While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. The conference will cover research on all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of NSS is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments.
Founded in 2007, the aim of the NSS (International Conference on Network and System Security) series is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. NSS 2025 is the 19th edition of the International Conference on Network and System Security series, which started in 2007. Previous editions were held in: Abu Dhabi, UAE (2024); Canterbury, UK (2023); Fiji (2022); Tianjin, China (2021); Melbourne, Australia (2020); Sapporo, Japan (2019); Hong Kong, China (2018); Helsinki, Finland (2017); Taipei (2016); New York City, USA (2015); Xi'an, China (2014); Madrid, Spain (2013); Wu Yi Shan, China (2012); Milan, Italy (2011); Melbourne, Australia (2010); Gold Coast, Australia (2009); Shanghai, China (2008); and Dalian, China (2007).
Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. It has been widely recognised that security and privacy are the critical challenges for Social Networks and Big Data applications due to their scale, complexity and heterogeneity.
SocialSec 2025 is the 11th edition of the International Symposium on Security and Privacy in Social Networks and Big Data series, which started in 2015. Previous editions were held in: Abu Dhabi, UAE (2024); Canterbury, UK (2023); Xi'an, China (2022); Fuzhou, China (2021); Tianjin, China (2020); Copenhagen, Denmark (2019); Santa Clara, CA, USA (2018); Melbourne, Australia (2017); Fiji (2016); and Hangzhou, China (2015).
Central China Normal University, China
Wuhan University, China
Note: The order of speakers is sorted according to the alphabetical order of surname.
Willy Susilo,
Professor
University of Wollongong
Willy Susilo is a Distinguished Professor at the School of Computing and Information Technology, Faculty of Engineering and Information Sciences at the University of Wollongong (UOW), Australia. He holds the most prestigious Australian Laureate Fellowship awarded by the Australian Research Council. He is the director of Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, UOW. He is an IEEE Fellow, an IET Fellow, an ACS Fellow and an AAIA Fellow. Previously, he was awarded the prestigious Australian Research Council Future Fellowship in 2009. He has published more than 500 papers in journals and conference proceedings in cryptography and network security. In 2016, he was awarded the "Researcher of the Year" at UOW, due to his research excellence and contributions. He is the Editor-in-Chief of the Information journal and the Special Content Editor of the Elsevier’s Computer Standards and Interfaces. He is also serving as an Associate Editors in several international journals. He has also served as the program committee member of several international conferences.
Jian Shen,
Professor
Zhejiang Sci-Tech University
Jian Shen is a Professor, doctoral supervisor, and the Dean of the College of Information Science and Engineering at Zhejiang Sci-Tech University, with research interests in public key cryptography, data security, and blockchain. A national-level leading talent and chief scientist of a national key R&D program, he leads a Zhejiang provincial-level leading innovation team and has received honors such as the Second Prize of the Natural Science Award from the Ministry of Education (ranking first) and the Outstanding Youth Award from the Chinese Association for Cryptologic Research. He was awarded the National Science Fund for Excellent Young Scholars and has spearheaded three major national projects, including the National Key Research and Development Program and a key joint project of the National Natural Science Foundation. Having published over one hundred high-level academic papers, he has been recognized as a Global Highly Cited Scientist for the last five consecutive years. His professional commitments include serving as a committee member for the Chinese Association for Cryptologic Research's Security Protocol Committee and its Big Data and Artificial Intelligence Security Committee, a committee member of the Chinese Institute of Electronics' Cyberspace Security Committee, and an executive committee member of the China Computer Federation's Blockchain Committee, in addition to acting as editor-in-chief and editorial board member for several international journals and chairing numerous international academic conferences.
Qianhong Wu,
Professor
Beihang University
Qianhong Wu is a Professor and Supervisor for both master's and doctoral candidates, serving as Vice Dean of the School of Cyberspace Science and Technology at Beihang University. He holds the title of Qianjiang Distinguished Expert in Hangzhou and is a member of several key academic committees, including the Cryptography Protocol Committee and the Cryptography Application Working Committee of the Chinese Association for Cryptologic Research, as well as a Standing Committee Member of both the Blockchain Expert Committee of the Chinese Institute of Electronics and the Blockchain Committee of the China Computer Federation. He earned his Ph.D. from the School of Telecommunications Engineering at Xidian University in 2004. His professional career includes positions as a Research Fellow at the School of Computing and Information Technology, University of Wollongong, Australia; Associate Professor at the School of Computer Science, Wuhan University, China; and Senior Researcher and Research Director at the Department of Computer Science and Mathematics, Universitat Rovira i Virgili, Spain. Dr. Wu has long been engaged in research on blockchain and applied cryptography. He has published over 200 academic papers, including more than 20 in top-tier journals and conferences such as IEEE/ACM Transactions, TIFS, TDSC, Eurocrypt, Asiacrypt, and ACM CCS, authored 3 monographs, and filed over 100 related invention patents, with more than 50 granted. He has led or participated in over 10 blockchain-related projects, including Key Projects and General Projects of the National Natural Science Foundation of China, and topics under the National Key R&D Program of China, and spearheaded research for two national information security standards related to blockchain. His research achievements in blockchain privacy protection and regulation earned him the 2021 Qilin Science and Technology Award and the First Prize of the 2023 Innovation Award from the China Invention Association.
Areas of interest for NSS 2025 include but are not limited to:
Areas of interest for SocialSec 2025 include but are not limited to:
| NSS2025 | SocialSec2025 | |
| Paper submission deadline | June 15, 2025,July 6, 2025,July 14, 2025 (Firm Deadline) | July 13, 2025,July 27, 2025,August 15, 2025 |
| Notification to authors | August 20, 2025 | August 20, 2025,September 15, 2025 |
| Authors registration due | September 1, 2025, September 15, 2025 | September 1, 2025, September 25, 2025 |
| Camera-ready papers due | September 1, 2025, September 15, 2025 | September 1, 2025, September 25, 2025 |
| Conference dates | December 5-7, 2025 | December 5-7, 2025 |
Submissions must be made through the Conference's EasyChair system available at the following links:
NSS 2025 Submission Link SocialSec 2025 Submission Link
We will publish our proceedings with Springer as a volume of the Lecture Notes in Computer Science (LNCS) series.
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 20 pages in length (single column), using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Detailed author instructions and LaTeX/Word templates for LNCS publications can be found via the following link:
Springer LNCS Author Information
Selected papers presented at the NSS-SocialSec 2025 will be invited to consider submission (after significant extension) for special issues or topical selections in the following journals:
![]() |
Computers & Electrical Engineering (CEE)
Impact Factor: 4.0
中科院分区: 3区
SI:Protection Technologies for Data Security and Compliance (Confirmed) Learn more |
![]() |
Computer Standards & Interfaces (CSI)
Impact Factor: 4.1
中科院分区: 2区
SI:Advancing Secure AI: Privacy, Integrity, and Trustworthiness (Confirmed) Learn more |
![]() |
International Journal of Information Security (IJIS)
Impact Factor: 2.4
CCF级别: C类
中科院分区: 3区
SI:Emerging Encryption Techniques for Big Data Security (Confirmed) Learn more |
![]() |
Symmetry
Impact Factor: 2.2
中科院分区: 3区
SI:Applications Based on Symmetry in Adversarial Machine Learning (Confirmed) Learn more |
![]() |
IET blockchain
EI index
No publication fees
SI:Post-quantum security and privacy in Blockchain infrastructures (Confirmed) Learn more |
More journal special issues or topical selections will be announced soon.
Qian Wang, Wuhan University
Jianqun Cui, Central China Normal University
Hongwei Liu, Central China Normal University
Weizhi Meng, Lancaster University
Jiageng Chen, Central China Normal University
Debiao He, Wuhan University
Wei Xie, Central China Normal University
Liming Zhai, Central China Normal University
Guo Qing, A*STAR National University of Singapore
Jinquan Luo, Central China Normal University
Pei Li, Central China Normal University
Weizhi Meng, Lancaster University
Na Ruan, Shanghai Jiaotong University
Chunhua Su, University of Aizu
Je Sen Teh, Deakin University
Yahong Chen, Central China Normal University
Hui Liu, Central China Normal University
Wenna Song, Central China Normal University
Shixiong Yao, Central China Normal University
Chuadhry Mujeeb Ahmed, Newcastle University
Joonsang Baek, University of Wollongong
Nora Boulahia-Cuppens, Polytechnique Montréal
Aniello Castiglione, University of Salerno
Jiageng Chen, Central China Normal University
Yahong Chen, Central China Normal University
Koji Chida, Gunma University
Sherman S. M. Chow, The Chinese University of Hong Kong
Wenjun Fan, Xian Jiaotong-Liverpool University
Davide Ferraris, University of Malaga
Afonso Ferreira, Institut de Recherches en Informatique de Toulouse
Guillaume Hiet, CentraleSupélec
Shoichi Hirose, University of Fukui
Sokratis Katsikas, Norwegian University of Science and Technology
Shinsaku Kiyomoto, KDDI Research Inc.
Albert Levi, Sabanci University
Wanpeng Li, University of Aberdeen
Hui Liu, Central China Normal University
Wojciech Mazurczyk, Warsaw University of Technology
Florian Mendel, Infineon Technologies
Weizhi Meng, Lancaster University
Antonio Muñoz, University of Málaga
Daniela Pöhn, Universität der Bundeswehr München
Chen Qian, Shandong University
Fatemeh Rezaeibagha, Murdoch University
Jun Shao, Zhejiang Gongshang University
Mohammad Shojafar, University of Surrey
Yangguang Tian, University of Surrey
Ehsan Toreini, University of Surrey
Jacques Traore, Orange Labs
Chenyu Wang, Beijing University of Posts and Telecommunications
Ding Wang, Nankai University
Yongge Wang, UNC Charlotte
Yuntao Wang, The University of Electro-Communications
Zhe Xia, Wuhan University of Technology
Toshihiro Yamauchi, Okayama University
Shixiong Yao, Central China Normal University
Kuo-Hui Yeh, National Yang Ming Chiao Tung University
Xun Yi, RMIT University
Kazuki Yoneyama, Ibaraki University
Liming Zhai, Central China Normal University
Mingwu Zhang, Hubei University of Technology
Donghui Hu, Hefei University of Technology
Ju Jia, Southeast University
Tian Wu, NanChang University
Jianhua Yang, Guangdong Polytechnic Normal University
Game-Theoretic Defense Against Encrypted Data Poisoning in Federated Learning for Social Networks
Zhe Sun, Wenxin Gao, Peijie Yin, Weiping Li, Ming Zhang, Yahong Chen and Jiangang Shu
Enabling Secure and Efficient Authenticated Edge Inference for the Internet of Things
Wenjie Li and Jiageng Chen
A Privacy-Preserving Cross-Chain Access Control Scheme Based on Threshold Fully Homomorphic Encryption
Huan Zhang, Pei Li and Yuanfang Chen
FG-LAS: A Fault-Tolerant and Group Handover Lightweight Authentication Scheme for Dynamic and Heterogeneous STIN Environments
Yunxiang Zhang, Xuan Zhang and Shixiong Yao
A Privacy-Preserving Data Aggregation Scheme with Inner-Product Encryption for Smart Grids
Zhe Xia, Sha Wu, Cheng Tan and Yifei Wang
PMDID: A Privacy-Preserving and Migratable Decentralized Identity Using PUF and Blockchain
Yueyue He, Koji Inoue, Wenxuan Fan, Kaiming Chen and Atsuko Miyaji
New insights into effects of fluctuations on dynamical degradation of digital chaos
Kai Lin, Xiangguang Sun, Jun Zheng and Hanping Hu
Lightweight Mutual Authentication for End-to-End Communication in Satellite Internet
Yuanjing Hou and Shixiong Yao
Parallel Implementation of Activation Functions and Arithmetic Operations Based on TFHE
Miaomiao Li and Pei Li
An Improved PUF-Based Three-Factor Authentication Scheme for Industrial IoT
Qingyun Liu and Fengtong Wen
Feature Machine Unlearning in Diffusion Models
Linlin Wang, Tianqing Zhu, Laiqiao Qin, Lihua Yin and Wanlei Zhou
FraudTrace: Verifying Fraudulent News to Prevent Online Scam Campaigns via a Multi-Agent LLM-Based System
Hoang-Phuc Nguyen, Dang Bui Tan Hai, Quyen Nguyen Huu and Duy Phan The
Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment
Samra Bouakkaz, Luis Suárez, Nora Boulahia-Cuppens and Frédéric Cuppens
IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain
Haosu Cheng, Guanquan Shi, Kangkang Zhang and Wenyu Zhang
Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior
Zhuotao Lian, Weiyu Wang, Qingkui Zeng, Toru Nakanishi, Teruaki Kitasuka and Chunhua Su
Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives
Joan Ferré-Queralt, Jordi Castellà-Roca and Alexandre Viejo
Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control
Gabriela Mogos
A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices
Zexu Li, Shanshan Tu, Kun Li, Jiakai Dou and Dazhong Liu
HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection
Tianming Zheng, Feiyang Huang, Yixin Jiang, Wenqian Xu, Zhihong Liang and Hua Li
A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection
Souhayla Touk, Saad El Jaouhari and Maurras Togbe
MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention
Linquan Huang, Chuanqi Chen, Bo Zhao, Hui Liu and Ke Zhang
Post-quantum Blockchain Transaction Model Based on Dilithium
Guangxia Xu, Yannan Guan and Lu Wang
Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach
Lucien Kiven Tamo, Brooke Kidmose, Weizhi Meng and Thanassis Giannetsos
Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing
Zhang Zhiguo, Wang Junyong, Zhang Chongzhen, Dai Jiao, Liu Chong, Hu Fuqiang, Yan Dantong and Tian Hongquan
An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment
Haibo Tian, Zhengdong Liang and Ting Zhang
Real-Time Anomaly Detection for Event-based Insider Threat Hunting
Thibault Leblanc, Neda Baghalizadeh-Moghadam, Frédéric Cuppens and Nora Boulahia-Cuppens
A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection
Xinyi Zhang, Peng Yu, Yifei Wang and Mingwu Zhang
Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples
Luong Hoang Minh, Duong The Dat, Bui Tan Hai Dang, Le Duc Thinh, Doan Minh Trung and Phan The Duy
Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features
Farhan Ahmad, Muhammad Mansoor Alam, Muhammad Salman and Komal Batool
An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs
Zhenhua Han, Gang Shen and Jiazheng Pei
X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis
Phan The Duy, Truong Thi Hoang Hao, Nguyen Viet Hoang, Nguyen Duc Trung, Le Duc Thinh, Doan Minh Trung and Van-Hau Pham
A Privacy-Preserving Semi-Supervised Algorithm for Non-Gaussian Noise Environments
Ling Zuo, Heng Xiao and Chi Cheng
Physical Layer Security via Movable Antenna in Near-Field
Yinghui Wang, Lei Zhang and Hang Chen
At least one author of each accepted paper has to pay a Full Registration. An author with multiple accepted papers must pay the full registration fee for each accepted paper to ensure your paper to be included in the proceedings. Registration for the conference cannot be canceled. There is no refund of registration fees.
| Registration Type | Registration Fee |
| Full Registration (paper authors) | 3900CNY/560USD |
| Participant Registration (non-paper authors) | 1500CNY/220USD |
Each registrant should send the Transfer Receipt and Registration Form (see below) to yaosx@ccnu.edu.cn with subject "Registrationform-paper ID" (your paper ID can be found out from EasyChair).
开户银⾏名称: 交通银⾏武汉卓⼑泉⽀⾏
帐号: 4218 6454 6018 0100 30570
户名: 武汉雄楚国际酒店管理有限公司
开户银⾏⾏号: 301521010022
识别号: 91420111789348951D
汇款备注信息:"NSS2025 (SocialSec2025)#论⽂编号(如适⽤)#姓名"
Click here (https://paypal.me/NSS2025), Your payment will be made to the NSS-SocialSec2025 Account
For Author, Please provide your Paper ID as Payment Message
For Participants, Please provide your Full Name as Payment Message
TBA.
Multi-function Hall, 2nd Floor, Wuhan Xiongchu International Hotel (二楼,多功能厅,武汉雄楚国际大酒店)
No. 335 Xiongchu Avenue, Hongshan District, Wuhan City
Wuhan Xiongchu International Hotel (武汉雄楚国际大酒店)
杨经理(13638661542)