Information and Communications Security (eBook, PDF)
27th International Conference, ICICS 2025, Nanjing, China, October 29-31, 2025, Proceedings, Part III
Redaktion: Han, Jinguang; Chen, Liquan; Susilo, Willy; Cheng, Guang; Xiang, Yang
Alle Infos zum eBook verschenken
Information and Communications Security (eBook, PDF)
27th International Conference, ICICS 2025, Nanjing, China, October 29-31, 2025, Proceedings, Part III
Redaktion: Han, Jinguang; Chen, Liquan; Susilo, Willy; Cheng, Guang; Xiang, Yang
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Hier können Sie sich einloggen

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29-31, 2025.
The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections:
Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization.
Part II: Blockchain and Cryptocurrencies, System and Network Security, Security and Privacy of AI, Machine…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 59.58MB
Information and Communications Security (eBook, PDF)46,95 €
Information and Communications Security (eBook, PDF)64,95 €
Bryon K. EhlmannObject Relationship Notation (ORN) for Database Applications (eBook, PDF)72,95 €
Harry WechslerReliable Face Recognition Methods (eBook, PDF)72,95 €
Handbook of Biometrics (eBook, PDF)128,95 €
Anil K. JainIntroduction to Biometrics (eBook, PDF)52,95 €
Arun A. RossHandbook of Multibiometrics (eBook, PDF)72,95 €-
-
-
The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections:
Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization.
Part II: Blockchain and Cryptocurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security.
Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 597
- Erscheinungstermin: 19. Oktober 2025
- Englisch
- ISBN-13: 9789819535378
- Artikelnr.: 75709480
- Verlag: Springer Nature Singapore
- Seitenzahl: 597
- Erscheinungstermin: 19. Oktober 2025
- Englisch
- ISBN-13: 9789819535378
- Artikelnr.: 75709480
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Domain Adaptation for Cross
Device Profiled ML Side
Channel Attacks. .
Find the Clasp of the Chain: Efficiently Locating Cryptographic Procedures in SoC Secure Boot by Semi
automated Side
Channel Analysis. .
Full
phase distributed quantum impossible differential cryptanalysis. .
ProverNG: Efficient Verification of Compositional Masking for Cryptosystem’s Side
Channel Security. .
POWERPOLY: Multilingual Program Analysis with the Aid of WebAssembly. .
Not only spatial, but also spectral: Unnoticeable backdoor attack on 3D point clouds. .
Permutation
Based Cryptanalysis of the SCARF Block Cipher and Its Randomness Evaluation. .
Secure and Scalable TLB Partitioning Against Timing Side
Channel Attacks. .
Security Vulnerabilities in AI
Generated Code: A Large
Scale Analysis of Public GitHub Repositories. .
Vulnerability Analysis. .
Towards Efficient C/C++ Vulnerability Impact Assessment in Package Management Systems. .
AugGP
VD: A smart contract vulnerability detection approach based on augmented graph convolutional networks and pooling. .
VULDA: Source Code Vulnerability Detection via Local Dependency Context Aggregation on Vulnerability
aware Code Mapping Graph. .
KVT
Payload: Knowledge Graph
Enhanced Hierarchical Vulnerability Traffic Payload Generation. .
Construction and Application of Vulnerability Intelligence Ontology under Vulnerability Management Perspective. .
Anomaly Detection. .
Speaker Inference Detection Using Only Text. .
DTGAN: Diverse
Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples. .
ConComFND: Leveraging Content and Comment Information for Enhanced Fake News Detection. .
Transferable Adversarial Attacks in Object Detection: Leveraging Ensemble Features and Gradient Variance Minimization. .
VAE
BiLSTM: A Hybrid Model for DeFi Anomaly Detection Combining VAE and BiLSTM. .
FluxSketch: A Sketch
based Solution for Long
Term Fluctuating Key Flow Detection. .
RustGuard: Detecting Rust Data Leak Issues with Context
Sensitive Static Taint Analysis. .
Secure Guard: A Semantic
Based Jailbreak Prompt Detection Framework for Protecting Large Language Models. .
Traffic Classification. .
FCAL: An Asynchronous Federated Contrastive Semi
Supervised Learning Approach for Network Traffic Classification. .
TetheGAN: A GAN
Based Synthetic Mobile Tethering Traffic Generating Framework. .
SPTC: Signature
based Cross
protocol Encrypted Proxy Traffic Classification Approach. .
Multi
modal Datagram Representation with Spatial
Temporal State Space Models and Inter
flow Contrastive Learning for Encrypted Traffic Classification. .
FlowGraphNet: Efficient Malicious Traffic Detection via Graph Construction. .
CascadeGen: A Hybrid GAN
Diffusion Framework for Controllable and Protocol
Compliant Synthetic Network Traffic Generation. .
Steganography and Watermarking. .
Towards High
Capacity Provably Secure Steganography via Cascade Sampling. .
When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No
box Setting. .
Robust Reversible Watermarking for 3D Models Based on Auto Diffusion Function.
Domain Adaptation for Cross
Device Profiled ML Side
Channel Attacks. .
Find the Clasp of the Chain: Efficiently Locating Cryptographic Procedures in SoC Secure Boot by Semi
automated Side
Channel Analysis. .
Full
phase distributed quantum impossible differential cryptanalysis. .
ProverNG: Efficient Verification of Compositional Masking for Cryptosystem’s Side
Channel Security. .
POWERPOLY: Multilingual Program Analysis with the Aid of WebAssembly. .
Not only spatial, but also spectral: Unnoticeable backdoor attack on 3D point clouds. .
Permutation
Based Cryptanalysis of the SCARF Block Cipher and Its Randomness Evaluation. .
Secure and Scalable TLB Partitioning Against Timing Side
Channel Attacks. .
Security Vulnerabilities in AI
Generated Code: A Large
Scale Analysis of Public GitHub Repositories. .
Vulnerability Analysis. .
Towards Efficient C/C++ Vulnerability Impact Assessment in Package Management Systems. .
AugGP
VD: A smart contract vulnerability detection approach based on augmented graph convolutional networks and pooling. .
VULDA: Source Code Vulnerability Detection via Local Dependency Context Aggregation on Vulnerability
aware Code Mapping Graph. .
KVT
Payload: Knowledge Graph
Enhanced Hierarchical Vulnerability Traffic Payload Generation. .
Construction and Application of Vulnerability Intelligence Ontology under Vulnerability Management Perspective. .
Anomaly Detection. .
Speaker Inference Detection Using Only Text. .
DTGAN: Diverse
Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples. .
ConComFND: Leveraging Content and Comment Information for Enhanced Fake News Detection. .
Transferable Adversarial Attacks in Object Detection: Leveraging Ensemble Features and Gradient Variance Minimization. .
VAE
BiLSTM: A Hybrid Model for DeFi Anomaly Detection Combining VAE and BiLSTM. .
FluxSketch: A Sketch
based Solution for Long
Term Fluctuating Key Flow Detection. .
RustGuard: Detecting Rust Data Leak Issues with Context
Sensitive Static Taint Analysis. .
Secure Guard: A Semantic
Based Jailbreak Prompt Detection Framework for Protecting Large Language Models. .
Traffic Classification. .
FCAL: An Asynchronous Federated Contrastive Semi
Supervised Learning Approach for Network Traffic Classification. .
TetheGAN: A GAN
Based Synthetic Mobile Tethering Traffic Generating Framework. .
SPTC: Signature
based Cross
protocol Encrypted Proxy Traffic Classification Approach. .
Multi
modal Datagram Representation with Spatial
Temporal State Space Models and Inter
flow Contrastive Learning for Encrypted Traffic Classification. .
FlowGraphNet: Efficient Malicious Traffic Detection via Graph Construction. .
CascadeGen: A Hybrid GAN
Diffusion Framework for Controllable and Protocol
Compliant Synthetic Network Traffic Generation. .
Steganography and Watermarking. .
Towards High
Capacity Provably Secure Steganography via Cascade Sampling. .
When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No
box Setting. .
Robust Reversible Watermarking for 3D Models Based on Auto Diffusion Function.







