Abstract is missing.
- PtbStolen: Pre-trained Encoder Stealing Through Perturbed SamplesChuan Zhang 0003, Haotian Liang, Zhuopeng Li, Tong Wu 0011, Licheng Wang, Liehuang Zhu. 1-19 [doi]
- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step MethodHuifeng Li, Pengzhou Jia, Weixun Li, Bin Ma, Bo Li, Dexin Wu, Haoran Li. 20-37 [doi]
- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare SystemJun Tu, Gang Shen. 38-57 [doi]
- A Systematic Method for Constructing ICT Supply Chain Security RequirementsYinxing Wei, Jun Zheng, Hong Zhong. 58-76 [doi]
- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based CryptographyLiang Li, Gengran Hu. 77-91 [doi]
- Enhancing Chinese Named Entity Recognition with Disentangled Expert KnowledgeHongkai Wang, Jun Feng, Yidan Wang, Sichen Pan, Shuai Zhao, Yi Xue. 92-106 [doi]
- Deep Neural Network Model over Encrypted DataWeixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang. 107-117 [doi]
- Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated LearningKangkang Sun, Xiaojin Zhang 0008, Xi Lin 0003, Gaolei Li, Jing Wang, Jianhua Li. 118-132 [doi]
- Chinese Named Entity Recognition Within the Electric Power DomainJun Feng, Hongkai Wang, Liangying Peng, Yidan Wang, Haomin Song, Hongju Guo. 133-146 [doi]
- Adversarial Example Attacks and Defenses in DNS Data ExfiltrationIzabela Savic, Haonan Yan, Xiaodong Lin 0001, Daniel Gillis. 147-163 [doi]
- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioNSimone Soderi, Rocco De Nicola. 164-183 [doi]