Data Security and Privacy Protection: Third International Conference, DSPP 2025, Xi'an, China, October 16–18, 2025, Proceedings, Part II

Author:   Xiaofeng Chen ,  Haibo Hu ,  Ding Wang
Publisher:   Springer Verlag, Singapore
ISBN:  

9789819531844


Pages:   237
Publication Date:   15 October 2025
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Data Security and Privacy Protection: Third International Conference, DSPP 2025, Xi'an, China, October 16–18, 2025, Proceedings, Part II


Overview

This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025. The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections: Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and Technologies. Part II: AI-based Security Applications and Technologies; Cryptographic Protocols Design and Analysis; Model Security and Copyright Protection.

Full Product Details

Author:   Xiaofeng Chen ,  Haibo Hu ,  Ding Wang
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
ISBN:  

9789819531844


ISBN 10:   9819531845
Pages:   237
Publication Date:   15 October 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- AI-based Security Applications and Technologies. .- Dual-FER: A Dual-Network Approach to Facial Expression Recognition with Enhanced Generalization. .- Digital Forensics in Ransomware Analysis for Windows-Based Computer Systems. .- Evaluating Deep Learning in Gait Recognition. .- Composite Weather Image Restoration Based on Two-Stage Feature Learning. .- An Efficient Explainability Framework for Graph Neural Networks. .- Cryptographic Protocols Design and Analysis. .- Post-Quantum Privacy-Preserving Smart Meter Data Collection Scheme from Coding. .- High-Throughput Threshold SM2 Signatures with Robustness. .- Attacks on Implementations of Lindell 17 and its Variants. .- RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium for VANETs. .- A Key Derivation Tree-Based Encryption and Verification Scheme for EV Data Auditing. .- Security Weaknesses in ISO 15118-Based CCS2 Charging. .- Model Security and Copyright Protection. .- SemBits: Multi-Bit Semantic Watermarking with Sentence-Level Hashing for LLMs. .- Robust Ownership Verification in Large Language Models via Equivalent Neuron Pair Encoding. FreMark: Frequency-Domain Watermark Embedding in Quantized LLMs. .- Bypassing Cross-Domain Restrictions with Unsupervised Visual Translation.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

OCT_RG_2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List