dblp: DSPP 2024 - Part I (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


2nd DSPP 2024: Xi'an, China - Part I

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Xiaofeng Chen, Xinyi Huang, Moti Yung:
Data Security and Privacy Protection - Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15215, Springer 2025, ISBN 978-981-97-8539-1
Blockchain and Related Technologies

Zi Jiao, Fucai Zhou, Qiang Wang, Jintong Sun
:
Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration. 3-20

Jiayi An, Haibo Tian:
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine. 21-38

Bo Li, Yuling Chen, Siyuan Huang, Yuxiang Yang:
Cross-Chain Asset Trading Scheme Without Trusted Third-Party. 39-51

Shichuan Guo:
Secure Monero on Corrupted Machines with Reverse Firewalls. 52-68

Phan Hoang Tuan Trung, Loc Van Cao Phu, Khoa Tran Dang, Kha Nguyen Hoang, Bao Tran Quoc, Hieu Doan Minh, Trong Nguyen Duong Phu, Ngan Nguyen Thi Kim:
Blockchain Solutions for Pediatric Vaccination Security: Encrypted NFTs. 69-84
Cryptographic Primitives, Protocols and Cryptanalysis

Yuan Tian, Yongda Pang:
Efficient Zero-Knowledge Argument for Bilinear Matrix Relation over the Residue Ring. 87-105

Yi Chuai, Leyou Zhang, Shuwei Xie, Runze Tian, Zhuang Shan:
Hierarchical Identity-Based Encryption Based on SM9. 106-118

Xin Liu, Willy Susilo
, Joonsang Baek
:
Extended Withdrawable Signature. 119-140

Jingwei Song, Xuru Li, Lifei Wei, Xinyu Meng, Le Yu:
SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networks. 141-159

Jiahao Liu, Jinshu Su, Yi Wang, Xincheng Tang:
Secure Key Exchange via Transparent Reverse Firewalls. 160-177

Jingjie Gan, Meijuan Huang, Yanqi Zhao, Sirui Ji:
An Efficient Public Key Searchable Encryption Scheme for the Healthcare Cloud. 178-194

Yingli Duan, Weizhi Meng
, Wei-Yang Chiu
:
UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions. 195-210

Chunhui Wu, Siwei Jiang, Fangguo Zhang, Yusong Du, Qiping Lin:
An Efficient Threshold Ring Signature from G+G Identification Protocol. 211-221
AI Security

Hao Song, Jiacheng Yao, Xuanze Chen, Shaocong Xu, Shibo Jin, Jiajun Zhou, Chenbo Fu, Qi Xuan, Shanqing Yu:
A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures. 225-243

Yancheng Sun, Yuling Chen, Ziyang Liu, Hui Dou, Chaoyue Tan:
Targeted Universal Adversarial Attack Based on Fourier Transform. 244-259

Kazi Fatema, Mehrin Anannya, Samrat Kumar Dey, Chunhua Su, Rashed Mazumder:
Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection. 260-275

Xiaowei Zhang, Shigang Liu, Jun Zhang, Yang Xiang:
PTFix: Rule-Based and LLM Techniques for Java Path Traversal Vulnerability. 276-293

Jiluan Fan
, Pei-Gen Ye, Anli Yan:
In-Context Learning with Differentially Private Text Sanitization in Large Language Models. 294-303

Meng Zhang, Xiangyang Luo, Ningbo Huang:
Social Media User Geolocation Based on Large Language Models. 304-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






