAvinash Awasthi, Pritam Vediya, Hemant Miranka, Ramesh Babu Battula, Priyadarsi Nanda. 3171-3176 [doi]
- Incentive-Compatible Pricing for Truthful Data SharingMingjian Tang 0002, Weiqi Wang 0003, Shui Yu 0001. 3177-3184 [doi]
- Secure Computation Scheme for the Intersection Area of Polygons Resistant to Malicious ParticipantsXin Liu 0013, Anyang Qi, Lanying Liang, Dan Luo, Yuchen Zhang, Wei Ye, Baohua Zhang 0004, Yu Gu 0010, Gang Xu, Xiubo Chen. 3185-3194 [doi]
- Enhancing Data Security in RISC-V Embedded Systems: A Lightweight ArchitectureDunkai Mao, Lifeng Xi, Fujia Zhang. 3195-3200 [doi]
- Online Reliability Assessment of Nuclear Power Components via Mechanistic and Data-Driven ModelingXiangyu Jiang, Yixiong Feng, Zhi-Wu Li 0001, MengChu Zhou, Xuanyu Wu, Jianrong Tan. 3201-3206 [doi]
- TrustSciAgent: Towards Rigorous and Trustworthy Agents for Scientific ResearchYang Li, Meng Wang, Mengting Zhang, Zhixiong Zhang, Guangyin Zhang, Hanyu Li. 3207-3214 [doi]
- Blockchain-Enabled Privacy-Preserving Medical Data Sharing with Verifiable Insurance EvaluationJunhan Li, Xiubo Chen, Gang Xu. 3215-3220 [doi]
- Human-Machine Collaborative Cognition for Intelligent Operation of Cascade Filtration Systems: A Dynamic Decision Framework Based on Fuzzy Inference and Uncertainty AnalysisZhengqin Zhu, Junjie Song, Peiyan Pan, Yixiong Feng, Zhifeng Zhang. 3221-3225 [doi]
- From Survey to Application Vision: LLM Watermarking Techniques and Prospects in Scientific ScenariosChen Yucheng, Li Yang, Li Qiao, Yajiao Wang, Wang Meng, Hanyu Li. 3226-3231 [doi]
- Optimization Design Method for Nets in Multi- Stage Filtration System of Nuclear Power Plant Using Cognitive Intelligence TechniquesPeiyan Pan, Zhifeng Zhang, Yixiong Feng, Zhengqin Zhu, Junjie Song, Jianrong Tan. 3232-3237 [doi]
- A Semantic-Aware Network Intelligence Framework for Anomaly Detection using Large Language ModelsWei Li, Jianjun Li, Hui Shao, Junjie Li, Wei Zhang. 3238-3242 [doi]
- DPDA: Decentralized Identity-Based Privacy-Preserving Data Aggregation for AIoTCan Zhang. 3243-3249 [doi]
- Adaptive Multi-Feature Hierarchical Framework for Generative Model AttributionRuoying Wang, Linghui Li, Xiaotian Si, Kaiguo Yuan, Zhaoyu Wang. 3250-3257 [doi]
- DCARL: Decoupled-Curriculum for Adversarial Robustness Learning under Long-Tailed DistributionsMingyang Chen, Linghui Li, Zhaoyu Wang, Kaiguo Yuan, Bingyu Li. 3258-3265 [doi]
- OmniNova: A General Multimodal Multi-Agent FrameworkBingzhen Li, Zihan Wang, Pengfei Du, Yupeng Jiang. 3266-3272 [doi]
- Transfer Learning based Fingerprint Database Reconstruction Scheme in Indoor Location ScenariosQian Miao, Hui Zhang, Weixin Wang, Yuanji Shi, Lihua Yang. 3273-3278 [doi]
- A Dynamic Low-cost 3D Indoor Localization Algorithm Based on Error Optimal EstimationQianqian Zhu, Hui Zhang, Yuewei Zhang, Yuanji Shi, Shuyi Wang. 3279-3284 [doi]
- Resource Allocation and Optimization in Low-altitude D2D Communication NetworksChangyuan Ji, Zongyan Li, Chen Yang, Hao Wang. 3285-3290 [doi]
- MIMO Channel Modeling Based on Physics-Constrained Generative Neural NetworksHanxiao Li, Hongmei Wang, Shuo Liu, Weilong Zhang. 3291-3296 [doi]
- Privacy Protection Method for 3D Trajectories Integrating Semantic InformationMengyao Zhang, Ding Mu, Zihan Wang, Na Fan. 3297-3302 [doi]
- 3D trajectory personalization privacy protection method based on multi-feature classification and spatio-temporal attentionDing Mu, Mengyao Zhang, Zihan Wang, Yexiong Shang. 3303-3308 [doi]
- Optimizing Spectrum Sharing in Low-Altitude Intelligent Networks: A Model-Based Reinforcement Learning ApproachTianle Li, Qingyu Liu, Peixi Peng. 3309-3315 [doi]
- CEE-MLIA: A Multi-Level Imbalance-Aware Framework for Contract Element ExtractionBingcheng Liu, Xiao Qian, Xiuxuan Shen. 3316-3321 [doi]
- Generating Structured BPMN Models from Smart Contracts Using LLMsLinlin Chen. 3322-3327 [doi]
- From Electronic Contracts to Smart Legal Contracts: A Template-Based ApproachHaoxiang Chen, Ning Zhang, Jiayue Liu. 3328-3333 [doi]
- Blockchain-Enhanced Random Access in Untrusted Wireless Networks: An Evolutionary Game AnalysisXinjian Li, Chang Wang, Yuwei Le, Yutong Wu, Hongwang Zhu, Jiaheng Wang 0001, Jianjun Zhang. 3334-3340 [doi]