Abstract is missing.
- MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution EnvironmentsHendrik Meyer zum Felde, Andrei-Cosmin Aprodu. 1-12 [doi]
- Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information SynchronizationRuizhong Du, Jiajia Kang, Jin Tian. 13-20 [doi]
- Enhancing Consistency in Container Migration via TEE: A Secure ArchitectureQingyu Gao, Liantao Song, Yan Lei, Feng Wang, Lei Wang, Shize Zong, Yan Ding. 21-28 [doi]
- A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition ModulationFei Peng 0001, Yousheng Liang, Min Long. 29-36 [doi]
- MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on MicrokernelsFeng He, Shijun Zhao, Dan Meng, Rui Hou 0001. 37-48 [doi]
- Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile CrowdsourcingWei Feng 0010, Dongyuan Wei, Qianqian Wang 0001. 49-56 [doi]
- CTWF: Website Fingerprinting Attack based on Compact Convolutional TransformerGuangfa Lyu, Jian Kong, Yinglong Chen, Fengyu Wang. 57-67 [doi]
- LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat DetectionTian Tian, Yan Zhu, Ning An, Bo Jiang 0013, Huamin Feng, Zhigang Lu 0002. 68-76 [doi]
- SeChannel: A Secure and Lightweight Channel Protection Approach for TEE SystemsNan Jiang, Yuanbo Zhao, Qihang Zhou, Xiaoqi Jia, Jing Tang. 77-84 [doi]
- Hardware assisted security gateway system: combined with FPGA shielding protectionJihong Liu, Chenyang Tu, Yifei Zhang. 85-92 [doi]
- xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection SystemMuhammad Adil 0002, Mian Ahmad Jan, Safayat Bin Hakim, Houbing Herbert Song, Zhanpeng Jin. 93-100 [doi]
- DMA: A Persistent Threat to Embedded Systems IsolationJean de Bonfils Lavernelle, Pierre-François Bonnefoi, Benoît Gonzalvo, Damien Sauveron. 101-108 [doi]
- StegaFDS: Generative Steganography Based on First-Order DPM-SolverChengyu Li, Weihai Li, Zikai Xu, Nenghai Yu. 109-116 [doi]
- Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary EmulationMax Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern. 117-128 [doi]
- VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android DevicesMykolai Protsenko, Albert Stark, Andreas Papon, Sandra Kostic. 129-140 [doi]
- From Data to Action: CTI Analysis and ATT&CK Technique CorrelationKhanh-Duy Nguyen, Hsi-Ching Chu, Quoc-Viet Nguyen, Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku. 141-148 [doi]
- A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA AccumulatorZhuowei Shen, Xiao Kou, Taiyao Yang, Haoqin Xu, Dongbin Wang, Shaobo Niu. 149-156 [doi]
- Face Anti-spoofing based on Multi-modal Dual-stream Anomaly DetectionJiuyao Jing, Yu Zheng 0006, Qi He, Chunlei Peng. 157-164 [doi]
- Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family ClassificationFei Zhang, Xiaohong Li 0001, Sen Chen 0001, Ruitao Feng. 166-175 [doi]
- Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graphXin Deng, Rui Wang, Weihong Han, Zhihong Tian. 176-183 [doi]
- StegoFL: Using Steganography and Federated Learning to Transmit MalwareRong Wang 0006, Junchuan Liang, Haiting Jiang, Chaosheng Feng, Chin-Chen Chang 0001. 184-190 [doi]
- Correcting the Bound Estimation of MohawkMingjie Yu, Wei Jin, FengHua Li, Yunchuan Guo, Zheng Yan, Xiao Wang, Nenghai Yu. 191-196 [doi]
- OFLGI: An Optimization-based Feature-Level Gradient Inversion AttackYongwei Lu, Xiaoyan Liang, Ruizhong Du, Junfeng Tian. 197-204 [doi]
- Front-running Attacks in Hash-Based Transaction Sharding BlockchainsYusen Wang, Jiong Lou, Zihan Wang, Jie Li 0002. 205-212 [doi]
- Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-VehiclesJie Cui, Jing Zhang, Lu Wei, Minghui Zhu, Hong Zhong 0001, Geyong Min. 213-221 [doi]
- WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow MemoryZhuochen Jiang, Baojian Hua. 222-233 [doi]
- Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMADebao Wang, Yiwen Gao 0001, Jingdian Ming, Yongbin Zhou, Xian Huang. 234-241 [doi]
- CPCED: a container escape detection system based on CNI pluginYu Hao, Xu Zhang, Dongbin Wang. 242-253 [doi]
- Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical ArchitectureZhefeng Nan, Qi Wang, Changbo Tian, Yijing Wang, Tianning Zang, Dongwei Zhu. 254-261 [doi]
- TOScorr: Transformer-based Flow Correlation Attack on Tor Onion ServiceYilin Zhu, Guang Cheng 0001, Shunyu Zheng, Hantao Mei. 262-270 [doi]
- M-ETC: Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task InterferenceYuwei Xu 0001, Xiaotian Fang, Zhengxin Xu, Kehui Song, Yali Yuan, Guang Cheng 0001. 271-278 [doi]
- Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption SchemeXu Li, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, Yijun Cui. 279-286 [doi]
- Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approachCao Chen, FengHua Li, Yunchuan Guo, Zifu Li, Wenlong Kou. 287-294 [doi]
- Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack GraphsKéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Francesca Bassi. 295-305 [doi]
- SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic ClassificationMeijie Du, Mingqi Hu, Shu Li, Zhao Li 0010, Qingyun Liu 0001. 306-315 [doi]
- GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source DataTao Leng, Chang You, Shuangchun Luo, Junyi Liu, Yutong Zeng, Cheng Huang. 316-325 [doi]
- JasFree: Grammar-free Program Analysis for JavaScript BytecodeHao Jiang, Haiwei Lai, Si Wu, Baojian Hua. 326-337 [doi]
- SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security ProtocolsLiujia Cai, Tong Yu, Yumeng Li, Siqi Lu, Hanjie Dong, Guangying Cai, Guangsong Li, Yongjuan Wang. 338-345 [doi]
- STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined NetworkYue Li, Runcheng Fang, Qipeng Song, Xilei Yang. 346-353 [doi]
- LayyerX: Unveiling the Hidden Layers of DoH Server via Differential FingerprintingYunyang Qin, Yujia Zhu, Linkang Zhang, Baiyang Li, Yong Ding, Qingyun Liu 0001. 354-361 [doi]
- WCDGA: BERT-Based and Character-Transforming Adversarial DGA with High Anti-Detection AbilityZhujie Guan, Mengmeng Tian, Yuwei Xu 0001, Kehui Song, Guang Cheng 0001. 362-369 [doi]
- Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel AnalysisXiaoran Huang, Yiwen Gao 0001, Wei Cheng 0003, Yuejun Liu, Jingdian Ming, Yongbin Zhou, Jian Weng 0001. 370-377 [doi]
- Cyber Risk Analysis on Electric Vehicle Systems via NIST CSFSpyridon Sourmelis, Weizhi Meng. 378-386 [doi]
- EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground ForumsAbdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi, El Houcine Bergou. 387-398 [doi]
- Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype LearningYuan Zhao, Chunhe Xia, Tianbo Wang, Mengyao Liu, Yang Li. 399-409 [doi]
- AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CKWeidong Zhou, Chunhe Xia, Nan Feng, Xinyi Pan, Tianbo Wang, Xiaojian Li. 410-417 [doi]
- From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical NetworkBeibei Feng, Qi Wang, Xiaolin Xu, Yijing Wang, Tianning Zang, Jingrun Ma. 418-426 [doi]
- SBOM Generation Tools in the Python Ecosystem: an In-Detail AnalysisSerena Cofano, Giacomo Benedetti, Matteo Dell'Amico. 427-434 [doi]
- Shapley-value-based Explanations for Cryptocurrency Blacklist DetectionFeixue Yan, Sheng Wen, Yang Xiang 0001, Shiping Chen 0001. 435-442 [doi]
- Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error MitigationKeyi Ju, Hui Zhong, Xinyue Zhang 0001, Xiaoqi Qin, Miao Pan. 443-452 [doi]
- Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master KeyYuchen Chen, Guanxiong Ha, Xuan Shan, Chunfu Jia, Qiaowen Jia. 453-460 [doi]
- Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection SchemeXiaohong Wu, Yujun Lin, Jie Tao 0001, Yonggen Gu. 461-468 [doi]
- You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke BiometricsFlorian Dehling, Sebastian Koch, Luigi Lo Iacono, Hannes Federrath. 469-480 [doi]
- Towards Privacy-aware IoT Communications: Delegable, Revocable, and EfficientPengfei Wu 0003, Jianfei Sun, Guomin Yang, Robert H. Deng. 481-491 [doi]
- TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification DistributionQipeng Song, Ruiyun Wang, Yue Li, Yiheng Yan, Xingyue Zhu, Hui Li. 492-500 [doi]
- Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning MarketTing Zhou, Hongtao Lv, Ning Liu 0014, Lei Liu 0003. 501-507 [doi]
- VCaDID: Verifiable Credentials with Anonymous Decentralized IdentitiesYalan Wang, Liqun Chen 0002, Long Meng, Christopher J. P. Newton. 508-515 [doi]
- A Framework for Detecting Hidden Partners in App CollusionQinchen Guan, Shaoyong Du, Kerong Wang, Chunfang Yang, Xiangyang Luo. 516-523 [doi]
- Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of AuthoritiesJingchi Zhang, Anwitaman Datta. 524-531 [doi]
- VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced DatabaseHaoyang Wang 0005, Kai Fan 0001, Yue Quan, FengHua Li, Hui Li 0006. 532-541 [doi]
- DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID DataFuyao Zhang, Dan Wang, Chuyang Liang. 542-550 [doi]
- Secure Federated Learning Schemes Based on Multi-Key Homomorphic EncryptionWenxiu Ding, Hongjiang Guo, Zheng Yan 0002, Mingjun Wang. 551-558 [doi]
- TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and FusionYuwei Xu 0001, Jiangfeng Li, Yujie Hou, Xinxu Huang, Yali Yuan, Guang Cheng 0001. 559-566 [doi]
- 2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay CommunicationMingjun Wang, Yixuan Liu, Wenxiu Ding. 567-573 [doi]
- Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented ModelsXin Zhang, Bingbing Zhang, Chi Zhang, Lingbo Wei. 574-581 [doi]
- MIND: A Privacy-Preserving Model Inference Framework via End-Cloud CollaborationSiyuan Guan, Ziheng Hu, Guotao Xu, Yao Zhu, Bowen Zhao. 582-589 [doi]
- Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph LearningRuoyao Xiao, Yu Luo, Weifeng Xu, Harshmeet Lamba, Dianxiang Xu. 590-599 [doi]
- TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized FinanceYuheng Zhang, Guojun Wang 0001, Peiqiang Li, Xubin Li, Wanyi Gu, Mingfei Chen, Houji Chen. 600-607 [doi]
- RAG-based Cyber Threat Tracing Graph Modeling MethodJong Hee Jeon, Jahoon Koo, Young-Gab Kim. 608-615 [doi]
- AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated LearningXiaoshuang Li, Mingjun Wang, Yilong Guo, Wenxiu Ding. 616-623 [doi]
- TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale BlockchainYongkang Yu, Jinchun He, Xinwei Xu, Qinnan Zhang, Wangjie Qiu, Hongwei Zheng 0007, BingHui Guo, Jin Dong. 624-635 [doi]
- ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed ClustersJianbo Lin, Lin Yan, Zhi Lin, Zan Zhou 0001, Shujie Yang. 636-642 [doi]
- New Compact Construction of FHE from Cyclic Algebra LWEYuan Liu, Licheng Wang, Yongbin Zhou. 643-649 [doi]
- Rethinking Mutation Strategies in Fuzzing Smart ContractsJingzhang Cao, Meng Wang, Shenao Lin. 650-657 [doi]
- Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data ManagementHanning Zhang, Guansheng Wang, Junwei Feng, Lei Feng, Quan Gan, Long Ji. 658-665 [doi]
- CVchain: A Cross-Voting-Based Low Latency Parallel Chain SystemJianrong Wang, Yacong Ren, Dengcheng Hu, Qi Li, Sen Li, Xuewei Li, Xiulong Liu. 666-673 [doi]
- A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction NetworksQi Xia, Badjie Ansu, Jianbin Gao, Mupoyi Ntuala Grace, Hu Xia, Isaac Amankona Obiri. 674-682 [doi]
- A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power TradingGuangzhuo Zhu, Qian Wang, Bei Gong. 683-690 [doi]
- A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive LearningYuwei Xu 0001, Zizhi Zhu, Chufan Zhang, Kehui Song, Guang Cheng 0001. 691-698 [doi]
- Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel AnalysisZelong Zhang, Wei Cheng 0003, Yongbin Zhou, Zehua Qiao, Yuhan Zhao, Jian Weng 0001. 699-706 [doi]
- Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number GeneratorsYuan Ma, Maosen Sun, Wei Wang 0314, Tianyu Chen, Na Lv, Dongchi Han. 707-716 [doi]
- User Authentication Based on the Integration of Musical Signals and Ear Canal AcousticsTongxi Chen, Weizhi Meng, Wenjuan Li. 717-728 [doi]
- Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced RandomnessKaiyuan Li, Haruka Hirata, Daiki Miyahara, Kazuo Sakiyama, Yuko Hara, Yang Li 0001. 726-733 [doi]
- 2 Test of IndependenceXiaoyong Kou, Wei Yang, Peijin Cong, Gongxuan Zhang. 734-741 [doi]
- MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State SynchronizationWeihan Wang, Xiulong Liu, Liyuan Ma, Hao Xu, Gaowei Shi, Juncheng Ma, Keqiu Li. 742-749 [doi]
- Enhancing Adversarial Robustness through Self-Supervised Confidence-Based DenoisingYongkang Chen, Tong Wang, Wei Kong, Taotao Gu, Guiling Cao, Xiaohui Kuang. 750-758 [doi]
- A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial NetworksZhixuan Zhang, Yanhui Zhu, Yuezhong Wu, Fangteng Man, Hao Chen, Xujian Ying. 759-766 [doi]
- MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized SmoothingMengdie Huang, Yingjun Lin, Xiaofeng Chen 0001, Elisa Bertino. 767-774 [doi]
- GTree: GPU-friendly Privacy-preserving Decision Tree Training and InferenceQifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello. 775-785 [doi]
- RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual TendencyFan Xiang, Xueyang Li, Guozhu Meng. 786-793 [doi]
- Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detectionZhuohan Ao, Yi Wang, Ying Wang, Yu Zhan. 794-801 [doi]
- RPG-Diff: Precise Adversarial Defense Based on Regional Positioning GuidanceHaotian Wang, Jing Liu. 802-809 [doi]
- Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated LearningWei Xu, Hui Zhu, Chang Xiao, Fengwei Wang, Dengguo Feng, Hui Li. 810-817 [doi]
- Local Drift Correction and Attention Aggregation for Self-Organized Federated LearningHaiying Liu, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Bolin Zhang, Xuebao Li. 818-825 [doi]
- Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature MixupMengmeng Tang, Shuhong Chen, Guojun Wang, Hanjun Li 0005, Zhuyi Yao, Sheng Wen. 826-833 [doi]
- Federated Unlearning for Samples Based on Adaptive Gradient Ascent of AnglesYing Hua, Hui Xia 0001, Shuo Xu. 834-841 [doi]
- Membership Inference Attacks via Dynamic Adversarial Perturbations ReductionZehua Ding, Youliang Tian, Guorong Wang, Jinbo Xiong, Jianfeng Ma 0001. 842-849 [doi]
- Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset PurificationYuefeng Lai, Lizhao Wu, Hui Lin 0007, Xiaokang Zhou. 850-858 [doi]
- LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency GraphJiekang Hu, Yakai Li, Zhaoxi Xiang, Luping Ma, Xiaoqi Jia, Qingjia Huang. 859-869 [doi]
- StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image ClassifiersYi Ji, Isao Echizen. 870-879 [doi]
- A GPU-Based Privacy-Preserving Machine Learning Acceleration SchemeJie Hou, Zengrui Huang, Zhiyong Zhang, Wei Zhang, Lei Ju. 880-887 [doi]
- A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round InductionFeng Wu, Weiqi Wang, Youyang Qu, Shui Yu 0001. 888-895 [doi]
- TTFL: Towards Trustworthy Federated Learning with Arm Confidential ComputingLizhi Sun, Jingzhou Zhu, Boyu Chang, Yixin Xu 0003, Bo Yang, Hao Wu 0067, Fengyuan Xu, Sheng Zhong 0002. 896-907 [doi]
- Topic-Aware Sensitive Information Detection in Chinese Large Language ModelYalin Sun, Ruiying Lu, Kang Li, Yu Zheng. 908-915 [doi]
- UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge TransferJiezhen Tang, Hui Zhu 0001, Yandong Zheng, Junpeng Zhang, Fengwei Wang, Jiaqi Zhao 0005, Hui Li 0006. 916-925 [doi]
- Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous DataWenxiu Ding, Muzhi Liu, Yuxuan Cai, Mingxin Chen, Zheng Yan 0002, Mingjun Wang. 926-933 [doi]
- AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face RestorationZhenbo Song, Wenhao Gao, Zhenyuan Zhang, Jianfeng Lu 0003. 934-943 [doi]
- CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization SmoothingLijun Gao, Zheng Yan 0002. 944-951 [doi]
- Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose AdaptabilityZhangchi Zhao, Jianyi Zhang, Liqun Shan, Ziyin Zhou, Kaiying Han, Xiali Hei 0001. 952-959 [doi]
- T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloudShuaishuai Chang, Yuzhe Li, Jinchao Zhang, Bo Li 0063. 960-967 [doi]
- Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their InteractionsXianghui Dong, Yin Liu, Xuejun Yu. 968-977 [doi]
- A Trust Model with Fitness-Based Clustering Scheme in FANETsJunqiao Gao, Chaklam Cheong, Mansi Zhang, Yue Cao 0002, Tao Peng, Shahbaz Pervez. 978-985 [doi]
- TWCF: Trust Weighted Collaborative Filtering based on Quantitative Modeling of TrustWenting Song, K. Suzanne Barber. 986-993 [doi]
- Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime ConstraintsNiklas Bunzel, Gerrit Klause. 994-999 [doi]
- FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated LearningXutao Meng, Qingming Li, Yong Li, Li Zhou, Xiaoran Yan. 1000-1006 [doi]
- Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern ControllingZheng Feng, Chunyu Xing, Chen Liang. 1007-1014 [doi]
- Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic MonitoringJie Cao 0009, Zhengxin Xu, Yunpeng Bai, Yuwei Xu 0001, Qiao Xiang, Guang Cheng 0001. 1015-1021 [doi]
- Enabling Robust Android Malicious Packet Capturing and Detection via Android KernelMingyang Li, Weina Niu, Xinglong Chen, Jiacheng Gong, Kegang Hao, Xiaosong Zhang. 1022-1028 [doi]
- Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security NetworkingMeiling Chen, Yuanyuan Yang, Sixu Guo, Jin Cao 0001, Haitao Du, Li Su. 1029-1036 [doi]
- A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge GraphKai Zhou, Yong Xie, Xin Liu. 1037-1044 [doi]
- LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum ProtocolsChenyu Li, Xiu Zhang, Xueping Liang, Xiaorui Gong. 1045-1050 [doi]
- Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of ThingsWenxin Jia, Zheng Yang, Zhiqiang Ma. 1051-1059 [doi]
- ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge GraphPengfei Li, Yujing Liu, Jinshu Su, Bo Yu 0008. 1060-1069 [doi]
- CaptchaSAM: Segment Anything in Text-based CaptchasYijun Wang, Ziyi Zhou, Weiqi Bai, Ruijie Zhao 0001, Xianwen Deng. 1070-1076 [doi]
- Tibetan microblogging user data analysis and topic identificationGuixian Xu, Wenhui Gao. 1077-1082 [doi]
- Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and CommunicationRunze Dong, Buhong Wang, Jiang Weng, Kunrui Cao, Jiwei Tian, Tianhao Cheng. 1083-1089 [doi]
- SimLog: System Log Anomaly Detection Method Based on SimhashWeiping Wang 0003, Huijuan Wang, Yulu Hong, Chenyu Wang, Hong Song, Shigeng Zhang. 1090-1096 [doi]
- FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain FeaturesZekai Song, Yunpeng Li, Jian Qin, Changzhi Zhao, Dongxu Han, Yuling Liu. 1097-1104 [doi]
- Android Malware Detection Technology Based on SC-ViT and Multi-Feature FusionQiulong Yu, Zhiqiang Wang, Lei Ju, Sicheng Yuan, Ying Zhang. 1105-1114 [doi]
- SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code ModularizationShuang Duan, Hui Shu, Zihan Sha, Yuyao Huang. 1115-1124 [doi]
- A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of ThingsChengqi Hou, Wei Yang 0015, Yu Wang, Zhiming Zhang, Shaolong Chen, Beibei Li. 1125-1134 [doi]
- Deep Learning-Based DDoS Attack Detection Using Adversarial OptimizationDahai Yu, Jianming Cui, Yungang Jia, Peiguo Fu, Ming Liu. 1135-1140 [doi]
- Security Assessment of Customizations in Android Smartwatch FirmwareYifan Yu, Ruoyan Lin, Shuang Li, Qinsheng Hou, Peng Tang, Wenrui Diao. 1141-1148 [doi]
- Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge ProofZhihuan Yang, Wenlong Tian, Emma Zhang, Zhiyong Xu 0003. 1149-1154 [doi]
- Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart GridsQian Yang, Chen Wang, Jian Shen, Yi Li, Dengzhi Liu. 1155-1160 [doi]
- Custom Permission Misconfigurations in Android: A Large-Scale Security AnalysisRui Li, Wenrui Diao, Debin Gao. 1161-1170 [doi]
- Orchestrating Security Protection Resource for Space-Ground Integrated NetworksDongbin Chen, Yunchuan Guo, Xiao Wang, FengHua Li, Zifu Li. 1171-1178 [doi]
- Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key GenerationLiquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang. 1179-1186 [doi]
- BWG: An IOC Identification Method for Imbalanced Threat Intelligence DatasetsJuncheng Lu, Yiyang Zhao, Yan Wang, Jiyuan Cui, Sanfeng Zhang. 1187-1194 [doi]
- Network Traffic Anomaly Detection Method Based on CTA-BiLSTMWenlong Liu, Bin Wen, Mengshuai Ma, Wanrong Du. 1195-1200 [doi]
- Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signatureHuiying Zou, Jia Duan, Xi Liu, Wei Ren 0002, Tao Li, Xianghan Zheng, Kim-Kwang Raymond Choo. 1201-1208 [doi]
- LLMUZZ: LLM-based seed optimization for black-box device fuzzingGuangming Gao, Shuitao Gan, Xiaofeng Wang, Shengkai Zhu. 1209-1216 [doi]
- FCSec: An Open-source Testbed for Security Evaluation on UAV CommunicationsIndu Chandran, Mukesh Narayana Gadde, Kizheppatt Vipin. 1217-1224 [doi]
- Active Defense Research: A New Perspective Integrating Traps and VulnerabilitiesQuan Hong, Yang Yu, Lvyang Zhang, Lidong Zhai. 1225-1230 [doi]
- Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning PipelinesJiashun Hao, Young-Woo Kwon 0001. 1231-1238 [doi]
- OSN Bots Traffic Transformer : MAE-Based Multimodal Social Bots Behavior Pattern MiningHaonan Zhai, Ruiqi Liang, Zhenzhen Li, Zhen Li 0011, Wei Xia, Bingxu Wang, Qingya Yang. 1239-1246 [doi]
- Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction LeakageJiahao Zhang, Yuejun Liu, Jingdian Ming, Yiwen Gao 0001, Yongbin Zhou, Debao Wang. 1247-1254 [doi]
- Towards Securing ASCON Implementation by Inner Product MaskingYuming Liu, Wei Cheng 0003, Jihao Fan, Yongbin Zhou. 1255-1260 [doi]
- A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain SystemPengcheng Xia, Jingyu Wu, Yiyang Ni, Jun Li 0004. 1261-1267 [doi]
- LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic StreamsBin Li, Li Cheng, Zhongshan Zhang, Yu Pan, Feng Yao, Renjie He. 1268-1275 [doi]
- WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT NetworkYoubin Kim, Man-Ki Yoon. 1276-1285 [doi]
- A Reliable Encrypted Traffic Classification Method Based on Attention MechanismsZhijun Wu 0001, Shanhe Niu, Meng Yue. 1286-1295 [doi]
- USB Catcher: Detection of Controlled Emissions via Conducted Compromising EmanationsYixin Zhang, Fuqiang Du, Xinge Chi, Zhiqiang Lv. 1296-1303 [doi]
- Improving Security in Internet of Medical Things through Hierarchical Cyberattacks ClassificationVince Noort, Nhien-An Le-Khac, Hong-Hanh Nguyen-Le. 1304-1309 [doi]
- Privacy-Preserving Secure Neighbor Discovery for Wireless NetworksAhmed Mohamed Hussain, Panos Papadimitratos. 1310-1319 [doi]
- 3IR: Securing Multi-Domain Networks via Extending Depth-in-Defense Strategies Across Nested Management DomainsYaobing Xu, Yunchuan Guo, Wenlong Kou, Junhai Yang, Ziyan Zhou, FengHua Li. 1320-1325 [doi]
- BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV NetworksTingyu Wang, Qiang Cao 0006, Shihong Zou, Yueming Lu. 1326-1335 [doi]
- Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy ProtectionJiayi Li, Ke Xu 0003, Xinghao Jiang, Tanfeng Sun. 1336-1342 [doi]
- Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential PrivacyXingxing Xiong, Shubo Liu, Xiping Liu, Xiaoguang Niu, Wenyu You. 1343-1352 [doi]
- Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, Mathieu Cunche. 1353-1360 [doi]
- Efficient FSS-based Private Statistics for Traffic MonitoringZhichao Wang, Qi Feng, Min Luo 0002, Xiaolin Yang, Zizhong Wei. 1361-1370 [doi]
- Efficient and Practical Multi-party Private Set Intersection Cardinality ProtocolShengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang. 1371-1380 [doi]
- An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile CrowdsensingYudan Cheng, Tao Feng, Zhiquan Liu, Xian Guo, Lulu Han, Jianfeng Ma. 1381-1388 [doi]
- NAGG: Noised graph node feature aggregations for preserving privacyYinghao Song, Long Yan, Yang Li, Mingjian Ni, Shengzhong Tan, Dazhong Li, Huiting Zhao, Yulun Song. 1389-1396 [doi]
- EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path OptimizationHaocheng Li, Haipeng Qu, Gaozhou Wang, Xiangjian Ge. 1397-1404 [doi]
- A Quiet Place: An In-Depth Study of Mobile Public-to-Private AttacksYin Liu. 1405-1412 [doi]
- Single-sign-on Authentication with Anonymous Token and Restricted Covert ChannelZhao Zhang 0026, Chunxiang Xu, Man Ho Allen Au. 1413-1422 [doi]
- DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential PrivacyYue Quan, Kai Fan 0001, Haoyang Wang 0005, Hui Li 0006, Yintang Yang. 1423-1429 [doi]
- Research on Intelligent Joint Detection Technology for Application Privacy Behavior ComplianceRuoding Zhang, Tao Liu, Qifeng Shi, Yan Zhang, Xiaoyi Song, Xinrui Geng. 1430-1437 [doi]
- Multi-Dimensional Data Collection Under Personalized Local Differential PrivacyKunpeng Song, Mingzhang Sun, Kui Zhou, Peng Tang, Ning Wang, Shanqing Guo. 1438-1447 [doi]
- Interactive Verifiable Local Differential Privacy Protocols for Mean EstimationLiang Wang, Li Liu, Pei Zhan, Peng Tang, Puwen Wei, Shanqing Guo. 1448-1457 [doi]
- CFE: Secure Filtered Words in End-to-End Encrypted Messaging SystemTran Viet Xuan Phuong, Albert Baker, Philip D. Huff, Jan P. Springer, Tho Thi Ngoc Le. 1458-1465 [doi]
- Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic EncryptionHongying Zheng, Hongdie Li, Di Xiao 0001, Maolan Zhang. 1466-1471 [doi]
- Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed LearningDi Xiao 0001, Zhuyan Yang, Maolan Zhang, Lvjun Chen. 1472-1479 [doi]
- Secure Join and Compute in Encrypted DatabaseTanusree Parbat, Ayantika Chatterjee. 1480-1485 [doi]
- DyCom: A Dynamic Community Partitioning Technique for System Audit LogsZhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen 0001, Dan Meng. 1486-1493 [doi]
- Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownershipZhihuan Yang, Wenlong Tian, Ruixuan Li 0001, Xuming Ye, Zhiyong Xu 0003. 1494-1499 [doi]
- Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title IdentificationZhenyu Xu, Xurui Ren, Yi Zhang, Guang Cheng, Hua Wu. 1500-1505 [doi]
- SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection AlgorithmMing Zhou, Zhijian Zheng, Peng Zhang, Sixue Lu, Yamin Xie, Zhongfeng Jin. 1506-1511 [doi]
- Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online DocumentsRaffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri 0002. 1512-1521 [doi]
- Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement ApplicationsAdam L. Hooker, Wenjian Huang, Shalini Kapali Kurumathur, Nishant Vishwamitra, Kim-Kwang Raymond Choo. 1522-1527 [doi]
- Broader but More Efficient: Broad Learning in Power Side-channel AttacksYilin Yang, Changhai Ou, Yongzhuang Wei, Wei Li, Yifan Fan, Xuan Shen. 1528-1533 [doi]
- BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristicsZhen Liu, Changzhen Hu, Chun Shan, Junkai Yi. 1534-1540 [doi]
- Leveraging Large Language Models for Challenge Solving in Capture-the-FlagYuwen Zou, Yang Hong, Jingyi Xu, Lekun Liu, Wenjun Fan. 1541-1550 [doi]
- Efficient and Verifiable Dynamic Skyline Queries in Blockchain NetworksBo Yin 0004, Hang Chen, Binyao Xu, Mariam Suleiman Silima, Ke Gu 0002. 1551-1556 [doi]
- Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature ApproachQingmei Yang, Pincan Zhao, Yuchuan Fu, F. Richard Yu. 1557-1562 [doi]
- Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive EthernetJia Liu, Wenjun Fan, Yifan Dai, Enggee Lim, Zhoujin Pan, Alexei Lisitsa 0001. 1563-1571 [doi]
- Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning ApproachesLiang Hong, Xingguo Guo, Zeyar Aung, Wei Hu 0008. 1572-1579 [doi]
- UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber ThreatsJie Zhang, Hui-Wen, Lun Li, Hongsong Zhu. 1580-1588 [doi]
- HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation AnalysisShuiliang Chai, Zhanhui Shi, Yanjiao Gao, Yuhao Huang, Aizhu Liu, Jie Xiao 0003. 1589-1594 [doi]
- An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End CollaborationJingsen Zhang, Shoulu Hou, Yi Gong 0002, Tao Wang, Changyuan Lan, Xiulei Liu. 1595-1603 [doi]
- Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability DetectionTao Fang, Zhihao Hou, Jiahao He, Junjie Zhou, Gansen Zhao. 1604-1613 [doi]
- LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network AttacksFengyuan Shi 0005, Zhou Zhou 0007, Jiang Guo, Renjie Li, Zhongyi Zhang, Shu Li, Qingyun Liu 0001, Xiuguo Bao. 1614-1621 [doi]
- SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUFYueyue He, Wenxuan Fan, Koji Inoue. 1622-1631 [doi]
- Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud AssistanceXinrui Zhang, Pincan Zhao, Jason Jaskolka. 1632-1637 [doi]
- AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial AttacksNour Alhussien, Ahmed AlEroud. 1638-1646 [doi]
- Privacy Leak Detection in LLM Interactions with a User-Centric ApproachTan Su, Bingbing Zhang, Chi Zhang, Lingbo Wei. 1647-1652 [doi]
- HFI: High-Frequency Component Injection based Invisible Image Backdoor AttackHuanlai Xing, Xuxu Li, Jing Song, Lexi Xu, Jincheng Peng, Bowen Zhao 0002, Li Feng. 1653-1658 [doi]
- From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation TendenciesDong Zhang, Zhiyuan Hu, Huijun Chen, Guangming Liu, YinFeng Zheng, Jinghui Lu. 1659-1665 [doi]
- Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement MethodChuang Liang, Jie Huang 0016. 1666-1674 [doi]
- Active Source Inference Attack Based on Label-Flipping in Federated LearningLening Zhang, Hui Xia. 1675-1680 [doi]
- A Universally Composable Key Management System Using Trusted HardwareZhenghao Lu, Ding Ma, Lei Fan, Xiuzhen Chen, Yongshuai Duan, Jia Zhang. 1681-1686 [doi]
- Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training TasksZiheng Zhang, Lei Liu, Zhongmin Yan. 1687-1692 [doi]
- THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEEZehao Li, Jiachun Liao, Jinhao Yu, Lei Zhang. 1693-1700 [doi]
- DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing AttacksXiaodong Huang, Gangliang Li, Chengfeng Chen, Shouqiang Liu. 1701-1708 [doi]
- Learning Robust and Repeatable Physical Camouflage for Aerial Object DetectorsZilong He, Hua Zhang. 1709-1718 [doi]
- FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural NetworkHaiyu Deng, Xiaocui Dang, Yanna Jiang, Xu Wang 0004, Guangsheng Yu, Wei Ni 0001, Ren Ping Liu. 1719-1726 [doi]
- An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian InsightsYaling Zhang, Xiang Sun, Yichuan Wang 0003, Dongtai Tang, Chen Zhao. 1727-1732 [doi]
- End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-AttentionFeiyu Zhao, Jianguo Wei, Wenhuan Lu, Yongwei Li. 1733-1740 [doi]
- DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing ScenariosGuanghan Li, Wenzhong Yang, Xiaodan Tian, Jiaren Peng. 1741-1748 [doi]
- Defending Against Model Poisoning Attacks in Federated Learning via Client-guided TrustXiangxiang Wang, Hui Xia 0001, Yingqi Zhang. 1749-1755 [doi]
- Abstraction-Based Training for Robust Classification Models via Image PixelationYang Chen, Min Wu, Min Zhang 0002. 1756-1761 [doi]
- FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data TransformationXiong Yan, Kedong Yan, Chanying Huang, Dan Yin, Shan Xiao. 1762-1769 [doi]
- Large Language Model and Behaviour Tree Based Real-World Test Scenario Generation for Autonomous VehiclesYuliang Li, Zhonglin Hou, Hong Liu. 1770-1775 [doi]
- Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspectiveXinlei Liu 0004, Jichao Xie, Tao Hu, Hailong Ma, Baolin Li, Peng Yi, Zhen Zhang. 1776-1783 [doi]
- Individual Fair Density-Peaks Clustering Based on Local Similar Center Graph and Similar Decision MatrixYiding Tang, Zhijing Yang, Yufan Peng, Hui Zhang 0055. 1784-1789 [doi]
- 2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated LearningYilong Li, Jianyi Zhang, Ziyin Zhou, Zezheng Sun, Xu Ji, Zeping Li, Jiameng Han, Zhangchi Zhao. 1790-1796 [doi]
- Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARPYaxin Cui, Hong Xu 0008, Zhichao Xu. 1797-1802 [doi]
- SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock MechanismWeiguo Huang, Yong Ding 0005, Jun Li, Yujue Wang, Hai Liang, Changsong Yang. 1803-1808 [doi]
- Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository ScenariosXiangyu Meng, Xuejun Yu. 1809-1816 [doi]
- FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradientDong Yang, Weihai Li, Zikai Xu, Zhiling Zhang, Yiling Chen. 1817-1824 [doi]
- ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State SpaceJing Li, Tao Sun 0002, Wenjie Zhong. 1825-1831 [doi]
- Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable BlockchainsQingmei Yang, Lijun Sun, Xiao Chen, Lingling Wang. 1832-1837 [doi]
- DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic DetectionYonghao Gu, Xiaoqing Zhang, Hao Xu, Tiejun Wu. 1838-1843 [doi]
- + : A Robustness-Optimized Security Scheme Against Cascading Failures in Multipath TCP under LDDoS Attack StreamsJinquan Nie, Lejun Ji, Yirui Jiang, Young Ma, Yuanlong Cao. 1844-1849 [doi]
- A Novel Approach to Network Traffic Analysis: the HERA toolDaniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça. 1850-1856 [doi]
- Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA NetworkYu Fu, Bingcai Chen, Qian Ning, Kai Lin. 1857-1862 [doi]
- A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural NetworksJiHoon Park, Giluk Kang, Young-Gab Kim. 1863-1868 [doi]
- Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDPZiyue Chen, He Kong, Shuai Ding, Quanfeng Lv, Guo Wei. 1869-1874 [doi]
- A LLM-based agent for the automatic generation and generalization of IDS rulesXiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang 0008, Feng Liu 0001, Guoqiao Zhou, Peng Yin. 1875-1880 [doi]
- A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed EventsHaojun Xia, Limin Sun 0001, Wenliang Liu, Jingyi Xie, Zhanwei Song, Bibo Tu. 1881-1888 [doi]
- GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep LearningZheng Zhang, Rui Ma 0004, Yuqi Zhai, Yuche Yang, Siqi Zhao, Hongming Chen. 1889-1895 [doi]
- A Cross-Site Scripting Attack Protection Framework Based on Managed ProxyCheng Tang, Qingfeng Wang, Guozhen Cheng, Hao Liang, Jianhua Peng, Meiyue Yang, Wenyan Liu, Ming Liu, Lei Sha. 1896-1903 [doi]
- IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive HashingJianhui Ming, Weiping Wang 0003, Linlin Zhang, Yingjie Hu, Shigeng Zhang. 1904-1909 [doi]
- SGCML: Detecting Hacker Community Hidden in Chat GroupTao Leng, Junyi Liu, Zhen Yang, Chang You, Yutong Zeng, Cheng Huang. 1910-1915 [doi]
- DA-CPVD: Vulnerability Detection Method based on Dual Attention Composite PoolingMengxuan Shi, Jinfu Chen 0001, Saihua Cai, Ziyan Liu, Jiapeng Zhou. 1916-1921 [doi]
- Cyber Resilience Framework for Web ServerWanqiu Zhou, Zheng Zhang, Yuan Yao, Jiang Wang, Jiaxin Ma, Hui Liu. 1922-1927 [doi]
- Improved Packet-Level Synthetic Network Traffic GenerationJacob Soper, Yue Xu 0001, Ernest Foo, Zahra Jadidi, Kien Nguyen Thanh. 1928-1934 [doi]
- Exploring Permission Control Flaws in Mini-appsJun Li, Yuting Zhang, Wu Zhou, Shengzhi Zhang. 1935-1941 [doi]
- Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack VectorsYu Zhang, Haipeng Qu, Lingyun Ying, Linghui Wang. 1942-1947 [doi]
- An Adaptive Reputation Update Mechanism for Primary Nodes in PBFTLimin Yu, Yongdong Wu, Jiao Lu, Tong Li. 1948-1953 [doi]
- Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key UpdatesYingying Wu, Jiabei Wang, Dandan Xu, Yongbin Zhou, Yang Wang. 1954-1962 [doi]
- Malware Traffic Classification Based on Multidimensional Features LearningYijie Huang, Wei Ding, Mian Huang. 1963-1971 [doi]
- ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature AnalysisLiang Wang, Zhipeng Wang, Meng Wang. 1972-1977 [doi]
- Detection of Sensitive Information Based on Transient Data in Store Buffer and CacheYan Chang, Yaqin Wu, Jianwu Rui, Ming Cao, Yawei Yue, Yu Feng, Tingting He, Haihui Gao, Zhen Lv. 1978-1982 [doi]
- Unsupervised Evaluation Method of Relative Coordination Degree from Group PerspectiveChenghan Zhang, Yan Liu, Daofu Gong, Ling Wang. 1983-1988 [doi]
- DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision TreesZejun Lan, Jianfeng Guan, Xianming Gao, Tao Feng, Kexian Liu, Jianbang Chen. 1989-1997 [doi]
- A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency GraphBing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong. 1998-2003 [doi]
- SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive LearningZhuoqun Xia, Yongbin Yu, Jingjing Tan, Kejun Long. 2004-2009 [doi]
- NLP and Neural Networks for Insider Threat DetectionNeda Baghalizadeh-Moghadam, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens. 2010-2018 [doi]
- Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular NetworksXin Zhang, Chao Guo 0002, Buxin Guo. 2019-2024 [doi]
- 5G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core NetworkXinyu Huang, Xingxing Liao, Jie Yang, Wei You, Wenhao Wu, Shiru Min, Xinsheng Ji. 2025-2030 [doi]
- Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph LearningJoseph Gear, Yue Xu 0001, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson. 2031-2038 [doi]
- CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language ModelsWangyuan Jing, Chi Zhang, Bingbing Zhang, Lingbo Wei. 2039-2044 [doi]
- Smart Contract-Based Auditing of Edge Data for Vehicular NetworksYu Zhao, Yangguang Tian, Chunbo Wang, Xiaoqiang Di, Hui Qi. 2045-2050 [doi]
- FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor NetworkRuizhe Zhang, Shangnan Yin, Jinfu Chen 0001. 2051-2059 [doi]
- *Naila Azam, Alex Chak, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong. 2060-2067 [doi]
- A Blockchain-based PHR Sharing Scheme with Attribute Privacy ProtectionChaohe Lu, Zhongyuan Yu, Guijuan Wang, Anming Dong, Xiang Tian 0005. 2068-2077 [doi]
- Secure Microwave QR Code Communication Using Pseudo-Random Constellation RotationChunpeng Guo, Beiyuan Liu, Zeyang Sun, Chen Chen 0071, Sai Xu. 2078-2083 [doi]
- Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social RecommendationXiaofei Hao, Liyuan Liu, Yimeng Wang, Fengyu Li, Wanqing Wu. 2084-2089 [doi]
- Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed DataBosong Zhang, Qian Sun, Hai Wang, Linna Zhang, Danyang Li. 2090-2097 [doi]
- Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted DatasetsJinlong Zheng, Jia-Nan Liu, Minhua Su, Dingcheng Li, Kai He, Xueqiao Liu. 2098-2105 [doi]
- A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple AggregationZhiqiang Wang, Xinyue Yu, Ziqing Tian. 2106-2114 [doi]
- A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation SystemsXiaocui Dang, Priyadarsi Nanda, Manoranjan Mohanty, Haiyu Deng. 2115-2122 [doi]
- scE(match): Privacy-Preserving Cluster Matching of Single-Cell DataJohannes Lohmöller, Jannis Scheiber, Rafael Kramann, Klaus Wehrle, Sikander Hayat, Jan Pennekamp. 2123-2132 [doi]
- Block-Feature Fusion for Privacy-Protected Iris RecognitionWiraj Udara Wickramaarachchi, Junwei Zhou, Dongdong Zhao 0001, Jianwen Xiang. 2133-2141 [doi]
- CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart HealthcareRuiwei Hou, Fucai Zhou, Zongye Zhang 0001, Jiacheng Li, Chongyang Wang. 2142-2150 [doi]
- An Efficient and Secure Anonymous Query ProtocolWenjv Hu, Yin Li. 2151-2158 [doi]
- Privacy-aware data aggregation using Functional EncryptionSehrish Shafeeq, Mathias Fischer 0001. 2159-2168 [doi]
- Evaluating Web-Based Privacy Controls: A User Study on Expectations and PreferencesYuemeng Yin, Rahat Masood, Suranga Seneviratne, Aruna Seneviratne. 2169-2174 [doi]
- High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image BlockingYanpeng Xiang, Tao Zhang, Jiahao Liu, Xinbo Zhang, Yu Zhang. 2175-2184 [doi]
- Cross-platform Network User Alignment Interference Methods Based on Obfuscation StrategyLuyao Wang, Yan Liu, Xiaoyu Guo, Ziqi Long, Chunfang Yang. 2185-2190 [doi]
- Research on Toxic Speech Detection Based on Large Language ModelsWeihao Li, Yongbing Gao, Yu Zhang, Lidong Yang, Ruiping Gao. 2191-2196 [doi]
- ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge ProofsJianwei Liu, Wei Wan, Chun Long, Jing Li, Fan Yang, Yuhao Fu. 2197-2206 [doi]
- Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive FrameworkZhongyuan Qin, Dinglian Wang, Minghua Wang. 2207-2212 [doi]
- OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix MultiplicationShuguang Zhang, Jianli Bai, Kun Tu, Ziyue Yin, Chan Liu. 2213-2220 [doi]
- A Method for Quantitative Object De-Identification Analysis of Anonymized VideoDeok-Han Kim, Yujun Kim, Young-Gab Kim. 2221-2226 [doi]
- *Xingbo Wang, Yuzhu Wang, Mingwu Zhang. 2227-2237 [doi]
- Research on Adaptive Attention Dense Network Structure in Camera Source Recognition MethodHaoxuan Wu, Zhiqiang Wen. 2238-2243 [doi]
- Compressed Video Action Recognition Based on Neural Video CompressionYuting Mou, Ke Xu 0003, Xinghao Jiang, Tanfeng Sun. 2244-2249 [doi]
- Construction of Cyber-attack Attribution Framework Based on LLMJingye Zhang, Ken Cheng, Xinli Xiong, Rongcheng Dong, Jun Huang, She Jie. 2250-2255 [doi]
- Discriminating Malware Families using Partitional ClusteringPooja Mishra, Paul Black, Adil Bagirov, Shaoning Pang. 2256-2261 [doi]
- Investigating Patterns of Adversarial Techniques for Cyberattack ForensicsLiming Lu, Zhenlin Yu, Peter Kok Keong Loh, Tuhin Isfaque Al Kaderi. 2262-2268 [doi]
- WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego NetworksHervais Simo, Michael Kreutzer 0001. 2269-2280 [doi]
- DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph AutoencodersMengmi Tan, Jianyi Liu, Ru Zhang. 2281-2286 [doi]
- Transfer Learning-Based Robust Insider Threat DetectionYujun Kim, Deok-Han Kim, Young-Gab Kim. 2287-2292 [doi]
- Model-based Data Markets: A Multi-Broker Game Theoretic ApproachYizhou Ma, Xikun Jiang, Evan W. Wu, Luis Daniel Ibáñez, Jian Shi. 2293-2301 [doi]
- DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label PropagatingHao Zhou, Pengcheng Xia, Yiyang Ni, Jun Li. 2302-2309 [doi]
- An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoVShuming Xiong, Junfeng Zhu, Qiqi Xu. 2310-2315 [doi]
- FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum BlockchainTahrim Hossain, Sakib Hassan, Faisal Haque Bappy, Muhammad Nur Yanhaona, Sarker T. Ahmed Rumee, Moinul Islam Zaber, Tariqul Islam 0001. 2316-2321 [doi]
- Fedfair: A Debiasing Algorithm for Federated Learning SystemsHaibin Zheng, Tianxin Zhang, Jinyin Chen. 2322-2326 [doi]
- Differentially Private Graph Convolutional Networks with Privacy AmplificationYifan Sun, Meng Song. 2327-2335 [doi]
- Destruction and Reconstruction Chain: An Adaptive Adversarial Purification FrameworkZeshan Pang, Shasha Guo, Xuehu Yan, Yuliang Lu. 2336-2341 [doi]
- CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networksChaoqin Zhang, Maoqi Sun, Guangwu Hu. 2342-2347 [doi]
- Efficient and Secure Federated Learning via Enhanced Quantization and EncryptionChengming Zhang, Bo Tang, Yifan Bian, Bingtao Han, Yongcheng Wang 0002, Tao Liu. 2348-2353 [doi]
- Human Action Recognition by Invisible Sensing with the Constraint of Privacy PreservationJun Guo, Minjuan Sun, Weiwei Zhang, Baoying Liu, Anwen Wang, Li Liu. 2354-2359 [doi]
- Traceable AI-driven Avatars Using Multi-factors of Physical World and MetaverseKedi Yang, Zhenyong Zhang, Youliang Tian. 2360-2367 [doi]
- DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain InformationYingjian Li, Yongsheng Wang, Gang Wang. 2368-2375 [doi]
- HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS DetectionHaishi Huang, Jiaping Gui, Jianan Hong, Cunqing Hua. 2376-2381 [doi]
- Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces?Lukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos. 2382-2387 [doi]
- Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural NetworksKewin Ignasiak, Wojciech Kowalczyk, Lukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada. 2388-2393 [doi]
- A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based ProtocolJiaqi Lei, Ke Gu, Long Cai. 2394-2399 [doi]
- BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural NetworksKuan Yan, Dmytro Matsypura, Junbin Gao. 2400-2409 [doi]
- EasyDetector: Using Linear Probe to Detect the Provenance of Large Language ModelsJie Zhang, Jiayuan Li, Haiqiang Fei, Lun Li, Hongsong Zhu. 2410-2417 [doi]
- FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital CurrencyYaru Lv, Lijun Sun, Xiao Chen. 2418-2423 [doi]
- Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and PartitioningLukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada. 2424-2429 [doi]
- Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural NetworksYilun Lyu, Xu Ma, Yuan Ma. 2430-2435 [doi]
- A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection SystemsBenyamin Tafreshian, Shengzhi Zhang. 2436-2441 [doi]
- Design and Implementation of Data Encryption Mechanism in Fiber Channel NetworkHongke Zhang, Zheng Yan 0002. 2442-2446 [doi]
- A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective OptimizationZhou Zhou 0001, Taotao Yu, Mohammad Shojafar, Xia Ou, Hongbing Cheng. 2447-2452 [doi]
- Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation AttacksShengmin Xu, Jianfei Sun, Hangcheng Cao, Yulan Gao, Ziyang He, Cong Wu 0003. 2453-2461 [doi]
- Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?Raphael Antonius Frick, Lukas Graner. 2462-2467 [doi]
- AttDet: Attitude Angles-Based UAV GNSS Spoofing DetectionLuyao Wang, Xiaomin Wei, Hongtao Zhang, Lingtao Jia. 2468-2473 [doi]
- IoT Vulnerability Detection using Featureless LLM CyBert ModelSarah Binhulayyil, Shancang Li, Neetesh Saxena. 2474-2480 [doi]
- AI empowered senstive information detection and anonymisation in PDF filesZheng Gao, Hongping Li. 2481-2485 [doi]
- Analysis of Data Export Business Processes Based on Petri NetsYongqiang Chen, Meiqi Liu, Jingfeng Rong, Xujie Liu, Anmin Fu, Anshun Zhou, Yuqing Zhang 0001. 2486-2491 [doi]
- Research on Lifecycle-Driven Government Data Security Model and Data Grouping TechnologySiyu Chen, Jingfeng Rong, Zhiyuan Fu, Qiuling Yue, Anmin Fu, Xujie Liu, Anshun Zhou, Yuqing Zhang 0001. 2492-2497 [doi]
- A review of data security research in energy storage systemsMeiqi Liu, Yongqiang Chen, Chaoyang Zhu, Shuang Yao, Jingfeng Rong, Xiaolong Zhao, Xijuan Si, Guang Yang, Yuqing Zhang. 2498-2503 [doi]
- Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border Data TransferZhou Fang, Kai Zhang, Yigang Diao, Yixuan Song, Yanwei Sun, Jinqiao Shi. 2504-2509 [doi]
- LogContrast: Log-based Anomaly Detection Using BERT and Contrastive LearningWei Yuan, Hongyu Sun, Mo Pang, He Wang, Gaofei Wu, Yuqing Zhang. 2510-2516 [doi]
- A Study of Backdoor Attacks on Data Distillation for Text Classification TasksSixian Sun, Hongyu Sun, Haoxing Zhang, Yuqing Zhang. 2517-2522 [doi]
- Distributed Data Possession - Blockchain Based ScalabilityBartlomiej Dzikowski, Lukasz Krzywiecki, Ksawery Mozdzynski, Karol Niczyj, Hannes Salin. 2523-2528 [doi]
- Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular NetworksPengfeng Zhang, Lei Li, Xin Liu, Rui Wang, Donglan Liu, Bing Su, Yuntao Wang, Yiliang Liu, Zhou Su. 2529-2534 [doi]
- Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common ModulusMahdi Mahdavi, Navid Abapour, Zahra Ahmadian. 2535-2540 [doi]
- Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of Trust (AoT)Xiayue Wang, Mingyang Li, Yuting Tao, Xuanzhe Wang, Hao Wu. 2541-2546 [doi]
- MT-Index: A Trustworthy Index For Multimodal Data SharingQianyue Fan, Shiqian Wang, Zhe Feng, Li Di. 2547-2552 [doi]
- Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd ComputingSanjay Segu Nagesh, Niroshinie Fernando, Seng W. Loke, Azadeh Ghari Neiat, Pubudu N. Pathirana. 2553-2558 [doi]
- Payload Level Anomaly Network Traffic Detection via Semi-Supervised Contrastive LearningXinglin Lian, Yang Liu, Shanfeng Wang, Yu Zheng. 2559-2566 [doi]
- DualConvNet: Enhancing CNN Inference Efficiency Through Compressed Convolutions and ReparameterizationHaipeng Du, Muyan Jiao, Jiageng Zhang, Xin Lv, Jie Zhang. 2567-2574 [doi]
- Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic AlgorithmsGianlucca L. Zuin, Adriano Veloso. 2575-2582 [doi]
- An Experimental Study on Half-Closed TCP Connections in Public Cloud GatewaysZhuang Yuan, Rui Li, Fa Zhang, Kejing Xu, Liang Xu, Weizhan Zhang. 2583-2589 [doi]
- A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial ApplicationsShuaipeng Wu, Changhao Yuan, Kejiang Ye. 2590-2597 [doi]
- Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold NetworksHaowei Huo, Ting Lv, Ningbo Zhao, Gefan Ai, Qi He, Ying Kong, Yu Zhang, Yiwei Li, Jiangyao Wei, Chen Liu, Yuan Liu, Lichuan Ma. 2598-2605 [doi]
- Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image ClassificationMingxin Jin, Cong Wang, Shanglin Yang, Heng Wang, Ju Huang, Jun Zhao. 2606-2611 [doi]
- RTM-CMD: Exploring Advanced Underground Target Detection in Coal Mines through Modified RTMDET MethodologyLonglong Gao, Tao Xue, Long Xi. 2612-2618 [doi]
- Your Data is Leaking! An Empirical Study of User Habits during Smartphone ChargingSteven Krudsen, Wenjuan Li. 2619-2626 [doi]
- Anticipated Failure Determination-based Weakness Analysis with Common Weakness EnumerationToru Sakon. 2627-2634 [doi]
- Hardware Latency-Aware Differential Architecture Search: Search for Latency-Friendly Architectures on Different HardwareJiaqi Han, Dan Wang, Hong Luo, Ye Zhou, Bin Song. 2635-2643 [doi]
- Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on YH-ACTMin Song, Chao Li, Xiaowei Guo, Jie Liu 0002, Huajian Zhang, Rui Xia. 2644-2652 [doi]
- Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and AnalysisYanhong Xu, Zhao Li, Ziru Zhao, Blaise Herroine Aguenoukoun, Jia Liu, Zhixian Chang, Yicheng Liu. 2653-2660 [doi]
- An Automated PM2.5 Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning MechanismLe Anh Duc Vu, Minh Hai Vu, Bao Ngoc Tran, Minh Tung Hoang, Duc Anh Nguyen, Minh-Quan Hoang, Phi-Le Nguyen. 2661-2668 [doi]
- Multi-sensor Fusion-based Cow Health Monitoring IoT SystemZhenyu Lai, Yijia Xu, Jialei Zhang, Bowen Jia, Liangyan Wang, Qinglei Bu, Jie Sun 0024, Quan Zhang. 2669-2674 [doi]
- A Digital Traditional Chinese Medicine Splint for Treatment of Distal Radius FractureSiyuan Wang, Shuchen Liu, Zheng Jin, Zheng Yan, Tao Chen, Qinglei Bu, Zhiqiang Wang, Jintao Liu, Jie Sun 0024. 2675-2679 [doi]
- Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated Sensing and Communication SystemsBingxin Zhang, Kang Zheng, Chao Tong, Kun Yang, Kang Yan. 2680-2685 [doi]
- A corrected method for parameters in the signal propagation modelYan Liang, Xin Dong, Song Chen, Zhengda Li, Zhimin Chang. 2686-2693 [doi]
- Research on Energy Management Strategy of Microgrid Based on Improved Deep Q network AlgorithmLe Tian, ChangShen Ou, Weilin Huang. 2694-2700 [doi]
- A cross-domain authentication scheme based on quantized trust relationship for smart gridTianang Chen, Haojie Qin, Jin Qian, Jun Luo, Yinghua Jiang, Liquan Chen. 2701-2708 [doi]
- Long-Term Privacy-Preserving Incentive Scheme Design for Federated LearningXin Liu, Rui Wang, Pengfeng Zhang, Liang Xie, Yiliang Liu, Zhou Su, Donglan Liu, Yingxian Chang. 2709-2714 [doi]
- Research on distributed machine learning defence strategies under Byzantine attacksChen Jin, Xi Chen, Junyu Pu, Boyu Fan. 2715-2721 [doi]