Abstract is missing.
- Fine-Grained Searchable Encryption Scheme Against Keyword Brute-Force AttacksYawen Feng, Shengke Zeng, Jixiang Xiao, Shuai Cheng, Fengchun Zhang. 1-15 [doi]
- Fine-Grained Authorized Secure Deduplication with Dynamic PolicyJixiang Xiao, Shengke Zeng, Yawen Feng, Shuai Cheng. 16-32 [doi]
- Deep Multi-image Hiding with Random KeyWei Zhang, Weixuan Tang, Yuan Rao, Bin Li, Jiwu Huang. 33-41 [doi]
- Member Inference Attacks in Federated Contrastive LearningZixin Wang, Bing Mi, Kongyang Chen. 42-52 [doi]
- A Network Traffic Anomaly Detection Method Based on Shapelet and KNNSi Yu, Xin Xie 0002, Zhao Li, Wenbing Zhen, Tijian Cai. 53-64 [doi]
- Multi-channel Deep Q-network Carrier Sense Multiple AccessXunxun Pi, Junhang Qiu. 65-80 [doi]
- DFaP: Data Filtering and Purification Against Backdoor AttacksHaochen Wang, Tianshi Mu, Guocong Feng, Shangbo Wu, Yuanzhang Li. 81-97 [doi]
- A Survey of Privacy Preserving Subgraph Matching MethodsXingjiang Cheng, Fuxing Zhang, Yun Peng, Xianmin Wang, Teng Huang, Ziye Zhou, Duncan S. Wong, Changyu Dong. 98-113 [doi]
- The Analysis of Schnorr Multi-Signatures and the Application to AIWenchao Wang, Jing Qin 0002, Jinlu Liu, Xi Zhang, Xinyi Hou, Zhongkai Wei. 114-130 [doi]
- Active Defense Against Image SteganographyWeixuan Tang, Yadong Liu. 131-141 [doi]
- Strict Differentially Private Support Vector Machines with Dimensionality ReductionTeng Wang, Shuanggen Liu, Jiangguo Liang, Shuai Wang, Lu Wang, Junying Song. 142-155 [doi]
- Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During FlightZhihao Li, Qi Chen, Weichuan Mo, Xiaolin Wang, Li Hu, Yongzhi Cao. 156-171 [doi]
- Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future DirectionsYongwei Lin, Yucheng Long, Zhili Zhou, Yan Pang, Chunsheng Yang. 172-189 [doi]
- From Passive Defense to Proactive Defence: Strategies and TechnologiesChong Shi, Jiahao Peng, Shuying Zhu, Xiaojun Ren. 190-205 [doi]
- Research on Surface Defect Detection System of Chip Inductors Based on Machine VisionXiao Li, Xunxun Pi, Hong Tang 0003, Junhang Qiu. 206-220 [doi]
- Multimodal Fatigue Detection in Drivers via Physiological and Visual SignalsWeijia Li, Xunxun Pi, Hong Tang 0003, Junhang Qiu. 221-236 [doi]
- Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based DefenseLe Wang, Haonan Yan, Xiaodong Lin 0001, Pulei Xiong. 237-252 [doi]
- FedCMK: An Efficient Privacy-Preserving Federated Learning FrameworkPengyu Lu, Xianjia Meng, Ximeng Liu. 253-271 [doi]
- An Embedded Cost Learning Framework Based on Cumulative Gradient RewardsWeixuan Tang, Yingjie Xie. 272-282 [doi]
- An Assurance Case Practice of AI-Enabled Systems on Maritime InspectionYongjian Xue, Qian Wei, Xiaoliang Gong, Fan Wu, Yunqi Luo, Zhongning Chen. 283-299 [doi]
- Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational VerificationEnming Lu, Fei Peng. 300-315 [doi]
- A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouseShuai Tang, Tianshi Mu, Jun Zheng 0007, Yurong Fu, Quanxin Zhang, Jie Yang. 316-327 [doi]
- DZIP: A Data Deduplication-Compatible Enhanced Version of GzipHengying Xiao, Yangyang Liu. 328-341 [doi]
- Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward SecurityXi Zhang, Ye Su, Zhongkai Wei, Wenting Shen, Jing Qin 0002. 342-357 [doi]
- Adversarial Attacks Against Object Detection in Remote Sensing ImagesRong Huang, Li Chen, Jun Zheng 0007, Quanxin Zhang, Xiao Yu. 358-367 [doi]
- Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature AlgorithmYujie Shao, Tian Chen, Ke Li, Lu Liu. 368-381 [doi]
- Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRFRuozhou Zuo, Haibo Tian, Fangguo Zhang. 382-399 [doi]
- Practical and Privacy-Preserving Decision Tree Evaluation with One Round CommunicationLiang Xue, Xiaodong Lin 0001, Pulei Xiong. 400-414 [doi]
- IoT-Inspired Education 4.0 Framework for Higher Education and Industry NeedsXie Kanqi, Luo Jun, Liao Bo Xun. 415-429 [doi]
- Multi-agent Reinforcement Learning Based User-Centric Demand Response with Non-intrusive Load MonitoringMohammad Ashraf, Sima Hamedifar, Shichao Liu, Chunsheng Yang, Alanoud Alrasheedi. 430-445 [doi]
- Decision Poisson: From Universal Gravitation to Offline Reinforcement LearningHeqiu Cai, Zhanao Zhang, Zhicong Yao, Kanghua Mo, Dixuan Chen, Hongyang Yan. 446-455 [doi]
- SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised LearningHui Yang, Ruilin Yang, Heqiu Cai, Xiao Zhang, Qingqi Pei, Shaowei Wang, Hongyang Yan. 456-467 [doi]
- Personalized Differential Privacy in the Shuffle ModelRuilin Yang, Hui Yang, Jiluan Fan, Changyu Dong, Yan Pang, Duncan S. Wong, Shaowei Wang. 468-482 [doi]
- MKD: Mutual Knowledge Distillation for Membership Privacy ProtectionSihao Huang, Zhongxiang Liu, Jiafu Yu, Yongde Tang, Zidan Luo, Yuan Rao. 483-498 [doi]
- Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic AlgorithmZhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu. 499-512 [doi]
- KEP: Keystroke Evoked Potential for EEG-Based User AuthenticationJiaxuan Wu, Wei-Yang Chiu, Weizhi Meng 0001. 513-530 [doi]
- Verifiable Secure Aggregation Protocol Under Federated LearningPeiming Xu, Meiling Zheng, Lingling Xu. 531-547 [doi]
- Electronic Voting Privacy Protection Scheme Based on Double Signature in Consortium BlockchainWei Xie, Wenmin Li, Huimin Zhang. 548-562 [doi]
- Securing 5G Positioning via Zero Trust ArchitectureRazy Youhana Adam, Weizhi Meng. 563-578 [doi]
- Email Reading Behavior-Informed Machine Learning Model to Predict Phishing SusceptibilityNing Xu, Jiluan Fan, Zikai Wen. 579-592 [doi]