Data Security and Privacy Protection
Third International Conference, DSPP 2025, Xi'an, China, October 16-18, 2025, Proceedings, Part I
Herausgegeben:Chen, Xiaofeng; Hu, Haibo; Wang, Ding
Data Security and Privacy Protection
Third International Conference, DSPP 2025, Xi'an, China, October 16-18, 2025, Proceedings, Part I
Herausgegeben:Chen, Xiaofeng; Hu, Haibo; Wang, Ding
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16 18, 2025.
The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions.
The papers are organized in the following topical sections:
Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and…mehr
Andere Kunden interessierten sich auch für
Data Security and Privacy Protection113,99 €
Data Security and Privacy Protection113,99 €
Financial Cryptography and Data Security38,99 €
Public-Key Cryptography - PKC 201638,99 €
Public-Key Cryptography -- PKC 201539,99 €
Progress in Cryptology - INDOCRYPT 201738,99 €
Public-Key Cryptography - PKC 201638,99 €-
-
-
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16 18, 2025.
The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions.
The papers are organized in the following topical sections:
Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and Technologies.
Part II: AI-based Security Applications and Technologies; Cryptographic Protocols Design and Analysis; Model Security and Copyright Protection.
The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions.
The papers are organized in the following topical sections:
Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and Technologies.
Part II: AI-based Security Applications and Technologies; Cryptographic Protocols Design and Analysis; Model Security and Copyright Protection.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 16176
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 89558378, 978-981-95-3181-3
- Seitenzahl: 544
- Erscheinungstermin: 16. Oktober 2025
- Englisch
- Abmessung: 235mm x 155mm x 30mm
- Gewicht: 814g
- ISBN-13: 9789819531813
- ISBN-10: 9819531810
- Artikelnr.: 75340769
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 16176
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 89558378, 978-981-95-3181-3
- Seitenzahl: 544
- Erscheinungstermin: 16. Oktober 2025
- Englisch
- Abmessung: 235mm x 155mm x 30mm
- Gewicht: 814g
- ISBN-13: 9789819531813
- ISBN-10: 9819531810
- Artikelnr.: 75340769
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.- AI and System Security.
.- Boosting Transferability of Adversarial Attacks On Vision Transformer .
.- DMD: Boosting Adversarial Transferability via Dynamic Momentum
Decay.
.- Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes.
.- PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory
Publishing Framework for Trustworthy AI Systems.
.- A Code Vulnerability Detection Method Integrating Pre-trained Model
and Graph Neural Network.
.- Blockchain and Related Technologies.
.- Covert Channels in Bitcoin: Concealing Senders via Transaction
Behavior Mimicry.
.- Hash Time-Locked Contract Scheme Based on Enclave-Based Agent
and Stealth Addresses.
.- Smart Contract Ponzi Detection via Contract Transaction Graph.
.- Evading AI-Based Detectors: A Hybrid Covert Communication Method
Based on Ethereum Transaction Amount and Address.
.- Hierarchical Byzantine Consensus for Election Security.
.- Towards Blockchain-Enabled Cybersecurity Risk Assessment for
Cyber-ship Systems.
.- Spectrum Resources Privacy-preserving Allocation and Certificate
Management Technology based on blockchain.
.- A Blockchain-Based Framework for UAVs in an Asynchronous Network
Environment.
.- BCDAC: Efficient Blockchain-based Cross Domain Access Control Scheme.
.- Privacy Preserving/Enhancing Technologies.
.- An Efficient Private Signaling with Function Secret Sharing.
.- Secure and Efficient Multi-Dimensional Task Matching in Spatial
Crowdsourcing.
.- PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data
Sharing and Efficient Aggregation.
.- Efficient Ranking, Order Statistics, and Sorting under (2, 2)-Threshold
Paillier.
.- Personalized Secure Anonymous Traceability Mechanism with
Pseudo-Random Hopping of Dynamic ID.
.- A Fully Homomorphic Encryption-Based KNN Classification Scheme
for Electric Vehicles Data.
.- A High-Precision and Scalable Location Privacy Query System Based
on FHE.
.- Cryptographic Primitives.
.- Secure Non-Interactive Decision Tree Evaluation via Fully
Homomorphic Encryption.
.- Strong Designated-Verifier zk-SNARKs.
.- Short Lattice-Based Linearly Homomorphic Signatures in the Standard
Model.
.- Kleptographic Fountain- Leakage via a Binary Erasure Channel .
.- Efficient Implementation of NTRU-based Key Encapsulation
Mechanism on Embedded Platform.
.- An Efficient Designated-Server Public-Key Encryption Scheme with
Keyword Search based on Lattices.
.- Privacy-Aware Federated Learning.
.- Personalized Federated Learning with Adaptive Weight Clustering.
.- FedVoD: A Robust Federated Learning Defense Strategy in Hybrid
Byzantine Attacks.
.- A Lightweight Data Leakage Defense Mechanism for Federated
Learning based on Stochastic Gradient Masking.
.- PHV-FL:A Personalized Hierarchical Verifiable Federated Learning
Scheme for Maritime Target Detection.
.- AI-based Security Applications and Technologies.
.- Chaos: Robust Spatio-Temporal Fusion for Generalizable APT
Provenance Tracing.
.- Boosting Transferability of Adversarial Attacks On Vision Transformer .
.- DMD: Boosting Adversarial Transferability via Dynamic Momentum
Decay.
.- Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes.
.- PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory
Publishing Framework for Trustworthy AI Systems.
.- A Code Vulnerability Detection Method Integrating Pre-trained Model
and Graph Neural Network.
.- Blockchain and Related Technologies.
.- Covert Channels in Bitcoin: Concealing Senders via Transaction
Behavior Mimicry.
.- Hash Time-Locked Contract Scheme Based on Enclave-Based Agent
and Stealth Addresses.
.- Smart Contract Ponzi Detection via Contract Transaction Graph.
.- Evading AI-Based Detectors: A Hybrid Covert Communication Method
Based on Ethereum Transaction Amount and Address.
.- Hierarchical Byzantine Consensus for Election Security.
.- Towards Blockchain-Enabled Cybersecurity Risk Assessment for
Cyber-ship Systems.
.- Spectrum Resources Privacy-preserving Allocation and Certificate
Management Technology based on blockchain.
.- A Blockchain-Based Framework for UAVs in an Asynchronous Network
Environment.
.- BCDAC: Efficient Blockchain-based Cross Domain Access Control Scheme.
.- Privacy Preserving/Enhancing Technologies.
.- An Efficient Private Signaling with Function Secret Sharing.
.- Secure and Efficient Multi-Dimensional Task Matching in Spatial
Crowdsourcing.
.- PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data
Sharing and Efficient Aggregation.
.- Efficient Ranking, Order Statistics, and Sorting under (2, 2)-Threshold
Paillier.
.- Personalized Secure Anonymous Traceability Mechanism with
Pseudo-Random Hopping of Dynamic ID.
.- A Fully Homomorphic Encryption-Based KNN Classification Scheme
for Electric Vehicles Data.
.- A High-Precision and Scalable Location Privacy Query System Based
on FHE.
.- Cryptographic Primitives.
.- Secure Non-Interactive Decision Tree Evaluation via Fully
Homomorphic Encryption.
.- Strong Designated-Verifier zk-SNARKs.
.- Short Lattice-Based Linearly Homomorphic Signatures in the Standard
Model.
.- Kleptographic Fountain- Leakage via a Binary Erasure Channel .
.- Efficient Implementation of NTRU-based Key Encapsulation
Mechanism on Embedded Platform.
.- An Efficient Designated-Server Public-Key Encryption Scheme with
Keyword Search based on Lattices.
.- Privacy-Aware Federated Learning.
.- Personalized Federated Learning with Adaptive Weight Clustering.
.- FedVoD: A Robust Federated Learning Defense Strategy in Hybrid
Byzantine Attacks.
.- A Lightweight Data Leakage Defense Mechanism for Federated
Learning based on Stochastic Gradient Masking.
.- PHV-FL:A Personalized Hierarchical Verifiable Federated Learning
Scheme for Maritime Target Detection.
.- AI-based Security Applications and Technologies.
.- Chaos: Robust Spatio-Temporal Fusion for Generalizable APT
Provenance Tracing.
.- AI and System Security.
.- Boosting Transferability of Adversarial Attacks On Vision Transformer .
.- DMD: Boosting Adversarial Transferability via Dynamic Momentum
Decay.
.- Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes.
.- PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory
Publishing Framework for Trustworthy AI Systems.
.- A Code Vulnerability Detection Method Integrating Pre-trained Model
and Graph Neural Network.
.- Blockchain and Related Technologies.
.- Covert Channels in Bitcoin: Concealing Senders via Transaction
Behavior Mimicry.
.- Hash Time-Locked Contract Scheme Based on Enclave-Based Agent
and Stealth Addresses.
.- Smart Contract Ponzi Detection via Contract Transaction Graph.
.- Evading AI-Based Detectors: A Hybrid Covert Communication Method
Based on Ethereum Transaction Amount and Address.
.- Hierarchical Byzantine Consensus for Election Security.
.- Towards Blockchain-Enabled Cybersecurity Risk Assessment for
Cyber-ship Systems.
.- Spectrum Resources Privacy-preserving Allocation and Certificate
Management Technology based on blockchain.
.- A Blockchain-Based Framework for UAVs in an Asynchronous Network
Environment.
.- BCDAC: Efficient Blockchain-based Cross Domain Access Control Scheme.
.- Privacy Preserving/Enhancing Technologies.
.- An Efficient Private Signaling with Function Secret Sharing.
.- Secure and Efficient Multi-Dimensional Task Matching in Spatial
Crowdsourcing.
.- PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data
Sharing and Efficient Aggregation.
.- Efficient Ranking, Order Statistics, and Sorting under (2, 2)-Threshold
Paillier.
.- Personalized Secure Anonymous Traceability Mechanism with
Pseudo-Random Hopping of Dynamic ID.
.- A Fully Homomorphic Encryption-Based KNN Classification Scheme
for Electric Vehicles Data.
.- A High-Precision and Scalable Location Privacy Query System Based
on FHE.
.- Cryptographic Primitives.
.- Secure Non-Interactive Decision Tree Evaluation via Fully
Homomorphic Encryption.
.- Strong Designated-Verifier zk-SNARKs.
.- Short Lattice-Based Linearly Homomorphic Signatures in the Standard
Model.
.- Kleptographic Fountain- Leakage via a Binary Erasure Channel .
.- Efficient Implementation of NTRU-based Key Encapsulation
Mechanism on Embedded Platform.
.- An Efficient Designated-Server Public-Key Encryption Scheme with
Keyword Search based on Lattices.
.- Privacy-Aware Federated Learning.
.- Personalized Federated Learning with Adaptive Weight Clustering.
.- FedVoD: A Robust Federated Learning Defense Strategy in Hybrid
Byzantine Attacks.
.- A Lightweight Data Leakage Defense Mechanism for Federated
Learning based on Stochastic Gradient Masking.
.- PHV-FL:A Personalized Hierarchical Verifiable Federated Learning
Scheme for Maritime Target Detection.
.- AI-based Security Applications and Technologies.
.- Chaos: Robust Spatio-Temporal Fusion for Generalizable APT
Provenance Tracing.
.- Boosting Transferability of Adversarial Attacks On Vision Transformer .
.- DMD: Boosting Adversarial Transferability via Dynamic Momentum
Decay.
.- Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes.
.- PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory
Publishing Framework for Trustworthy AI Systems.
.- A Code Vulnerability Detection Method Integrating Pre-trained Model
and Graph Neural Network.
.- Blockchain and Related Technologies.
.- Covert Channels in Bitcoin: Concealing Senders via Transaction
Behavior Mimicry.
.- Hash Time-Locked Contract Scheme Based on Enclave-Based Agent
and Stealth Addresses.
.- Smart Contract Ponzi Detection via Contract Transaction Graph.
.- Evading AI-Based Detectors: A Hybrid Covert Communication Method
Based on Ethereum Transaction Amount and Address.
.- Hierarchical Byzantine Consensus for Election Security.
.- Towards Blockchain-Enabled Cybersecurity Risk Assessment for
Cyber-ship Systems.
.- Spectrum Resources Privacy-preserving Allocation and Certificate
Management Technology based on blockchain.
.- A Blockchain-Based Framework for UAVs in an Asynchronous Network
Environment.
.- BCDAC: Efficient Blockchain-based Cross Domain Access Control Scheme.
.- Privacy Preserving/Enhancing Technologies.
.- An Efficient Private Signaling with Function Secret Sharing.
.- Secure and Efficient Multi-Dimensional Task Matching in Spatial
Crowdsourcing.
.- PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data
Sharing and Efficient Aggregation.
.- Efficient Ranking, Order Statistics, and Sorting under (2, 2)-Threshold
Paillier.
.- Personalized Secure Anonymous Traceability Mechanism with
Pseudo-Random Hopping of Dynamic ID.
.- A Fully Homomorphic Encryption-Based KNN Classification Scheme
for Electric Vehicles Data.
.- A High-Precision and Scalable Location Privacy Query System Based
on FHE.
.- Cryptographic Primitives.
.- Secure Non-Interactive Decision Tree Evaluation via Fully
Homomorphic Encryption.
.- Strong Designated-Verifier zk-SNARKs.
.- Short Lattice-Based Linearly Homomorphic Signatures in the Standard
Model.
.- Kleptographic Fountain- Leakage via a Binary Erasure Channel .
.- Efficient Implementation of NTRU-based Key Encapsulation
Mechanism on Embedded Platform.
.- An Efficient Designated-Server Public-Key Encryption Scheme with
Keyword Search based on Lattices.
.- Privacy-Aware Federated Learning.
.- Personalized Federated Learning with Adaptive Weight Clustering.
.- FedVoD: A Robust Federated Learning Defense Strategy in Hybrid
Byzantine Attacks.
.- A Lightweight Data Leakage Defense Mechanism for Federated
Learning based on Stochastic Gradient Masking.
.- PHV-FL:A Personalized Hierarchical Verifiable Federated Learning
Scheme for Maritime Target Detection.
.- AI-based Security Applications and Technologies.
.- Chaos: Robust Spatio-Temporal Fusion for Generalizable APT
Provenance Tracing.







