This book constitutes the refereed proceedings of the 20th International Conference on Information Security Practice and Experience, ISPEC 2025, held in Chengdu, China, during November 7–9, 2025.
The 27 full papers and 8 short papers included in these volumes were carefully reviewed and selected from 72 submissions. They are organized in the following topical sections: Federated Learning; Cryptography and Security Protocols; Cybersecurity and Intrusion Detection; Multimedia Security and Side-Channel Attacks; Privacy Protection and AI Security.
Table of Contents:
.- Federated Learning.
.- Secure Aggregation Scheme for Federated Learning with Bilateral Verification in the Internet of Vehicles.
.- A Personalized Federated Matrix Decomposition Recommendation Algorithm Based on Meta-Distillation.
.- Critical Neuron-Based Backdoor Defense for Federated Learning: A Combined Dropout and Local Outlier Factor Approach.
.- A Study on Free-Rider Detection Mechanism for a Fair Federated Learning-Based Intrusion Detection System.
.- A Reputation-Based Dynamic Aggregation Node Selection Method for Federated Learning.
.- Cryptography and Security Protocols.
.- Publicly Verifiable Multi-server Homomorphic Secret Sharing.
.- Meet-in-the-Middle Preimage Attacks with Multi-Match on ASCON-XOF.
.- Mixderive A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha.
.- A New Cryptanalytic Technique on Bit-Oriented Stream Ciphers and Application to ACORN v3.
.- A novel S-box construction technique based on the improved genetic algo-rithms through 2N-round searching.
.- Towards a Lattice-Based Non-Interactive Aggregate Signature Scheme Following the Fiat-Shamir with Aborts Paradigm.
.- Distributed Key Generation for SM2 and Its Applications to Threshold Encryption.
.- Cybersecurity and Intrusion Detection.
.- Zero-recollecting Mobile-app Identification over Drifted Encrypted Network Traffic.
.- An RPKI Certificate Validator for Formal Correctness.
.- Secure and Efficient File De-Duplication in Cloud Storage Using Checksums.
.- Blockchain-Based Real Estate Contract Authentication System for the Ejar Platform.
.- Traceable Multi-signature Scheme with Distributed Combiners and Lightweight Setup for Accountable Blockchain Transactions.
.- APT Attack Detection with Heterogeneous Provenance Graph and Adversarial Knowledge of Tactics, Techniques, and Procedures.
.- Multimedia Security and Side-Channel Attacks.
.- Research on image-based vulnerability detection of embedded firmware.
.- Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN.
.- Research on Video Steganography Based on Optical Flow Perception and Discrete Wavelet Transform.
.- Self-Supervised CNN for Video Double Compression Detection via Artifact Prediction.
.- Privacy Protection and AI Security.
.- Adversarial Defense via Clean-Sample Guided Adaptive Overlapping Patch for Traffic Sign Recognition Systems.
.- NIDS-GPT :A new GPT-based model for anomaly data package detection.
.- Authenticated and Incremental Single-Server Private Information Retrieval.
.- A Fully Anonymous Authentication Scheme with Cryptographic Reverse Firewalls in Vehicle-to-Grid Networks.
.- Enhancing FIDO2 Authentication Security through Markov Decision Process-Based Risk Assessment.
.- Assessing the Security of Vibe Coding: Baseline vs. Security-Oriented Prompts in LLM Code Generation.