About NSS 2025

While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. The conference will cover research on all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of NSS is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments.

Founded in 2007, the aim of the NSS (International Conference on Network and System Security) series is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. NSS 2025 is the 19th edition of the International Conference on Network and System Security series, which started in 2007. Previous editions were held in: Abu Dhabi, UAE (2024); Canterbury, UK (2023); Fiji (2022); Tianjin, China (2021); Melbourne, Australia (2020); Sapporo, Japan (2019); Hong Kong, China (2018); Helsinki, Finland (2017); Taipei (2016); New York City, USA (2015); Xi'an, China (2014); Madrid, Spain (2013); Wu Yi Shan, China (2012); Milan, Italy (2011); Melbourne, Australia (2010); Gold Coast, Australia (2009); Shanghai, China (2008); and Dalian, China (2007).

About SocialSec 2025

Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. It has been widely recognised that security and privacy are the critical challenges for Social Networks and Big Data applications due to their scale, complexity and heterogeneity.

SocialSec 2025 is the 11th edition of the International Symposium on Security and Privacy in Social Networks and Big Data series, which started in 2015. Previous editions were held in: Abu Dhabi, UAE (2024); Canterbury, UK (2023); Xi'an, China (2022); Fuzhou, China (2021); Tianjin, China (2020); Copenhagen, Denmark (2019); Santa Clara, CA, USA (2018); Melbourne, Australia (2017); Fiji (2016); and Hangzhou, China (2015).

Organized by:

Central China Normal University, China

Wuhan University, China

Important Dates

Conference Date:
December 5-7, 2025
Paper Submission Deadline for NSS2025:
June 15, 2025July 6, 2025July 14, 2025 (Firm Deadline)
Paper Submission Deadline for SocialSec2025:
July 13, 2025July 27, 2025 August 15, 2025

Announcements

Conference Venue: Wuhan Xiongchu International Hotel
We are thrilled to announce that Prof. Willy Susilo, Prof. Jian Shen, and Prof. Qianhong Wu will be delivering the keynote address at NSS-SocialSec2025.
Journal Recommendations: CEE, CSI, IJIS, Symmetry (more information see call for papers).
Call for Paper: The submission link is now open. Please submit your research papers by the deadline.

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

Willy Susilo, Professor
University of Wollongong

Learn More

Abstract

Willy Susilo is a Distinguished Professor at the School of Computing and Information Technology, Faculty of Engineering and Information Sciences at the University of Wollongong (UOW), Australia. He holds the most prestigious Australian Laureate Fellowship awarded by the Australian Research Council. He is the director of Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, UOW. He is an IEEE Fellow, an IET Fellow, an ACS Fellow and an AAIA Fellow. Previously, he was awarded the prestigious Australian Research Council Future Fellowship in 2009. He has published more than 500 papers in journals and conference proceedings in cryptography and network security. In 2016, he was awarded the "Researcher of the Year" at UOW, due to his research excellence and contributions. He is the Editor-in-Chief of the Information journal and the Special Content Editor of the Elsevier’s Computer Standards and Interfaces. He is also serving as an Associate Editors in several international journals. He has also served as the program committee member of several international conferences.


Jian Shen, Professor
Zhejiang Sci-Tech University

Learn More

Abstract

Jian Shen is a Professor, doctoral supervisor, and the Dean of the College of Information Science and Engineering at Zhejiang Sci-Tech University, with research interests in public key cryptography, data security, and blockchain. A national-level leading talent and chief scientist of a national key R&D program, he leads a Zhejiang provincial-level leading innovation team and has received honors such as the Second Prize of the Natural Science Award from the Ministry of Education (ranking first) and the Outstanding Youth Award from the Chinese Association for Cryptologic Research. He was awarded the National Science Fund for Excellent Young Scholars and has spearheaded three major national projects, including the National Key Research and Development Program and a key joint project of the National Natural Science Foundation. Having published over one hundred high-level academic papers, he has been recognized as a Global Highly Cited Scientist for the last five consecutive years. His professional commitments include serving as a committee member for the Chinese Association for Cryptologic Research's Security Protocol Committee and its Big Data and Artificial Intelligence Security Committee, a committee member of the Chinese Institute of Electronics' Cyberspace Security Committee, and an executive committee member of the China Computer Federation's Blockchain Committee, in addition to acting as editor-in-chief and editorial board member for several international journals and chairing numerous international academic conferences.


Qianhong Wu, Professor
Beihang University

Learn More

Abstract

Qianhong Wu is a Professor and Supervisor for both master's and doctoral candidates, serving as Vice Dean of the School of Cyberspace Science and Technology at Beihang University. He holds the title of Qianjiang Distinguished Expert in Hangzhou and is a member of several key academic committees, including the Cryptography Protocol Committee and the Cryptography Application Working Committee of the Chinese Association for Cryptologic Research, as well as a Standing Committee Member of both the Blockchain Expert Committee of the Chinese Institute of Electronics and the Blockchain Committee of the China Computer Federation. He earned his Ph.D. from the School of Telecommunications Engineering at Xidian University in 2004. His professional career includes positions as a Research Fellow at the School of Computing and Information Technology, University of Wollongong, Australia; Associate Professor at the School of Computer Science, Wuhan University, China; and Senior Researcher and Research Director at the Department of Computer Science and Mathematics, Universitat Rovira i Virgili, Spain. Dr. Wu has long been engaged in research on blockchain and applied cryptography. He has published over 200 academic papers, including more than 20 in top-tier journals and conferences such as IEEE/ACM Transactions, TIFS, TDSC, Eurocrypt, Asiacrypt, and ACM CCS, authored 3 monographs, and filed over 100 related invention patents, with more than 50 granted. He has led or participated in over 10 blockchain-related projects, including Key Projects and General Projects of the National Natural Science Foundation of China, and topics under the National Key R&D Program of China, and spearheaded research for two national information security standards related to blockchain. His research achievements in blockchain privacy protection and regulation earned him the 2021 Qilin Science and Technology Award and the First Prize of the 2023 Innovation Award from the China Invention Association.


Call For Papers

Areas of interest for NSS 2025 include but are not limited to:

  • Intrusion Detection and Prevention
  • Network Infrastructure Security
  • NFV/SDN Security
  • Network Attacks and Defenses
  • Secure Networked Systems
  • Distributed Systems Security
  • Cloud Security
  • Mobile Security
  • Malware/Ransomware Analysis and Detection
  • Digital Forensics
  • Analysis of Network Security Protocols
  • Program and Binary Analysis
  • Formal Verification for Network Systems and Protocols
  • Fuzzy Testing
  • Privacy-enhancing Techniques and Anonymity
  • Cryptographic Protocols with Networks and Systems
  • Blockchain Protocols and Systems
  • Smart Contract Security
  • Blockchain Powered Applications and Services
  • Trustworthy Machine Learning and AI
  • Privacy-preserving Machine Learning
  • Federated Learning Protocols and Systems
  • Hardware Security
  • Cyber-Physical Systems Security
  • Internet of Things Security
  • Side-Channel Attacks and Countermeasures
  • Confidential Computing and Its Applications
  • Watermarking and Digital Rights Management
  • Security and Privacy For Digital Health
  • Human Factors in Network and System Security

Areas of interest for SocialSec 2025 include but are not limited to:

  • Attacks in/via social networks
  • Security and privacy in big databases
  • Information control and detection
  • Applied cryptography for big data
  • Malicious behavior modeling in social networks
  • Big data system security
  • Malicious information propagation via social networks
  • Mobile social networks security
  • Phishing problems in social networks
  • Security and privacy in cloud
  • Privacy protection in social networks
  • Forensics in social networks and big data
  • Big data analytics for threats and attacks prediction
  • Privacy and Security of AI
  • AI for Privacy and Security
  • Spam problems in social networks
  • Security of blockchain
  • Trust and reputations in social networks
  • Privacy and Security in Cooperative AI
  • Big data outsourcing
  • Users Behavior
  • Big data forensics
  • Security and Privacy in Metaverse

Important Dates

  NSS2025 SocialSec2025
Paper submission deadline June 15, 2025July 6, 2025July 14, 2025 (Firm Deadline) July 13, 2025July 27, 2025August 15, 2025
Notification to authors August 20, 2025 August 20, 2025September 15, 2025
Authors registration due September 1, 2025 September 15, 2025 September 1, 2025 September 25, 2025
Camera-ready papers due September 1, 2025 September 15, 2025 September 1, 2025 September 25, 2025
Conference dates December 5-7, 2025 December 5-7, 2025

Author Instructions

Submissions must be made through the Conference's EasyChair system available at the following links:

NSS 2025 Submission LinkSocialSec 2025 Submission Link

We will publish our proceedings with Springer as a volume of the Lecture Notes in Computer Science (LNCS) series.

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 20 pages in length (single column), using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Detailed author instructions and LaTeX/Word templates for LNCS publications can be found via the following link:

Springer LNCS Author Information

Journal Recommendations

Selected papers presented at the NSS-SocialSec 2025 will be invited to consider submission (after significant extension) for special issues or topical selections in the following journals:

journal-3 Computers & Electrical Engineering (CEE) Impact Factor: 4.0 中科院分区: 3区

SI:Protection Technologies for Data Security and Compliance (Confirmed)

Learn more
journal-3 Computer Standards & Interfaces (CSI) Impact Factor: 4.1 中科院分区: 2区

SI:Advancing Secure AI: Privacy, Integrity, and Trustworthiness (Confirmed)

Learn more
journal-3 International Journal of Information Security (IJIS) Impact Factor: 2.4 CCF级别: C类 中科院分区: 3区

SI:Emerging Encryption Techniques for Big Data Security (Confirmed)

Learn more
journal-4 Symmetry Impact Factor: 2.2 中科院分区: 3区

SI:Applications Based on Symmetry in Adversarial Machine Learning (Confirmed)

Learn more
journal-5 IET blockchain EI index No publication fees

SI:Post-quantum security and privacy in Blockchain infrastructures (Confirmed)

Learn more

More journal special issues or topical selections will be announced soon.

Organising Committee

General Chair of NSS-SocialSec 2025

Qian Wang, Wuhan University
Jianqun Cui, Central China Normal University
Hongwei Liu, Central China Normal University
Weizhi Meng, Lancaster University

Technical Program Chair of NSS 2025

Jiageng Chen, Central China Normal University
Debiao He, Wuhan University
Wei Xie, Central China Normal University

Technical Program Chair of SocialSec 2025

Liming Zhai, Central China Normal University
Guo Qing, A*STAR National University of Singapore
Jinquan Luo, Central China Normal University

Publication Co-chairs

Pei Li, Central China Normal University
Weizhi Meng, Lancaster University

Publicity Co-chairs

Na Ruan, Shanghai Jiaotong University
Chunhua Su, University of Aizu
Je Sen Teh, Deakin University

Web Co-chairs

Yahong Chen, Central China Normal University

Local Co-chairs

Hui Liu, Central China Normal University
Wenna Song, Central China Normal University

Registration Co-Chairs

Shixiong Yao, Central China Normal University

Technical Program Committee

Chuadhry Mujeeb Ahmed, Newcastle University
Joonsang Baek, University of Wollongong
Nora Boulahia-Cuppens, Polytechnique Montréal
Aniello Castiglione, University of Salerno
Jiageng Chen, Central China Normal University
Yahong Chen, Central China Normal University
Koji Chida, Gunma University
Sherman S. M. Chow, The Chinese University of Hong Kong
Wenjun Fan, Xian Jiaotong-Liverpool University
Davide Ferraris, University of Malaga
Afonso Ferreira, Institut de Recherches en Informatique de Toulouse
Guillaume Hiet, CentraleSupélec
Shoichi Hirose, University of Fukui
Sokratis Katsikas, Norwegian University of Science and Technology
Shinsaku Kiyomoto, KDDI Research Inc.
Albert Levi, Sabanci University
Wanpeng Li, University of Aberdeen
Hui Liu, Central China Normal University
Wojciech Mazurczyk, Warsaw University of Technology
Florian Mendel, Infineon Technologies
Weizhi Meng, Lancaster University
Antonio Muñoz, University of Málaga
Daniela Pöhn, Universität der Bundeswehr München
Chen Qian, Shandong University
Fatemeh Rezaeibagha, Murdoch University
Jun Shao, Zhejiang Gongshang University
Mohammad Shojafar, University of Surrey
Yangguang Tian, University of Surrey
Ehsan Toreini, University of Surrey
Jacques Traore, Orange Labs
Chenyu Wang, Beijing University of Posts and Telecommunications
Ding Wang, Nankai University
Yongge Wang, UNC Charlotte
Yuntao Wang, The University of Electro-Communications
Zhe Xia, Wuhan University of Technology
Toshihiro Yamauchi, Okayama University
Shixiong Yao, Central China Normal University
Kuo-Hui Yeh, National Yang Ming Chiao Tung University
Xun Yi, RMIT University
Kazuki Yoneyama, Ibaraki University
Liming Zhai, Central China Normal University
Mingwu Zhang, Hubei University of Technology
Donghui Hu, Hefei University of Technology
Ju Jia, Southeast University
Tian Wu, NanChang University
Jianhua Yang, Guangdong Polytechnic Normal University

Accepted Papers

Game-Theoretic Defense Against Encrypted Data Poisoning in Federated Learning for Social Networks
Zhe Sun, Wenxin Gao, Peijie Yin, Weiping Li, Ming Zhang, Yahong Chen and Jiangang Shu

Enabling Secure and Efficient Authenticated Edge Inference for the Internet of Things
Wenjie Li and Jiageng Chen

A Privacy-Preserving Cross-Chain Access Control Scheme Based on Threshold Fully Homomorphic Encryption
Huan Zhang, Pei Li and Yuanfang Chen

FG-LAS: A Fault-Tolerant and Group Handover Lightweight Authentication Scheme for Dynamic and Heterogeneous STIN Environments
Yunxiang Zhang, Xuan Zhang and Shixiong Yao

A Privacy-Preserving Data Aggregation Scheme with Inner-Product Encryption for Smart Grids
Zhe Xia, Sha Wu, Cheng Tan and Yifei Wang

PMDID: A Privacy-Preserving and Migratable Decentralized Identity Using PUF and Blockchain
Yueyue He, Koji Inoue, Wenxuan Fan, Kaiming Chen and Atsuko Miyaji

New insights into effects of fluctuations on dynamical degradation of digital chaos
Kai Lin, Xiangguang Sun, Jun Zheng and Hanping Hu

Lightweight Mutual Authentication for End-to-End Communication in Satellite Internet
Yuanjing Hou and Shixiong Yao

Parallel Implementation of Activation Functions and Arithmetic Operations Based on TFHE
Miaomiao Li and Pei Li

An Improved PUF-Based Three-Factor Authentication Scheme for Industrial IoT
Qingyun Liu and Fengtong Wen

Feature Machine Unlearning in Diffusion Models
Linlin Wang, Tianqing Zhu, Laiqiao Qin, Lihua Yin and Wanlei Zhou

FraudTrace: Verifying Fraudulent News to Prevent Online Scam Campaigns via a Multi-Agent LLM-Based System
Hoang-Phuc Nguyen, Dang Bui Tan Hai, Quyen Nguyen Huu and Duy Phan The

Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment
Samra Bouakkaz, Luis Suárez, Nora Boulahia-Cuppens and Frédéric Cuppens

IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain
Haosu Cheng, Guanquan Shi, Kangkang Zhang and Wenyu Zhang

Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior
Zhuotao Lian, Weiyu Wang, Qingkui Zeng, Toru Nakanishi, Teruaki Kitasuka and Chunhua Su

Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives
Joan Ferré-Queralt, Jordi Castellà-Roca and Alexandre Viejo

Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control
Gabriela Mogos

A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices
Zexu Li, Shanshan Tu, Kun Li, Jiakai Dou and Dazhong Liu

HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection
Tianming Zheng, Feiyang Huang, Yixin Jiang, Wenqian Xu, Zhihong Liang and Hua Li

A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection
Souhayla Touk, Saad El Jaouhari and Maurras Togbe

MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention
Linquan Huang, Chuanqi Chen, Bo Zhao, Hui Liu and Ke Zhang

Post-quantum Blockchain Transaction Model Based on Dilithium
Guangxia Xu, Yannan Guan and Lu Wang

Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach
Lucien Kiven Tamo, Brooke Kidmose, Weizhi Meng and Thanassis Giannetsos

Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing
Zhang Zhiguo, Wang Junyong, Zhang Chongzhen, Dai Jiao, Liu Chong, Hu Fuqiang, Yan Dantong and Tian Hongquan

An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment
Haibo Tian, Zhengdong Liang and Ting Zhang

Real-Time Anomaly Detection for Event-based Insider Threat Hunting
Thibault Leblanc, Neda Baghalizadeh-Moghadam, Frédéric Cuppens and Nora Boulahia-Cuppens

A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection
Xinyi Zhang, Peng Yu, Yifei Wang and Mingwu Zhang

Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples
Luong Hoang Minh, Duong The Dat, Bui Tan Hai Dang, Le Duc Thinh, Doan Minh Trung and Phan The Duy

Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features
Farhan Ahmad, Muhammad Mansoor Alam, Muhammad Salman and Komal Batool

An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs
Zhenhua Han, Gang Shen and Jiazheng Pei

X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis
Phan The Duy, Truong Thi Hoang Hao, Nguyen Viet Hoang, Nguyen Duc Trung, Le Duc Thinh, Doan Minh Trung and Van-Hau Pham

A Privacy-Preserving Semi-Supervised Algorithm for Non-Gaussian Noise Environments
Ling Zuo, Heng Xiao and Chi Cheng

Physical Layer Security via Movable Antenna in Near-Field
Yinghui Wang, Lei Zhang and Hang Chen

 Conference Schedule

Multi-function Hall, 2F, Wuhan Xiongchu International Hotel

Registration

At least one author of each accepted paper has to pay a Full Registration. An author with multiple accepted papers must pay the full registration fee for each accepted paper to ensure your paper to be included in the proceedings. Registration for the conference cannot be canceled. There is no refund of registration fees.

  • NSS2025: Payment must be received by September 15th, 2025.
  • SocialSec2025: Payment must be received by September 25th, 2025.

Conference Registration Fees

Registration Type Registration Fee
Full Registration (paper authors) 3900CNY/560USD
Participant Registration (non-paper authors) 1500CNY/220USD

Payment Information

Each registrant should send the Transfer Receipt and Registration Form (see below) to yaosx@ccnu.edu.cn with subject "Registrationform-paper ID" (your paper ID can be found out from EasyChair).

Registration Form

For Chinese Residents:

开户银⾏名称: 交通银⾏武汉卓⼑泉⽀⾏

帐号: 4218 6454 6018 0100 30570

户名: 武汉雄楚国际酒店管理有限公司

开户银⾏⾏号: 301521010022

识别号: 91420111789348951D

汇款备注信息:"NSS2025 (SocialSec2025)#论⽂编号(如适⽤)#姓名"

International Payment:

Click here (https://paypal.me/NSS2025), Your payment will be made to the NSS-SocialSec2025 Account

For Author, Please provide your Paper ID as Payment Message

For Participants, Please provide your Full Name as Payment Message

TBA.

Conference Location:

Multi-function Hall, 2nd Floor, Wuhan Xiongchu International Hotel (二楼,多功能厅,武汉雄楚国际大酒店)

Address:

No. 335 Xiongchu Avenue, Hongshan District, Wuhan City

How to Reach:

  • From Wuhan Tianhe International Airport: you can either take a taxi (about 100 CNY, 60 min) or you can take the Metro Line #2 to Huquan Station than walk to the destination (about 8 CNY, 100 min).
  • From Wuhan/Wuchang/Hankou Railway Station: you can either take a taxi (about 30 CNY, 30 min) or you can take the Metro to Huquan Station than walk to the destination (about 5 CNY, 70 min).

Picture:

Conference Hotel:

Wuhan Xiongchu International Hotel (武汉雄楚国际大酒店)

Room & Price:

  • Double room (one big bed): 398RMB/night
  • Standard room(two standard beds)448RMB/night

Room reservation contact:

杨经理(13638661542)

Picture:

LNCS risk Univesity of Tsukuba