Abstract is missing.
- SteDM: Efficient Image Steganography with Diffusion ModelsChangguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao, Fangwei Wang. 1-11 [doi]
- BDFC:A New Flow Control Mechanism for Torus NetworksHaofei Zhang, Youmeng Li, Yu Deng, Qi Fang. 12-25 [doi]
- A Hybrid Vectorized Merge Sort on ARM NEONJincheng Zhou, Jin Zhang 0018, Xiang Zhang 0008, Tiaojie Xiao, Di Ma, Chunye Gong. 26-36 [doi]
- An Encoder-Based Framework for Privacy-Preserving Machine LearningJiayun Wu, Wei Ren 0002, Xianchao Zhang 0002, Xianghan Zheng. 37-46 [doi]
- Load Balancing Optimizations for Distributed GMRES AlgorithmYuxiang Zhang, Shuaizhe Guo, Jianhua Gao, Weixing Ji, Yizhuo Wang. 47-56 [doi]
- ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge ProofYuwei Xu 0001, Hailang Cai, Jialuo Chen, Qiao Xiang, Jingdong Xu, Guang Cheng 0001. 57-77 [doi]
- LSSM-SpMM: A Long-Row Splitting and Short-Row Merging Approach for Parallel SpMM on PEZY-SC3sLigang Cao, Qinglin Wang, Shun Yang, Rui Xia, Weihao Guo, Jie Liu 0002. 78-97 [doi]
- A Model Inference Attack Based on Random Sampling in DLaaSFeng Wu, Shouyue Sun, Jiaxun Yang, Liwen Wu, Lei Cui 0006, Youyang Qu, Shaowen Yao 0001. 98-107 [doi]
- Defense Against Textual Backdoors via Elastic Weighted Consolidation-Based Machine UnlearningHaojun Xuan, Yajie Wang, Huishu Wu, Tao Liu, Chuan Zhang 0003, Liehuang Zhu. 108-121 [doi]
- Cross-Chain Transaction Auditing with Truth DiscoveryHuishu Wu, Xuhao Ren, Mengxuan Liu, Tao Liu, Yajie Wang, Chuan Zhang 0003, Liehuang Zhu. 122-140 [doi]
- Exploring the Vulnerability of ECG-Based Authentication Systems Through A Dictionary Attack ApproachBonan Zhang, Chao Chen 0015, Ickjai Lee, Kyungmi Lee, Kok-Leong Ong. 141-158 [doi]
- LBVP: Lightweight Blockchain-Based Vehicle Platooning Scheme for Secure and Efficient Platoon ManagementWenjie Fan, Zhiquan Liu, Libo Wang, Ying He, Jingjing Guo, Xia Feng, Jianfeng Ma 0001. 159-178 [doi]
- Low-Carbon Geographically Distributed Cloud-Edge Task SchedulingYingJie Zhu, Ji Qi, Zehao Wang, Shengjie Wei, Yan Chen, Tuo Cao, Gangyi Luo, Zhuzhong Qian. 179-199 [doi]
- Integrating Blockchain, Smart Contracts, NFTs, and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa Supply ChainsV. H. Khanh, Nguyen M. Triet, Le K. Bang, Phung Dang Trinh, Nhat Nguyen Hung, Hai Ngo Bang, P. T. Nghiem, Tran Dang Khoa. 200-216 [doi]
- The Role of Artificial Intelligence Technologies in Sustainable Urban Development: A Systematic SurveyMaria Rosaria Sessa, Ornella Malandrino, Antonio Cesarano. 217-230 [doi]
- Enhancing Privacy in Machine Unlearning: Posterior Perturbation Against Membership Inference AttackChen Chen, Hengzhu Liu, Huanhuan Chi, Ping Xiong 0001. 231-248 [doi]
- PEbfs: Implement High-Performance Breadth-First Search on PEZY-SC3sWeihao Guo, Qinglin Wang, Xiaodong Liu, Muchun Peng, Shun Yang, Yaling Liang, Yongzhen Shi, Ligang Cao, Jie Liu 0002. 249-267 [doi]
- Textual Data De-Privatization Scheme Based on Generative Adversarial NetworksYanning Du, Jinnan Xu, Yaling Zhang, Yichuan Wang 0003, Zhoukai Wang. 268-281 [doi]
- Modeling and Simulation Verification of Operating Mode Switching of Train Control System Based on Train-to-Train CommunicationQiang Li, Ian Liao, Sheng Wen, Yang Xiang 0001. 282-297 [doi]
- Performance Evaluation of NLP Models for European Portuguese: Multi-GPU/Multi-node Configurations and Optimization TechniquesDaniel Santos 0004, Nuno Miquelina, Daniela Schmidt, Paulo Quaresma, VĂtor Beires Nogueira. 298-314 [doi]
- FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via Analytical ModelingLiutao Zheng, Huiying Lan, Xiang Liu, Linshan Jiang, Xuehai Zhou. 315-334 [doi]