LEADER 04429nam 22007335 450 001 9911046556503321 005 20251014130418.0 010 $a981-9531-85-3 024 7 $a10.1007/978-981-95-3185-1 035 $a(MiAaPQ)EBC32352811 035 $a(Au-PeEL)EBL32352811 035 $a(CKB)41645663600041 035 $a(DE-He213)978-981-95-3185-1 035 $a(EXLCZ)9941645663600041 100 $a20251014d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Security and Privacy Protection $eThird International Conference, DSPP 2025, Xi'an, China, October 16?18, 2025, Proceedings, Part II /$fedited by Xiaofeng Chen, Haibo Hu, Ding Wang 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (376 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16177 311 08$a981-9531-84-5 327 $a -- AI-based Security Applications and Technologies. -- Dual-FER: A Dual-Network Approach to Facial Expression Recognition with Enhanced Generalization. -- Digital Forensics in Ransomware Analysis for Windows-Based Computer Systems. -- Evaluating Deep Learning in Gait Recognition. -- Composite Weather Image Restoration Based on Two-Stage Feature Learning. -- An Efficient Explainability Framework for Graph Neural Networks. -- Cryptographic Protocols Design and Analysis. -- Post-Quantum Privacy-Preserving Smart Meter Data Collection Scheme from Coding. -- High-Throughput Threshold SM2 Signatures with Robustness. -- Attacks on Implementations of Lindell 17 and its Variants. -- RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium for VANETs. -- A Key Derivation Tree-Based Encryption and Verification Scheme for EV Data Auditing. -- Security Weaknesses in ISO 15118-Based CCS2 Charging. -- Model Security and Copyright Protection. -- SemBits: Multi-Bit Semantic Watermarking with Sentence-Level Hashing for LLMs. -- Robust Ownership Verification in Large Language Models via Equivalent Neuron Pair Encoding. -- FreMark: Frequency-Domain Watermark Embedding in Quantized LLMs. -- Bypassing Cross-Domain Restrictions with Unsupervised Visual Translation. 330 $aThis book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16?18, 2025. The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections: Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and Technologies. Part II: AI-based Security Applications and Technologies; Cryptographic Protocols Design and Analysis; Model Security and Copyright Protection. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16177 606 $aData protection 606 $aData protection$xLaw and legislation 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aPrivacy 606 $aCryptology 606 $aSecurity Services 606 $aPrinciples and Models of Security 606 $aMobile and Network Security 615 0$aData protection. 615 0$aData protection$xLaw and legislation. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aPrivacy. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aPrinciples and Models of Security. 615 24$aMobile and Network Security. 676 $a005.8 700 $aChen$b Xiaofeng$0850517 701 $aHu$b Haibo$0851635 701 $aWang$b Ding$01071455 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911046556503321 996 $aData Security and Privacy Protection$94466443 997 $aUNINA