Menu Chiudi

---ICICS 2025 Accepted Papers---

---ICICS 2025 Accepted Papers---

    1. Minzhi Liang, Liquan Chen, Yinghua Jiang, Xuyan Min, Jin Qian and Jun Luo. Cross-Domain Lattice-based DAA Scheme with Shared Private-Key for Internet of Things System  
    2. Jiatao Cheng, Yuhong Nan, Xueqiang Wang, Zhefan Chen and Yuliang Zhang. Identifying Unusual Personal Data in Mobile Apps for Better Privacy Compliance Check
    3. Jingjing Fan, Xingye Lu, Man Ho Au and Siu Ming Yiu. Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
    4. Ruoxi Cheng, Yizhong Ding, Shaowei Yuan and Zhiqiang Wang. Speaker Inference Detection Using Only Text
    5. Yuchen Yang, Jie Chen, Qiaohan Chu, Qiuyan Du and Luping Wang. Multi-Signer Locally Verifiable Aggregate Signature from (Leveled) Multilinear Maps
    6. Yuhan Tao and Danwei Chen. SPCD: A Shot-Based Partial Copy Detection Method
    7. Yu Yan, Qingjun Yuan, Weina Niu, Xiangyu Wang, Yanbei Zhu and Yongjuan Wang. FCAL: An Asynchronous Federated Contrastive Semi-Supervised Learning Approach for Network Traffic Classification
    8. Ye Bai, Debiao He, Zhichao Yang, Min Luo and Cong Peng. MDKG: Module-lattice-based Distributed Key Generation
    9. Yong Ding, Chi Zhang, Shijie Tang, Changsong Yang and Hai Liang. Bayesian-Adaptive Graph Neural Network for Anomaly Detection (BAGNN)
    10. Jialiang Fan, Qianhong Wu, Minghang Li, Decun Luo, Qin Wang and Bo Qin. EquinoxBFT: BFT Consensus for Blockchain Emergency Governance
    11. Heng Li, Fenghua Li, Yunchuan Guo, Lingcui Zhang, Xiao Wang and Ziyan Zhou. Circulation Control Model and Administration for Geospatial Data
    12. Ian Garrett and Ryan Gerdes. Domain Adaptation for Cross-Device Profiled ML Side-Channel Attacks
    13. Bektemir Saydiev, Xiaohui Cui and Umer Zukaib. UzPhishNet Model for Phishing Detection
    14. Yixi Lin, Yue Xu, Zitong Yao, Yuhong Nan, Queping Kong and Xueqiang Wang. Why Biting the Bait? Understanding Bait and Switch UI Dark Patterns in Mobile Apps
    15. Zerui Guo, Sha Ma and Qiong Huang. Conditional Attribute-based Encryption with Keyword Search for Pay-Per-Query Commercial Model
    16. Chang Li, Binqin Lu, Wenyang Zhang, Kaixuan Yang and Huijuan Zhu. fFuzz: A State-aware Function-level Fuzzing Framework for Smart Contract Vulnerabilities Detection
    17. Zhengzhou Tu, Min Xie, Junbin Fang, Yong Yu and Zoe L. Jiang. Lightweight Transparent Zero-Knowledge Proofs for Cross-Domain Statements
    18. Haowen Xu, Tianya Zhao, Xuyu Wang, Jun Dai and Xiaoyan Sun. MagWatch: Exposing Privacy Risks in Smartwatches through Electromagnetic Signals   
    19. Wenhao Wang, Yu Li, Yinxia Sun, Yuan Zhang and Sheng Zhong. Privacy-preserving, Secure and Certificate-based Integrity Auditing for Cloud Storage
    20. Shipei Qu, Yuxuan Wang, Jintong Yu, Cheng Hong, Chi Zhang and Dawu Gu. Find the Clasp of the Chain: Efficiently Locating Cryptographic Procedures in SoC Secure Boot by Semi-automated Side-Channel Analysis
    21. Luqi Huang, Fuchun Guo, Willy Susilo and Yumei Li. Public Verifiable Server-Aided Revocable Attribute-Based Encryption
    22. Botao Liu and Ming Tang. New First-Order Secure AES Implementation without Online Fresh Randomness Records     
    23. Zibo Wang, Xiangkun Jia, Jia Yan, Yi Yang, Huafeng Huang and Purui Su. Towards Efficient C/C++ Vulnerability Impact Assessment in Package Management Systems
    24. Xuman Zhang, Guang Cheng and Li Deng. TetheGAN: A GAN-Based Synthetic Mobile Tethering Traffic Generating Framework
    25. Zelin Tang, Hua Guo, Yewei Guan and Kaijie Yang. Unbalanced Private Computation on Set Intersection with Reduced Computation and Communication
    26. Sandro Pinto, Luís Cunha, Daniel Oliveira, Michele Grisafi, Emanuele Beozzo and Bruno Crispo. Bridging the Interoperability Gaps Among Trusted Architectures in MCUs
    27. Yiyang Wang, Wuxia Bai and Kai Chen. DTGAN: Diverse-Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples
    28. Huan Zhang, Chanying Huang, Kedong Yan and Shan Xiao.     ConComFND: Leveraging Content and Comment Information for Enhanced Fake News Detection
    29. Kun Zhang, Tao Shang, Yuanjing Zhang and Jianwei Liu. Full-phase distributed quantum impossible differential cryptanalysis
    30. Jun Tao and Hao Zou. Social-Aware and Quality-Driven Incentives for Mobile Crowd-Sensing with Two-Stage Game
    31. haofeng Zhuang, Haifeng Qian, Junqing Gong and Zhili Chen. TraceBFT: Backtracking-based Pipelined Asynchronous BFT Consensus for High-Throughput Distributed Systems
    32. Victor Kombou, Qi Xia, Jianbin Gao, Hu Xia, Brinda Leaticia Kuiche Sop and Leoba Jonathan Anto. RADIAL: Robust Adversarial Discrepancy-aware Framework for Early Detection of Illicit Cryptocurrency Accounts
    33. Xinzheng Liu, Wangqun Lin and Zhaoyun Ding. CyberNER-LLM: Cyber Threat Intelligence Named Entity Recognition With Large Language Model
    34. Hai Liu, Maoze Tian, Yadong Peng and Hongye Peng. A Distributed Privacy Protection Method for Crowd Sensing Based on Trust Evaluation
    35. Lianglin Yan, Pengfei Zeng and Mingsheng Wang. Turtle Wins Rabbit Again: Faster Modulus Reduction for RNS-CKKS
    36. Runze Zhao, Siqi Lu, Yongjuan Wang, Liujia Cai, Wenyi Chen and Fenghua Jiang. SM2-VBKE: Achieving Cryptographic Binding Between Verification Integrity and Key Generation
    37. Xuebo Qiu, Mingqi Lv, Tieming Chen, Tiantian Zhu and Qijie Song. Provenance-Based Intrusion Detection via Multi-Scale Graph Representation Learning 
    38. Zhitong Lu, Zhen Xu, Qian Yang and Kai Chen. Transferable Adversarial Attacks in Object Detection: Leveraging Ensemble Features and Gradient Variance Minimization 
    39. Peng Zhang, Ao Duan, Xianglu Zou and Dongyan Qiu. Batch-oriented Element-wise Approximate Activation for Privacy-Preserving Neural Networks    
    40. Peizhou Ge, Qingyue Yu and Yubo Song. Adaptive Federated Reinforcement Learning for Efficient Model Collaboration in Heterogeneous Systems    
    41. Jiang Luo, Shaohua Qin and Zhe Wang. SADGA: A Self Attention GAN-Based Adversarial DGA with High Anti-Detection Ability
    42. Yang Shi, Jintao Xie, Minyu Teng, Guanxu Liu, Linhai Guo and Jiangfeng Li. Enhancing Private Signing Key Protection in Digital Currency Transactions Using Obfuscation
    43. Huajie Jia, Yige Chen and Zhengzhou Tang. SPTC: Signature-based Cross-protocol Encrypted Proxy Traffic Classification Approach
    44. Yiming Yang, Feng Zhou, Yuanyuan Wang, Hua Chen, Limin Fan and An Wang. ProverNG: Efficient Verification of Compositional Masking for Cryptosystem's Side-Channel Security
    45. Meng Li, Zhuangwei Li, Yifei Chen, Yan Qiao and Mauro Conti. Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories
    46. Yuling Luo, Zhangrui Wang, Xue Ouyang, Siyuan Zu, Qiang Fu, Sheng Qin and Junxiu Liu. Privacy-preserving Framework for k-modes Clustering Based on Personalized Local Differential Privacy   
    47. Xianwen Deng, Ruijie Zhao, Mingwei Zhan, Shaoqian Wu, Yijun Wang and Zhi Xue. Multi-modal Datagram Representation with Spatial-Temporal State Space Models and Inter-flow Contrastive Learning for Encrypted Traffic Classification
    48. Jingjing Fan, Chi Zhang, Zejiu Tan, Zoe Lin Jiang, Man Ho Au and Siu Ming Yiu. A BGV-subroutinted CKKS Bootstrapping Algorithm without Sine Approximation
    49. Shujiang Xu, Xiaomin Luo, Lianhai Wang, Miodrag Mihaljevié, Shuhui Zhang, Wei Shao and Qizheng Wang. VAE-BiLSTM: A Hybrid Model for DeFi Anomaly Detection Combining VAE and BiLSTM
    50. Chen An, Ziyao Liu, Xianhui Lu and Jingnan He. PolarKyber: Polished Kyber with Smaller Ciphertexts, Greater Security Redundancy, and Lower Decryption Failure Rate      
    51. Yufeng Jiang, Jianghua Liu, Chenhao Xu, Cong Zuo, Lei Xu and Jian Lei. A Dropout-Resilient and Privacy-Preserving Framework for Federated Learning via Lightweight Masking
    52. Meiyang Lv, Haocheng Fu, Xiaowei Yi, Hongxian Huang, Yun Cao and Changjun Liu. Towards High-Capacity Provably Secure Steganography via Cascade Sampling
    53. Xuyang Zhang, Hua Jin and Peiyuan Guo. AFedGAN: Adaptive Federated Learning with Generative Adversarial Networks for Non-IID Data
    54. Chaoyue Li, Yongming Zhang and Xiaolong Xu. DBG-LB: A Trustworthy and Efficient Framework for Data Sharing in the Internet of Vehicles
    55. Nianlu Liu, Linlin Zhang, Wenbo Fang and Kai Zhao. AugGP-VD: A smart contract vulnerability detection approach based on augmented graph convolutional networks and pooling
    56. Jintao Cai, Futai Zhang, Wenjie Yang, Shaojun Yang, Yichi Huang, Rongmao Chen and Willy Susilo. Certificate-Based Quasi-Linearly Homomorphic Signatures: Definition, Construction, and Application to Data Integrity Auditing
    57. Yanting Li, Pingbin Luo, Xinjian Chen and Qiong Huang. Lion: A New Ring Signature Construction from Lattice Gadget  
    58. Zhuochen Jiang and Baojian Hua. POWERPOLY: Multilingual Program Analysis with the Aid of WebAssembly
    59. Haocheng Kan, Yuesheng Zhu, Guibo Luo and Hanwen Zhang. OTTER: Optimized Training with Trustworthy Enhanced Replication via Diffusion and Federated VMUNet for Privacy-Aware Medical Segmentation
    60. Qiyuan Gao, Qianhong Wu, Junxiang Nong and Qi Liu. AnoST: An Anonymous Optimistic Verification System Based on Off-Chain State Transition
    61. Yi Liu, Yipeng Song, Anjia Yang and Junzuo Lai. Zero-Knowledge Protocols with PVC Security: Striking the Balance between Security and Efficiency
    62. Stephane Richard Befoum, Jianbin Gao, Qi Xia, Victor Kombou, Benjamin Fabien Eyezo'O and Rossini Mulenga Mukupa. EAGLE: Ensemble Adaptive Graph Learning for Enhanced Ethereum Fraud Detection
    63. Mingming Huang, Xiaodan Zhang, Wei Mi, Huimei Liao and Yi Sun. AnsBridge: Towards Secure Cross-Chain Interoperability via Anonymous and Verifiable Validators
    64. Yuantong Li, Xiaofen Wang, Ke Zhang, Bo Zhang, Lei Zhang, Xiaosong Ding and Qing Xu.  BR-CPPFL: A Blockchain-based Robust Clustered Privacy-preserving Federated Learning System
    65. Changsong Yang, Han Wang, Yueling Liu, Yong Ding, Hai Liang and Zhenyu Li. FlowGraphNet: Efficient Malicious Traffic Detection via Graph Construction
    66. Tianyuan Fan, Gang Shen, Yuzhu Wang, Yuntao Wang and Mingwu Zhang.  Attribute-Based Adaptor Signature and Application in Control-based Atomic Swap
    67. Nikolaos Fotos, Koffi Ismael Ouattara, Dimitrios S. Karas, Ioannis Krontiris, Weizhi Meng and Thanassis Giannetsos. Actions Speak Louder Than Words: Evidence-Based Trust Level Evaluation in Multi-Agent Systems
    68. Xiaodong Wu, Tianyi Tang, Xiangman Li, Jianbing Ni and Yong Yu. When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No-box Setting
    69. Chaoyun Wang, Kedong Yan and Chanying Huang. Efficient Semi-asynchronous Federated Learning with Guided Selective Participation and Adaptive Aggregation
    70. Pengfei Zeng, Han Xia and Mingsheng Wang. BioVite: Efficient and Compact Privacy-Preserving Biometric Verification via Fully Homomorphic Encryption
    71. Tao Peng, Ling Gui, Lijun Cai, Junwei Tang, Aoshuang Ye and Fei Zhu. VULDA: Source Code Vulnerability Detection via Local Dependency Context Aggregation on Vulnerability-aware Code Mapping Graph
    72. Jun Xu, Guoju Gao, Yu-E Sun, He Huang and Yang Du.       FluxSketch: A Sketch-based Solution for Long-Term Fluctuating Key Flow Detection
    73. Dazhi Xu, Yuejun Liu, Jiabei Wang, Yiwen Gao and Yongbin Zhou. A Versatile Decentralized Attribute Based Signature Scheme for IoT   
    74. Zixing Lin, Yaolong Song and Rui Li. Robust Reversible Watermarking for 3D Models Based on Auto Diffusion Function
    75. Ya Gao, Chao Mu, Ming Yang and Xiaoming Wu. Privacy-Preserving K-hop Shortest Path Query on Encrypted Graphs Based on Graph Pruning
    76. Qingyuan Yu, Chuping Yan and Xiaoying Liu. CascadeGen: A Hybrid GAN-Diffusion Framework for Controllable and Protocol-Compliant Synthetic Network Traffic Generation
    77. Xiuhua Wang, Shikang Li, Fengrui Fan, Shuai Wang, Yiwei Li and Yu Zheng. Improving Byzantine-resilience in Federated Learning via Diverse Aggregation and Adaptive Variance Reduction     
    78. Shouchen Zhou, Lu Zhou and Yu Tao.   No Place to Hide: An Efficient and Accurate Backdoor Detection Tool for Ethereum ERC-20 Smart Contracts    
    79. Yongzhen Jiang, Haoran Li, Hongjia Liu, Jiageng Pan and Jian Xu.   Not only spatial, but also spectral: Unnoticeable backdoor attack on 3D point clouds   
    80. Qi Li, Wenying Zhang and Xiaomeng Sun. Permutation-Based Cryptanalysis of the SCARF Block Cipher and Its Randomness Evaluation
    81. Tianyi Huang, Xiaolin Zhang, Kailun Qin, Boshi Yuan, Chenghao Chen, Yipeng Shi, Chi Zhang and Dawu Gu. Secure and Scalable TLB Partitioning Against Timing Side-Channel Attacks
    82. Shanlin Deng, Mingliang Liu, Si Wu and Baojian Hua. RustGuard: Detecting Rust Data Leak Issues with Context-Sensitive Static Taint Analysis
    83. Xiaocong Lin, Weijing You, Chenchen Wu, Wenmao Liu and Qi Gu. TA-PDC: Provable Data Contribution with Traceable Anonymous for Group Transactions
    84. Faqi Zhao, Rong Shi, Guoqiao Zhou, Wen Wang and Feng Liu. KVT-Payload: Knowledge Graph-Enhanced Hierarchical Vulnerability Traffic Payload Generation
    85. Yawen Huang and Huaicong Zhang. Hierarchical Recovery of Convolutional Neural Networks via Self-Embedding Watermarking     
    86. Bohang Wei, Yang Yang, Shihong Xiong, Minghang Li, Qianhong Wu and Bo Qin. TrustBlink: A zkSNARK-Powered On-Demand Relay for PoW Cross-Chain Verification With Low Costs
    87. Sixin Fang, Ke Cheng, Jixin Zhang, Zheng Qin and Mingwu Zhang. Secure Guard: A Semantic-Based Jailbreak Prompt Detection Framework for Protecting Large Language Models
    88. Huibo Yang, Zhize Hao and Tao Liu. R1-MFSol: a Smart Contract Vulnerability Detection Model Based on LLM and Multi-modal Feature Fusion
    89. Hao Lin, Xiaoming Hu, Shuangjie Bai and Yan Liu. Personalized Federated Learning Algorithm Based on User Grouping and Group Signatures
    90. Guangxiang Dai, Peng Wang and Duohe Ma. Construction and Application of Vulnerability Intelligence Ontology under Vulnerability Management Perspective
    91. Yuxia Zhou, Qiao Xue and Youwen Zhu. Fine-filter: An Effective Defense against Poisoning Attacks on Frequency Estimation under LDP
    92. Maximilian Schreiber and Pascal Tippe. Security Vulnerabilities in AI-Generated Code: A Large-Scale Analysis of Public GitHub Repositories