


default search action
30th ACISP 2025: Wollongong, NSW, Australia - Part III
- Willy Susilo

, Josef Pieprzyk
:
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III. Lecture Notes in Computer Science 15660, Springer 2025, ISBN 978-981-96-9100-5
Privacy Enhancing Technologies
- She Sun, Jiafei Wu, Jian Yang, Li Zhou, Huiwen Wu

:
Comparing and Improving Frequency Estimation Perturbation Mechanisms Under Local Differential Privacy. 3-21 - Changsong Jiang

, Chunxiang Xu
, Guomin Yang
, Li Duan
, Jing Wang
:
Strong Federated Authentication With Password-Based Credential Against Identity Server Corruption. 22-41 - Kyosuke Hatsugai, Kyoichi Asano

, Yuki Sawai, Yohei Watanabe
, Mitsugu Iwamoto
:
Anonymous Credentials with Credential Redaction and Its Application to SSI-Based Plug&Charge for Shared Vehicles. 42-62 - Akito Yamamoto

, Tetsuo Shibuya
:
Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis. 63-83 - Yangyang Liu, Wanqi Wang, Jingyu Hua:

Sentence Embedding Generation Method for Differential Privacy Protection. 84-104 - Yuan Li, Changji Wang, Shiwen Hu:

KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-receiver Key Encapsulation. 105-123
AI Security and Privacy
- Sheldon C. Ebron Jr., Meiying Zhang, Kan Yang

:
Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. 127-146 - Kaiyue Feng, Guangsheng Zhang, Huan Tian, Heng Xu, Yanjun Zhang, Tianqing Zhu, Ming Ding

, Bo Liu
:
RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models. 147-166 - Zhenzhu Chen

, Yansong Gao
, Anmin Fu
, Fanjian Zeng, Boyu Kuang
, Robert H. Deng
:
DeGain: Detecting GAN-Based Data Inversion in Collaborative Deep Learning. 167-185 - Haocheng Ye, Lu Zhou, Hao Wang, Chunpeng Ge:

FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory. 186-206 - Huiwen Wu

, Chuan Ma, Xueran Li, Deyi Zhang, Xiaohan Li, She Sun:
DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend. 207-226 - Ahmed Asiri

, Luoyu Chen, Zhiyi Tian, Xiaoyu Ding, Shui Yu:
MG-Det: Deepfake Detection with Multi-granularity. 227-244 - Jiaxue Bai, Lu Shi, Yang Liu, Weizhe Zhang:

LPIA: Label Preference Inference Attack Against Federated Graph Learning. 245-264 - Lihua Wang

, Jiaojiao Jiang
, Salil S. Kanhere
, Jiamou Sun
, Sanjay K. Jha
, Zhenchang Xing
:
DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention. 265-284 - Xiaoyu Zhang, Yong Lin, Meixia Miao, Jian Lou, Jin Li, Xiaofeng Chen:

Zeroth-Order Federated Private Tuning for Pretrained Large Language Models. 285-306 - Guanqin Zhang, Feng Xu

, H. M. N. Dilum Bandara, Shiping Chen, Yulei Sui:
Understanding the Robustness of Machine-Unlearning Models. 307-326
System Security
- Jingzi Meng, Yuewu Wang, Lingguang Lei, Chunjing Kou, Peng Wang, Huawei Lu:

Mitigating the Unprivileged User Namespaces Based Privilege Escalation Attacks with Linux Capabilities. 329-347 - Qian Yan, Minhuan Huang, Huayang Cao, Shuaibing Lu:

SoK: From Systematization to Best Practices in Fuzz Driver Generation. 348-368 - Chuer Yu

, Siyi Xia, Haoyu Wang, Xia Liu, Zonghui Wang, Lirong Fu, Zhiyuan Wan, Yandong Gao, Yang Xiang, Wenzhi Chen:
Facial Authentication Security Evaluation Against Deepfake Attacks in Mobile Apps. 369-388
Short Papers
- Hua Shen, Xinjie Li, Zhen Fan, Ge Wu, Mingwu Zhang:

EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing. 391-398 - Arash Mahboubi

, Hamed Aboutorab
, Seyit Camtepe
, Hang Thanh Bui
, Khanh Luong
, Keyvan Ansari
, Shenlu Wang
, Bazara I. A. Barry:
Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics. 399-414 - Jiahao Xuan

:
Receiver-Initiated Updatable Public Key Encryption: Construction, Security and Application. 415-428 - Yuanyuan Zhang, Yu Liu, Yahui Wang, Tianqing Zhu, Mingwu Zhang:

Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight. 429-437 - Mengce Zheng

, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques. 438-446 - Guoan Liu, Jian Lin, Weiyu Dong, Jiaan Liu, Tieming Liu:

Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection. 447-458
Position Paper
- Xiaowei Zhang, Shigang Liu, Jun Zhang, Yang Xiang:

Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases. 461-479

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














