LEADER 05393nam 22007215 450 001 9911049172003321 005 20260102123014.0 010 $a981-9535-51-4 024 7 $a10.1007/978-981-95-3551-4 035 $a(CKB)44770008500041 035 $a(MiAaPQ)EBC32470897 035 $a(Au-PeEL)EBL32470897 035 $a(DE-He213)978-981-95-3551-4 035 $a(EXLCZ)9944770008500041 100 $a20260102d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Safety and Security $e15th International Symposium, CSS 2025, Hangzhou, China, July 4?7, 2025, Proceedings /$fedited by Yang Xiang, Jian Shen 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (671 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16195 311 08$a981-9535-50-6 327 $a -- Dynamic spectrum sharing scheme for anti-malicious user's queries based on blockchain. -- Internet of Vehicle Privacy Protection Solution Based on Blockchain and Zero Knowledge Proof. -- A New Asymmetric Three-Party Key Agreement Protocol Based on Secure Multiparty Computation. -- TCAu?Time-Controllable Air-Space-Ground Authentication. -- A NIZK-Based Linkable Ring Signature Scheme for Anonymous Blockchain System on Lattice. -- CP-ABZP: A CP-ABE Cross-chain Privacy Protection Scheme Combined with Zero-Knowledge Proof. -- A Novel Dual-layer Access Control Model based on Blockchain for the Case-involved Property Management. -- MUSES: Secure Multi-User Encrypted Speech Search in Cloud-Edge-End Environments. -- Efficient Group Key Management for Vehicle Ad Hoc Networks. -- Privacy-Preserving Machine Learning Using Functional Encryptions for Multiple Models with Constant Ciphertext. -- A Privacy-preserving Delegable Auditing Scheme with Edge-assisted Deduplication in IoT. -- A Multi-KGC Certificateless Anonymous Cloud Sharing Scheme with Threshold-based Traceability. -- A Differential Privacy Approach to Optimization for Protecting Large Models. -- Unifying Physical-Layer Security and Post-Quantum Cryptography: An Optimized Authentication Encryption Protocol. -- Anonymous Batch Authentication and Key Agreement for Internet of Things. -- A lightweight Privacy-Preserving kNN Query Framework via Secret Sharing in Cloud Computing. -- BiLSTMTimeGAN: Enhancing Side-Channel Attacks through Temporal Data Augmentation. -- An encrypted anomaly traffic detection method integrating adversarial training and multi-scale contrastive learning. -- MGtest: Python Coverage-Guided Model-Level Fuzzing for DL frameworks. -- Collaborative Physical Layer Authentication for Vehicular Networks based on Dempster-Shafer Evidence Theory. -- A Survey of Kernel Fuzzing. -- Federated Learning against Dynamic Mixed Poisoning Attack and its Defense. -- Robust Fake Image Detection via Incremental Training of Siamese Neural Networks. -- Advancing Deepfake Detection through Head Pose Estimation on New-Generation Datasets. -- A Verifiable and Privacy-Preserving Credit Risk Prediction under Secure Neural Network Scheme. -- Security Assessment in Optical Networks: A Path Graph-based Framework for Attack-Induced Fault Diagnosis. -- Machine Learning Model Construction and Multi-Dimensional Evaluation for Pop-up Text Sentiment Analysis. -- Enhancing Double Ratchet Algorithm with Pre-Shared Key Mechanism and Optimal KDF Selection. 330 $aThis book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, held in Hangzhou, China, on February 24, 2025. The 28 full papers were presented in this volume were carefully reviewed and selected from 112 submissions. This conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16195 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aArtificial intelligence 606 $aData and Information Security 606 $aCryptology 606 $aComputing Milieux 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputers. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputing Milieux. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aXiang$b Yang$01860658 701 $aShen$b Jian$01407987 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911049172003321 996 $aCyberspace Safety and Security$94519890 997 $aUNINA