---ICICS 2025 Accepted Papers---
-
1. Minzhi Liang, Liquan Chen, Yinghua Jiang, Xuyan Min, Jin Qian and Jun Luo. Cross-Domain Lattice-based DAA Scheme with Shared Private-Key for Internet of Things System
2. Jiatao Cheng, Yuhong Nan, Xueqiang Wang, Zhefan Chen and Yuliang Zhang. Identifying Unusual Personal Data in Mobile Apps for Better Privacy Compliance Check
3. Jingjing Fan, Xingye Lu, Man Ho Au and Siu Ming Yiu. Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
4. Ruoxi Cheng, Yizhong Ding, Shaowei Yuan and Zhiqiang Wang. Speaker Inference Detection Using Only Text
5. Yuchen Yang, Jie Chen, Qiaohan Chu, Qiuyan Du and Luping Wang. Multi-Signer Locally Verifiable Aggregate Signature from (Leveled) Multilinear Maps
6. Yuhan Tao and Danwei Chen. SPCD: A Shot-Based Partial Copy Detection Method
7. Yu Yan, Qingjun Yuan, Weina Niu, Xiangyu Wang, Yanbei Zhu and Yongjuan Wang. FCAL: An Asynchronous Federated Contrastive Semi-Supervised Learning Approach for Network Traffic Classification
8. Ye Bai, Debiao He, Zhichao Yang, Min Luo and Cong Peng. MDKG: Module-lattice-based Distributed Key Generation
9. Yong Ding, Chi Zhang, Shijie Tang, Changsong Yang and Hai Liang. Bayesian-Adaptive Graph Neural Network for Anomaly Detection (BAGNN)
10. Jialiang Fan, Qianhong Wu, Minghang Li, Decun Luo, Qin Wang and Bo Qin. EquinoxBFT: BFT Consensus for Blockchain Emergency Governance
11. Heng Li, Fenghua Li, Yunchuan Guo, Lingcui Zhang, Xiao Wang and Ziyan Zhou. Circulation Control Model and Administration for Geospatial Data
12. Ian Garrett and Ryan Gerdes. Domain Adaptation for Cross-Device Profiled ML Side-Channel Attacks
13. Bektemir Saydiev, Xiaohui Cui and Umer Zukaib. UzPhishNet Model for Phishing Detection
14. Yixi Lin, Yue Xu, Zitong Yao, Yuhong Nan, Queping Kong and Xueqiang Wang. Why Biting the Bait? Understanding Bait and Switch UI Dark Patterns in Mobile Apps
15. Zerui Guo, Sha Ma and Qiong Huang. Conditional Attribute-based Encryption with Keyword Search for Pay-Per-Query Commercial Model
16. Chang Li, Binqin Lu, Wenyang Zhang, Kaixuan Yang and Huijuan Zhu. fFuzz: A State-aware Function-level Fuzzing Framework for Smart Contract Vulnerabilities Detection
17. Zhengzhou Tu, Min Xie, Junbin Fang, Yong Yu and Zoe L. Jiang. Lightweight Transparent Zero-Knowledge Proofs for Cross-Domain Statements
18. Haowen Xu, Tianya Zhao, Xuyu Wang, Jun Dai and Xiaoyan Sun. MagWatch: Exposing Privacy Risks in Smartwatches through Electromagnetic Signals
19. Wenhao Wang, Yu Li, Yinxia Sun, Yuan Zhang and Sheng Zhong. Privacy-preserving, Secure and Certificate-based Integrity Auditing for Cloud Storage
20. Shipei Qu, Yuxuan Wang, Jintong Yu, Cheng Hong, Chi Zhang and Dawu Gu. Find the Clasp of the Chain: Efficiently Locating Cryptographic Procedures in SoC Secure Boot by Semi-automated Side-Channel Analysis
21. Luqi Huang, Fuchun Guo, Willy Susilo and Yumei Li. Public Verifiable Server-Aided Revocable Attribute-Based Encryption
22. Botao Liu and Ming Tang. New First-Order Secure AES Implementation without Online Fresh Randomness Records
23. Zibo Wang, Xiangkun Jia, Jia Yan, Yi Yang, Huafeng Huang and Purui Su. Towards Efficient C/C++ Vulnerability Impact Assessment in Package Management Systems
24. Xuman Zhang, Guang Cheng and Li Deng. TetheGAN: A GAN-Based Synthetic Mobile Tethering Traffic Generating Framework
25. Zelin Tang, Hua Guo, Yewei Guan and Kaijie Yang. Unbalanced Private Computation on Set Intersection with Reduced Computation and Communication
26. Sandro Pinto, Luís Cunha, Daniel Oliveira, Michele Grisafi, Emanuele Beozzo and Bruno Crispo. Bridging the Interoperability Gaps Among Trusted Architectures in MCUs
27. Yiyang Wang, Wuxia Bai and Kai Chen. DTGAN: Diverse-Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples
28. Huan Zhang, Chanying Huang, Kedong Yan and Shan Xiao. ConComFND: Leveraging Content and Comment Information for Enhanced Fake News Detection
29. Kun Zhang, Tao Shang, Yuanjing Zhang and Jianwei Liu. Full-phase distributed quantum impossible differential cryptanalysis
30. Jun Tao and Hao Zou. Social-Aware and Quality-Driven Incentives for Mobile Crowd-Sensing with Two-Stage Game
31. haofeng Zhuang, Haifeng Qian, Junqing Gong and Zhili Chen. TraceBFT: Backtracking-based Pipelined Asynchronous BFT Consensus for High-Throughput Distributed Systems
32. Victor Kombou, Qi Xia, Jianbin Gao, Hu Xia, Brinda Leaticia Kuiche Sop and Leoba Jonathan Anto. RADIAL: Robust Adversarial Discrepancy-aware Framework for Early Detection of Illicit Cryptocurrency Accounts
33. Xinzheng Liu, Wangqun Lin and Zhaoyun Ding. CyberNER-LLM: Cyber Threat Intelligence Named Entity Recognition With Large Language Model
34. Hai Liu, Maoze Tian, Yadong Peng and Hongye Peng. A Distributed Privacy Protection Method for Crowd Sensing Based on Trust Evaluation
35. Lianglin Yan, Pengfei Zeng and Mingsheng Wang. Turtle Wins Rabbit Again: Faster Modulus Reduction for RNS-CKKS
36. Runze Zhao, Siqi Lu, Yongjuan Wang, Liujia Cai, Wenyi Chen and Fenghua Jiang. SM2-VBKE: Achieving Cryptographic Binding Between Verification Integrity and Key Generation
37. Xuebo Qiu, Mingqi Lv, Tieming Chen, Tiantian Zhu and Qijie Song. Provenance-Based Intrusion Detection via Multi-Scale Graph Representation Learning
38. Zhitong Lu, Zhen Xu, Qian Yang and Kai Chen. Transferable Adversarial Attacks in Object Detection: Leveraging Ensemble Features and Gradient Variance Minimization
39. Peng Zhang, Ao Duan, Xianglu Zou and Dongyan Qiu. Batch-oriented Element-wise Approximate Activation for Privacy-Preserving Neural Networks
40. Peizhou Ge, Qingyue Yu and Yubo Song. Adaptive Federated Reinforcement Learning for Efficient Model Collaboration in Heterogeneous Systems
41. Jiang Luo, Shaohua Qin and Zhe Wang. SADGA: A Self Attention GAN-Based Adversarial DGA with High Anti-Detection Ability
42. Yang Shi, Jintao Xie, Minyu Teng, Guanxu Liu, Linhai Guo and Jiangfeng Li. Enhancing Private Signing Key Protection in Digital Currency Transactions Using Obfuscation
43. Huajie Jia, Yige Chen and Zhengzhou Tang. SPTC: Signature-based Cross-protocol Encrypted Proxy Traffic Classification Approach
44. Yiming Yang, Feng Zhou, Yuanyuan Wang, Hua Chen, Limin Fan and An Wang. ProverNG: Efficient Verification of Compositional Masking for Cryptosystem's Side-Channel Security
45. Meng Li, Zhuangwei Li, Yifei Chen, Yan Qiao and Mauro Conti. Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories
46. Yuling Luo, Zhangrui Wang, Xue Ouyang, Siyuan Zu, Qiang Fu, Sheng Qin and Junxiu Liu. Privacy-preserving Framework for k-modes Clustering Based on Personalized Local Differential Privacy
47. Xianwen Deng, Ruijie Zhao, Mingwei Zhan, Shaoqian Wu, Yijun Wang and Zhi Xue. Multi-modal Datagram Representation with Spatial-Temporal State Space Models and Inter-flow Contrastive Learning for Encrypted Traffic Classification
48. Jingjing Fan, Chi Zhang, Zejiu Tan, Zoe Lin Jiang, Man Ho Au and Siu Ming Yiu. A BGV-subroutinted CKKS Bootstrapping Algorithm without Sine Approximation
49. Shujiang Xu, Xiaomin Luo, Lianhai Wang, Miodrag Mihaljevié, Shuhui Zhang, Wei Shao and Qizheng Wang. VAE-BiLSTM: A Hybrid Model for DeFi Anomaly Detection Combining VAE and BiLSTM
50. Chen An, Ziyao Liu, Xianhui Lu and Jingnan He. PolarKyber: Polished Kyber with Smaller Ciphertexts, Greater Security Redundancy, and Lower Decryption Failure Rate
51. Yufeng Jiang, Jianghua Liu, Chenhao Xu, Cong Zuo, Lei Xu and Jian Lei. A Dropout-Resilient and Privacy-Preserving Framework for Federated Learning via Lightweight Masking
52. Meiyang Lv, Haocheng Fu, Xiaowei Yi, Hongxian Huang, Yun Cao and Changjun Liu. Towards High-Capacity Provably Secure Steganography via Cascade Sampling
53. Xuyang Zhang, Hua Jin and Peiyuan Guo. AFedGAN: Adaptive Federated Learning with Generative Adversarial Networks for Non-IID Data
54. Chaoyue Li, Yongming Zhang and Xiaolong Xu. DBG-LB: A Trustworthy and Efficient Framework for Data Sharing in the Internet of Vehicles
55. Nianlu Liu, Linlin Zhang, Wenbo Fang and Kai Zhao. AugGP-VD: A smart contract vulnerability detection approach based on augmented graph convolutional networks and pooling
56. Jintao Cai, Futai Zhang, Wenjie Yang, Shaojun Yang, Yichi Huang, Rongmao Chen and Willy Susilo. Certificate-Based Quasi-Linearly Homomorphic Signatures: Definition, Construction, and Application to Data Integrity Auditing
57. Yanting Li, Pingbin Luo, Xinjian Chen and Qiong Huang. Lion: A New Ring Signature Construction from Lattice Gadget
58. Zhuochen Jiang and Baojian Hua. POWERPOLY: Multilingual Program Analysis with the Aid of WebAssembly
59. Haocheng Kan, Yuesheng Zhu, Guibo Luo and Hanwen Zhang. OTTER: Optimized Training with Trustworthy Enhanced Replication via Diffusion and Federated VMUNet for Privacy-Aware Medical Segmentation
60. Qiyuan Gao, Qianhong Wu, Junxiang Nong and Qi Liu. AnoST: An Anonymous Optimistic Verification System Based on Off-Chain State Transition
61. Yi Liu, Yipeng Song, Anjia Yang and Junzuo Lai. Zero-Knowledge Protocols with PVC Security: Striking the Balance between Security and Efficiency
62. Stephane Richard Befoum, Jianbin Gao, Qi Xia, Victor Kombou, Benjamin Fabien Eyezo'O and Rossini Mulenga Mukupa. EAGLE: Ensemble Adaptive Graph Learning for Enhanced Ethereum Fraud Detection
63. Mingming Huang, Xiaodan Zhang, Wei Mi, Huimei Liao and Yi Sun. AnsBridge: Towards Secure Cross-Chain Interoperability via Anonymous and Verifiable Validators
64. Yuantong Li, Xiaofen Wang, Ke Zhang, Bo Zhang, Lei Zhang, Xiaosong Ding and Qing Xu. BR-CPPFL: A Blockchain-based Robust Clustered Privacy-preserving Federated Learning System
65. Changsong Yang, Han Wang, Yueling Liu, Yong Ding, Hai Liang and Zhenyu Li. FlowGraphNet: Efficient Malicious Traffic Detection via Graph Construction
66. Tianyuan Fan, Gang Shen, Yuzhu Wang, Yuntao Wang and Mingwu Zhang. Attribute-Based Adaptor Signature and Application in Control-based Atomic Swap
67. Nikolaos Fotos, Koffi Ismael Ouattara, Dimitrios S. Karas, Ioannis Krontiris, Weizhi Meng and Thanassis Giannetsos. Actions Speak Louder Than Words: Evidence-Based Trust Level Evaluation in Multi-Agent Systems
68. Xiaodong Wu, Tianyi Tang, Xiangman Li, Jianbing Ni and Yong Yu. When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No-box Setting
69. Chaoyun Wang, Kedong Yan and Chanying Huang. Efficient Semi-asynchronous Federated Learning with Guided Selective Participation and Adaptive Aggregation
70. Pengfei Zeng, Han Xia and Mingsheng Wang. BioVite: Efficient and Compact Privacy-Preserving Biometric Verification via Fully Homomorphic Encryption
71. Tao Peng, Ling Gui, Lijun Cai, Junwei Tang, Aoshuang Ye and Fei Zhu. VULDA: Source Code Vulnerability Detection via Local Dependency Context Aggregation on Vulnerability-aware Code Mapping Graph
72. Jun Xu, Guoju Gao, Yu-E Sun, He Huang and Yang Du. FluxSketch: A Sketch-based Solution for Long-Term Fluctuating Key Flow Detection
73. Dazhi Xu, Yuejun Liu, Jiabei Wang, Yiwen Gao and Yongbin Zhou. A Versatile Decentralized Attribute Based Signature Scheme for IoT
74. Zixing Lin, Yaolong Song and Rui Li. Robust Reversible Watermarking for 3D Models Based on Auto Diffusion Function
75. Ya Gao, Chao Mu, Ming Yang and Xiaoming Wu. Privacy-Preserving K-hop Shortest Path Query on Encrypted Graphs Based on Graph Pruning
76. Qingyuan Yu, Chuping Yan and Xiaoying Liu. CascadeGen: A Hybrid GAN-Diffusion Framework for Controllable and Protocol-Compliant Synthetic Network Traffic Generation
77. Xiuhua Wang, Shikang Li, Fengrui Fan, Shuai Wang, Yiwei Li and Yu Zheng. Improving Byzantine-resilience in Federated Learning via Diverse Aggregation and Adaptive Variance Reduction
78. Shouchen Zhou, Lu Zhou and Yu Tao. No Place to Hide: An Efficient and Accurate Backdoor Detection Tool for Ethereum ERC-20 Smart Contracts
79. Yongzhen Jiang, Haoran Li, Hongjia Liu, Jiageng Pan and Jian Xu. Not only spatial, but also spectral: Unnoticeable backdoor attack on 3D point clouds
80. Qi Li, Wenying Zhang and Xiaomeng Sun. Permutation-Based Cryptanalysis of the SCARF Block Cipher and Its Randomness Evaluation
81. Tianyi Huang, Xiaolin Zhang, Kailun Qin, Boshi Yuan, Chenghao Chen, Yipeng Shi, Chi Zhang and Dawu Gu. Secure and Scalable TLB Partitioning Against Timing Side-Channel Attacks
82. Shanlin Deng, Mingliang Liu, Si Wu and Baojian Hua. RustGuard: Detecting Rust Data Leak Issues with Context-Sensitive Static Taint Analysis
83. Xiaocong Lin, Weijing You, Chenchen Wu, Wenmao Liu and Qi Gu. TA-PDC: Provable Data Contribution with Traceable Anonymous for Group Transactions
84. Faqi Zhao, Rong Shi, Guoqiao Zhou, Wen Wang and Feng Liu. KVT-Payload: Knowledge Graph-Enhanced Hierarchical Vulnerability Traffic Payload Generation
85. Yawen Huang and Huaicong Zhang. Hierarchical Recovery of Convolutional Neural Networks via Self-Embedding Watermarking
86. Bohang Wei, Yang Yang, Shihong Xiong, Minghang Li, Qianhong Wu and Bo Qin. TrustBlink: A zkSNARK-Powered On-Demand Relay for PoW Cross-Chain Verification With Low Costs
87. Sixin Fang, Ke Cheng, Jixin Zhang, Zheng Qin and Mingwu Zhang. Secure Guard: A Semantic-Based Jailbreak Prompt Detection Framework for Protecting Large Language Models
88. Huibo Yang, Zhize Hao and Tao Liu. R1-MFSol: a Smart Contract Vulnerability Detection Model Based on LLM and Multi-modal Feature Fusion
89. Hao Lin, Xiaoming Hu, Shuangjie Bai and Yan Liu. Personalized Federated Learning Algorithm Based on User Grouping and Group Signatures
90. Guangxiang Dai, Peng Wang and Duohe Ma. Construction and Application of Vulnerability Intelligence Ontology under Vulnerability Management Perspective
91. Yuxia Zhou, Qiao Xue and Youwen Zhu. Fine-filter: An Effective Defense against Poisoning Attacks on Frequency Estimation under LDP
92. Maximilian Schreiber and Pascal Tippe. Security Vulnerabilities in AI-Generated Code: A Large-Scale Analysis of Public GitHub Repositories