Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Data Security and Privacy Protection -

Data Security and Privacy Protection

Third International Conference, DSPP 2025, Xi'an, China, October 16–18, 2025, Proceedings, Part II

Xiaofeng Chen, Haibo Hu, Ding Wang (Herausgeber)

Buch | Softcover
237 Seiten
2025
Springer Verlag, Singapore
978-981-95-3184-4 (ISBN)
CHF 74,85 inkl. MwSt
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.


The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions.


The papers are organized in the following topical sections:


Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and Technologies.


Part II: AI-based Security Applications and Technologies; Cryptographic Protocols Design and Analysis; Model Security and Copyright Protection.

.- AI-based Security Applications and Technologies.


.- Dual-FER: A Dual-Network Approach to Facial Expression Recognition
with Enhanced Generalization.


.- Digital Forensics in Ransomware Analysis for Windows-Based
Computer Systems.


.- Evaluating Deep Learning in Gait Recognition.


.- Composite Weather Image Restoration Based on Two-Stage Feature
Learning.


.- An Efficient Explainability Framework for Graph Neural Networks.


.- Cryptographic Protocols Design and Analysis.


.- Post-Quantum Privacy-Preserving Smart Meter Data Collection
Scheme from Coding.


.- High-Throughput Threshold SM2 Signatures with Robustness.


.- Attacks on Implementations of Lindell 17 and its Variants.


.- RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium
for VANETs.


.- A Key Derivation Tree-Based Encryption and Verification Scheme for
EV Data Auditing.


.- Security Weaknesses in ISO 15118-Based CCS2 Charging.


.- Model Security and Copyright Protection.


.- SemBits: Multi-Bit Semantic Watermarking with Sentence-Level
Hashing for LLMs.


.- Robust Ownership Verification in Large Language Models via
Equivalent Neuron Pair Encoding.


.- FreMark: Frequency-Domain Watermark Embedding in Quantized LLMs.


.- Bypassing Cross-Domain Restrictions with Unsupervised Visual
Translation.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo 45 Illustrations, color; 12 Illustrations, black and white
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Adversarial Attack • Blockchain • Cloud Computing • Cloud Storage • Database Security • Data Integrity Verification • Deep learning • differential privacy • Digital Signatures • federated learning • functional encryption • Large language model • privacy preserving • searchable encryption • wireless network security • Zero-knowledge
ISBN-10 981-95-3184-5 / 9819531845
ISBN-13 978-981-95-3184-4 / 9789819531844
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95