{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:29:15Z","timestamp":1760660955133,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032008275","type":"print"},{"value":"9783032008282","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-00828-2_14","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:24:01Z","timestamp":1760631841000},"page":"241-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Efficient and\u00a0Secure Multimodal Misinformation Detection"],"prefix":"10.1007","author":[{"given":"Jianhao","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yixiao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Limei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junfeng","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"14_CR1","series-title":"LNCS","first-page":"323","volume-title":"ICECCS 2024","author":"L Wan","year":"2025","unstructured":"Wan, L., Yan, C., Meng, M.H., Wang, K., Wang, H.: Analyzing excessive permission requests in Google workspace add-ons. In: Bai, G., Ishikawa, F., Ait-Ameur, Y., Papadopoulos, G.A. (eds.) ICECCS 2024. LNCS, vol. 14784, pp. 323\u2013345. Springer, Cham (2025)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Sharevski, F., Vander Loop, J.: Children, parents, and misinformation on social media. In: IEEE Symposium on Security and Privacy (SP), pp. 1536\u20131553 (2024)","DOI":"10.1109\/SP54263.2024.00221"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Hans, W., Hanley, A., Kumar, D., Durumeric, Z.: Specious sites: tracking the spread and sway of spurious news stories at scale. In: IEEE Symposium on Security and Privacy (SP), pp. 1609\u20131627 (2024)","DOI":"10.1109\/SP54263.2024.00171"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Gao, C., Xu, Q., Qiao, P., Xu, K., Qian, X., Dou, Y.: Adapter-based incremental learning for face forgery detection. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4690\u20134694 (2024)","DOI":"10.1109\/ICASSP48485.2024.10446543"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Saha Roy, S., Thota, P., Naragam, K., Nilizadeh, S.: From chatbots to phishbots?: phishing scam generation in commercial large language models. In: IEEE Symposium on Security and Privacy (SP), pp. 36\u201354 (2024)","DOI":"10.1109\/SP54263.2024.00182"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bai, Z., Wang, M., Guo, F., Guo, Y., Cai, C., Bie, R.: SecMdp: towards privacy-preserving multimodal deep learning in end-edge-cloud. In: IEEE International Conference on Data Engineering (ICDE), pp. 1659\u20131670 (2024)","DOI":"10.1109\/ICDE60146.2024.00135"},{"key":"14_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-031-66456-4_17","volume-title":"ICECCS 2024","author":"M Bourdell\u00e8s","year":"2025","unstructured":"Bourdell\u00e8s, M., El-Hachem, J., Sadou, S.: Confidentiality management in complex systems design. In: Bai, G., Ishikawa, F., Ait-Ameur, Y., Papadopoulos, G.A. (eds.) ICECCS 2024. LNCS, vol. 14784, pp. 303\u2013322. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-66456-4_17"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TMC.2024.3472898","volume":"24","author":"X Wang","year":"2025","unstructured":"Wang, X., Wang, Y., Yang, M., Li, F., Wu, X., Fan, L.: FedSiam-DA: dual-aggregated federated learning via Siamese network for non-IID data. IEEE Trans. Mob. Comput. 24(2), 985\u2013998 (2025)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1109\/TDSC.2023.3302864","volume":"21","author":"J Ma","year":"2024","unstructured":"Ma, J., Zhou, Y., Cui, L., Guo, S.: An optimized sparse response mechanism for differentially private federated learning. IEEE Trans. Dependable Secure Comput. 21(4), 2285\u20132295 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, B., Bai, B., Lin, H., Wang, Y., Guo, Y., Fang, L.: DartBlur: privacy preservation with detection artifact suppression. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16479\u201316488 (2023)","DOI":"10.1109\/CVPR52729.2023.01581"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"4272","DOI":"10.1109\/TIFS.2023.3293951","volume":"18","author":"D Liu","year":"2023","unstructured":"Liu, D., et al.: FedForgery: generalized face forgery detection with residual federated learning. IEEE Trans. Inf. Forensics Secur. 18, 4272\u20134284 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"14_CR12","doi-asserted-by":"publisher","first-page":"5556","DOI":"10.1109\/TPAMI.2024.3367749","volume":"46","author":"R Shao","year":"2024","unstructured":"Shao, R., Wu, T., Wu, J., Nie, L., Liu, Z.: Detecting and grounding multi-modal media manipulation and beyond. IEEE Trans. Pattern Anal. Mach. Intell. 46(8), 5556\u20135574 (2024)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Exploiting modality-specific features for multi-modal manipulation detection and grounding. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4935\u20134939 (2024)","DOI":"10.1109\/ICASSP48485.2024.10448385"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Qi, P., Yan, Z., Hsu, W., Lee, L.: Sniffer: multimodal large language model for explainable out-of-context misinformation detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13052\u201313062 (2024)","DOI":"10.1109\/CVPR52733.2024.01240"},{"issue":"4","key":"14_CR15","doi-asserted-by":"publisher","first-page":"5005","DOI":"10.1109\/TCSS.2023.3304649","volume":"11","author":"Z Lian","year":"2024","unstructured":"Lian, Z., Zhang, C., Su, C., Dharejo, A., Almutiq, M., Memon, H.: FIND: privacy-enhanced federated learning for intelligent fake news detection. IEEE Trans. Comput. Soc. Syst. 11(4), 5005\u20135014 (2024)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y., Quan, R., Zhu, L., Yang, Y.: Efficient multi-modal fusion via interactive prompting. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2604\u20132613 (2023)","DOI":"10.1109\/CVPR52729.2023.00256"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sun, Z., et al.: Unleashing the power of gradient signal-to-noise ratio for zero-shot NAS. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 5740\u20135750 (2023)","DOI":"10.1109\/ICCV51070.2023.00530"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Michalkiewicz, M., Faraki, M., Yu, X., Chandraker, M., Baktashmotlagh, M.: Domain generalization guided by gradient signal to noise ratio of parameters. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 6154\u20136165 (2023)","DOI":"10.1109\/ICCV51070.2023.00568"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, Z., Wang, X., Qin, Y., Qin, Z., Zhu, W.: Dynamic heterogeneous graph attention neural architecture search. In: AAAI Conference on Artificial Intelligence (AAAI), pp. 1269\u20131277 (2023)","DOI":"10.1609\/aaai.v37i9.26338"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Feng, C., Xu, N., Wen, W., Venkitasubramaniam, P., Ding, C.: Spectral-DP: differentially private deep learning through spectral perturbation and filtering. In: IEEE Symposium on Security and Privacy (SP), pp. 1944\u20131960 (2023)","DOI":"10.1109\/SP46215.2023.10179457"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Liu, C., Wang, X., Li, S., Wang, Y., Qian, X.: FSI: frequency and spatial interactive learning for image restoration in under-display cameras. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 12503\u201312512 (2023)","DOI":"10.1109\/ICCV51070.2023.01152"},{"issue":"7","key":"14_CR22","doi-asserted-by":"publisher","first-page":"2040","DOI":"10.1109\/TPDS.2023.3273490","volume":"34","author":"W Wei","year":"2023","unstructured":"Wei, W., Liu, L., Zhou, J., Chow, K., Wu, Y.: Securing distributed SGD against gradient leakage threats. IEEE Trans. Parallel Distrib. Syst. 34(7), 2040\u20132054 (2023)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/TIFS.2024.3522792","volume":"20","author":"Z Ye","year":"2025","unstructured":"Ye, Z., Luo, W., Zhou, Q., Tang, Y., Zhu, Z., Shi, Y.: Gradient inversion of text-modal data in distributed learning. IEEE Trans. Inf. Forensics Secur. 20, 928\u2013943 (2025)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"14_CR24","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1109\/TNET.2024.3351864","volume":"32","author":"P Sun","year":"2024","unstructured":"Sun, P., Liao, G., Chen, X., Huang, J.: A socially optimal data marketplace with differentially private federated learning. IEEE\/ACM Trans. Netw. 32(3), 2221\u20132236 (2024)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"14_CR25","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1109\/TCYB.2018.2883095","volume":"50","author":"Y Zhu","year":"2020","unstructured":"Zhu, Y., Yu, W., Wen, G., Chen, G.: Projected primal-dual dynamics for distributed constrained nonsmooth convex optimization. IEEE Trans. Cybern. 50(4), 1776\u20131782 (2020)","journal-title":"IEEE Trans. Cybern."},{"key":"14_CR26","unstructured":"Alec, R., et al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning (ICML), pp. 8748\u20138763 (2021)"},{"key":"14_CR27","unstructured":"Kim, W., Son, B., Kim, I.: ViLT: vision-and-language transformer without convolution or region supervision. In: International Conference on Machine Learning (ICML), pp. 5583\u20135594 (2021)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., Liu, W.: Generalizing face forgery detection with high-frequency features. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16312\u201316321 (2021)","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Zhao, H., Wei, T., Zhou, W., Zhang, W., Chen, D., Yu, N.: Multi-attentional deepfake detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2185\u20132194 (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"14_CR30","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171\u20134186 (2019)"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Yamada, I., Asai, A., Shindo, H., Takeda, H., Matsumoto, Y.: LUKE: deep contextualized entity representations with entity-aware self-attention. In: Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 6442\u20136454 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.523"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Wei, W., Liu, L., Wu, Y., Su, G., Iyengar, A.: Gradient-leakage resilient federated learning. In: IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 797\u2013807 (2021)","DOI":"10.1109\/ICDCS51616.2021.00081"},{"key":"14_CR33","unstructured":"Li, G., Yang, Y., Bhardwaj, K., Marculescu, R.: ZiCo: zero-shot NAS via inverse coefficient of variation on gradients. In: the Eleventh International Conference on Learning Representations (ICLR) (2023)"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Lee, J., Ham, B.: AZ-NAS: assembling zero-cost proxies for network architecture search. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5893\u20135903 (2024)","DOI":"10.1109\/CVPR52733.2024.00563"}],"container-title":["Lecture Notes in Computer Science","Engineering of Complex Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00828-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:24:09Z","timestamp":1760631849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00828-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9783032008275","9783032008282"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00828-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICECCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering of Complex Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceccs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iceccs2025-hangzhou.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}