05772nam 22007575 450 99666847130331620250712074756.0981-9691-01-X10.1007/978-981-96-9101-2(MiAaPQ)EBC32205725(Au-PeEL)EBL32205725(CKB)39622847000041(DE-He213)978-981-96-9101-2(OCoLC)1527722763(EXLCZ)993962284700004120250710d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInformation Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III /edited by Willy Susilo, Josef Pieprzyk1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (764 pages)Lecture Notes in Computer Science,1611-3349 ;15660981-9691-00-1 -- Privacy Enhancing Technologies. -- Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy. -- Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. -- Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug Charge for Shared Vehicles. -- Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis. -- Sentence Embedding Generation Method for Differential Privacy Protection. .-KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation. -- AI Security and Privacy. -- Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. .-RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models. -- DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning. -- FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory. -- DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend. -- MG-Det: Deepfake Detection with Multi-Granularity. -- LPIA: Label Preference Inference Attack against Federated Graph Learning. -- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention. -- Zeroth-Order Federated Private Tuning for Pretrained Large Language Models. -- Understanding the Robustness of Machine-Unlearning Models. -- System Security. -- Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities. -- SoK: From Systematization to Best Practices in Fuzz Driver Generation. -- Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps. -- Short Papers. -- EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing. -- Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics. -- Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application. -- Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight. -- Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith’s Techniques. -- Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection. -- Position Paper. -- Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases.This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.Lecture Notes in Computer Science,1611-3349 ;15660Data protectionComputer securityCryptographyData encryption (Computer science)Data protectionLaw and legislationComputer networksSecurity measuresBlockchains (Databases)Data and Information SecurityPrinciples and Models of SecurityCryptologyPrivacyMobile and Network SecurityBlockchainData protection.Computer security.Cryptography.Data encryption (Computer science)Data protectionLaw and legislation.Computer networksSecurity measures.Blockchains (Databases)Data and Information Security.Principles and Models of Security.Cryptology.Privacy.Mobile and Network Security.Blockchain.005.8Susilo Willy1759814Pieprzyk Josef486892MiAaPQMiAaPQMiAaPQBOOK996668471303316Information Security and Privacy4406540UNISA07078nam 22007455 450 991099967270332120250423130214.03-031-90062-610.1007/978-3-031-90062-4(CKB)38537208700041(DE-He213)978-3-031-90062-4(MiAaPQ)EBC32023843(Au-PeEL)EBL32023843(OCoLC)1517578026(EXLCZ)993853720870004120250423d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierApplications of Evolutionary Computation 28th European Conference, EvoApplications 2025, Held as Part of EvoStar 2025, Trieste, Italy, April 23–25, 2025, Proceedings, Part I /edited by Pablo García-Sánchez, Emma Hart, Sarah L. Thomson1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XXII, 576 p. 189 illus., 170 illus. in color.) Lecture Notes in Computer Science,1611-3349 ;156123-031-90061-8 -- EvoApplications. -- Optimizing Dietary Plans Using Evolutionary Algorithms. -- Building Cross-Sectional Trading Strategies via Geometric Semantic Genetic Programming. -- Adjacent Distance Matrix-based Competitive Swarm Optimizer. -- The More the Merrier: On Evolving Five-valued Spectra Boolean Functions. -- Search Trajectory Networks Applied to a Real-world Parallel Batch Scheduling Problem. -- Optimizing the logistics operations of distribution network operators from a multinational electric utility company. -- Analysis of Illicit Drug Mixtures at Festivals Using Portable Near-Infrared Spectroscopy with Genetic Programming. -- Hybrid Optimization of Horizontal Alignments in European Terrains: A Comparative Study. -- Facial Geometric Feature Extraction for Dimensional Emotion Analysis Using Genetic Programming. -- Methodology for Designing Injection Molds: Data Mining and Multi-Objective Optimization. -- Climbing the tower of meta-mutations - the role of higher-order mutations. -- Evolutionary Reinforcement Learning for Interpretable Decision-Making in Supply Chain Management. -- Grammatical Feature Construction for Enhanced Interpretability in Breast Cancer Classification. -- Designing Hardware-Friendly Hash Functions for Network Security Using Cartesian Genetic Programming. -- Understanding trade-offs in classifier bias with quality-diversity optimization: an application to talent management. -- Genetic Programming with Co-operative Co-evolution for Feature Manipulation in Basal Cell Carcinoma Identification. -- Multi-Objective Evolutionary Optimization of Virtualized Fast Feedforward Networks. -- Variable-Size Genetic Network Programming for Portfolio Optimization with Trading Rules. -- Evolving Dynamic Fault Mitigation Strategies in a Robot Swarm for Collective Transport. -- Inferring Reaction Elasticities from Metabolic Correlations in Cells through Multi-objective Evolutionary Optimization. -- Trace-Elites: better Quality-Diversity with Multi-Point Descriptors. -- Optimizing Camera Placement for Chicken Farm Monitoring. -- Adaptive Local Search for Real-World Multi-Echelon Inventory Control. -- Evolutionary Computation for Causality-Driven Feature Selection: A Preliminary Study. -- A Coach-Based Quality-Diversity Approach for Multi-Agent Interpretable Reinforcement Learning. -- FedGP: Genetic Programming for Evolutionary Aggregation in Federated Learning with Non-IID data. -- A Genetic Algorithm Approach for Aggregation of Residential Electricity Prosumers’ Flexibility. -- Algorithm Selection with Probing Trajectories: Benchmarking the Choice of Classifier Model. -- Real Application Challenges in Evolutionary Optimization? People!. -- The Importance of Being Earnest: Multiple Heterogeneous Container Loading with a Simple Genetic Algorithm. -- Emergent kin selection of altruistic feeding behaviour via non-episodic neuroevolution. -- Stalling in Space: Attractor Analysis for any Algorithm. -- Using Local Correlation Between Objectives to Detect Problem Modality. -- Greater AI Design Control Aids Evolution of Computational Materials. -- Scalable Evolution of Logically Independent Polycomputational Materials.This two-volume set, LNCS 15612 and 15613 constitutes the refereed proceedings of the 28th European Conference on Applications of Evolutionary Computation, EvoApplications 2025, held as part of EvoStar 2025, in Trieste, Italy, during April 23–25, 2025, and co-located with the EvoStar events, EvoCOP, EvoMUSART, and EuroGP. The 50 full papers and 18 short papers presented in this book were carefully reviewed and selected from 104 submissions. These papers have been organized in the following topical sections: Part I: EvoApplications. Part II: Evolutionary machine learning; 30 years of particle swarm optimisation; Analysis of Evolutionary Computation Methods: Theory, Empirics, and Real-World Applications; Bio-inspired Algorithms for Green Computing and Sustainable Complex Systems; Computational Intelligence for Sustainability; EvoLLMs (Integrating Evolutionary Computing with Large Language Models (LLMs); Evolutionary Computation in Edge, Fog, and Cloud Computing; Evolutionary Computation in Image Analysis, Signal Processing, and Pattern Recognition; Machine Learning and AI in Digital Healthcare and Personalized Medicine; Soft Computing Applied to Games.Lecture Notes in Computer Science,1611-3349 ;15612Computer scienceComputersComputer networksComputers, Special purposeComputer systemsComputer scienceMathematicsTheory of ComputationComputing MilieuxComputer Communication NetworksSpecial Purpose and Application-Based SystemsComputer System ImplementationMathematics of ComputingComputer science.Computers.Computer networks.Computers, Special purpose.Computer systems.Computer scienceMathematics.Theory of Computation.Computing Milieux.Computer Communication Networks.Special Purpose and Application-Based Systems.Computer System Implementation.Mathematics of Computing.004.0151García Sánchez Pabloedthttp://id.loc.gov/vocabulary/relators/edtHart Emmaedthttp://id.loc.gov/vocabulary/relators/edtThomson Sarah Ledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910999672703321Applications of Evolutionary Computation2834163UNINA