Abstract is missing.
- Secure Resource Allocation via Constrained Deep Reinforcement LearningJianfei Sun, Qiang Gao, Cong Wu, Yuxian Li, Jiacheng Wang 0001, Dusit Niyato. 1-15 [doi]
- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPCZongxiang Yi, Bo Li, Wanhui Zhang, Zhiqiang Lin, Lishan Ke. 16-42 [doi]
- A Decentralized Bitcoin Mixing Scheme Based on Multi-signatureMingdi Shen, Tianqi Zhou, Chen Wang 0015, Shijia Hong. 43-55 [doi]
- Decentralized Continuous Group Key Agreement for UAV Ad-Hoc NetworkShijia Hong, Tianqi Zhou, Huijie Yang, Mingdi Shen, Wenying Zheng. 56-69 [doi]
- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep LearningPeng Zhang, Dongyan Qiu, Ao Duan, Hongwei Liu. 70-80 [doi]
- Blockchain-Aided Revocable Threshold Group Signature Scheme for the Smart GridXiaozhi Deng, Qinqin Wu, Yi Tang, Yongbao Wang. 81-89 [doi]
- Privacy-Preserving Three-Factors Authentication and Key Agreement for Federated LearningGuojun Wang, Guixin Jiang, Yushuai Zhao, Yinglin Ji. 90-103 [doi]
- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITSMingliang Wang, Haowen Tan, Wenying Zheng. 104-117 [doi]
- Multi-keyword Searchable Data Auditing for Cloud-Based Machine LearningHaiyan Yu, Qingru Ma, Yilu Zhu, Yuxin Cui. 118-132 [doi]
- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-server LearningJingang Li, Zhaoyi Liu, Huijie Yang, Tianqi Zhou, Wenying Zheng. 133-147 [doi]
- Automatic Software Vulnerability Detection in Binary CodeShigang Liu, Lin Li 0066, Xinbo Ban, Chao Chen 0015, Jun Zhang 0010, Seyit Camtepe, Yang Xiang 0001. 148-166 [doi]
- Malicious Code Detection Based on Generative Adversarial ModelJinzhihao Zhang, Jia Yang, Weiqi Zhou. 167-183 [doi]
- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of ThoughtHuimin Gong, Zongliang Shen, Hua Zhang, Lei Qiao, Huawei Wang, Chi Zhang. 184-196 [doi]
- Backdoor Attack on Android Malware Classifiers Based on Genetic AlgorithmsZhenghua Cai, Yongji Wang, Hua Zhang 0001, Lei Qiao, Huawei Wang 0001, Chi Zhang. 197-214 [doi]
- A Malicious Websites Classifier Based on an Improved Relation NetworkQianshi Wang, Chongjun Xu, Huayu Yang, Xilin Zhai, Hua Zhang. 215-230 [doi]
- Unknown Category Malicious Traffic Detection Based on Contrastive LearningLeiming Yan, Tao Zhou, Xianyi Chen. 231-245 [doi]
- SoftPromptAttack: Advancing Backdoor Attacks in Language Models Through Prompt Learning ParadigmsDixuan Chen, Hongyang Yan, Jiatong Lin, Fan Chen, Yu Cheng. 246-257 [doi]
- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language ModelsWei Wu, Chen Wang 0015, Qiuhao Xu, Wei Kong. 258-270 [doi]
- A Novel and Efficient Multi-scale Spatio-Temporal Residual Network for Multi-class Intrusion DetectionNan Li, Zhaojian Gao, Jiabin Ye, Wei Tang, Xun Che, Yadang Chen. 271-283 [doi]
- Provable Data Auditing Scheme from Trusted Execution EnvironmentYuluo Zeng, Xinlei Sheng, Kai Zhao, Suliu Yang. 284-298 [doi]
- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client HintsHaoyao Xu, Yitong Li, Haibo Tian. 299-315 [doi]
- A Two-Stage Image Blind Inpainting Algorithm Based on Gated Residual ConnectionYiting Pan, Xuefeng Zhang. 316-331 [doi]
- GAN-Based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor AttacksKun Li, Hongyang Yan, Jiatong Lin, Fan Chen, Yu Cheng, Dongyang Liang. 332-346 [doi]
- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation MapsWenzhang Dai, Le Sun 0003. 347-361 [doi]
- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement LearningJinming Huang, Jin Wang, Shengyang Gao, Zilong Jin. 362-376 [doi]
- A Vehicles Scheduling Algorithm Based on Clustering Based Federated LearningXin Zhang, Chi Zhang, Shuyan Liu, Zilong Jin. 377-391 [doi]
- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge NetworksChun Yang, Guoqing Xu, Liang Ma, Zilong Jin. 392-407 [doi]
- YOLO-LiteMax: An Improved Model for UAV Small Object DetectionJian Su, Chang Yang, Jian Zhang. 408-422 [doi]
- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature SelectionCui Yun, Lei Zhou, Shuangshuang Xing, Ning Yang, Pan Zhao, Zhiguo Chen. 423-437 [doi]
- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information RetrievalWeizhe Tu, Zheng Dong, Tao Zhang, Wenying Zheng. 438-448 [doi]