


default search action
1st AIS&P 2023: Guangzhou, China - Part I
- Jaideep Vaidya, Moncef Gabbouj

, Jin Li:
Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14509, Springer 2024, ISBN 978-981-99-9784-8 - Yawen Feng

, Shengke Zeng
, Jixiang Xiao, Shuai Cheng, Fengchun Zhang:
Fine-Grained Searchable Encryption Scheme Against Keyword Brute-Force Attacks. 1-15 - Jixiang Xiao, Shengke Zeng, Yawen Feng, Shuai Cheng:

Fine-Grained Authorized Secure Deduplication with Dynamic Policy. 16-32 - Wei Zhang, Weixuan Tang, Yuan Rao

, Bin Li, Jiwu Huang:
Deep Multi-image Hiding with Random Key. 33-41 - Zixin Wang, Bing Mi, Kongyang Chen:

Member Inference Attacks in Federated Contrastive Learning. 42-52 - Si Yu

, Xin Xie
, Zhao Li
, Wenbing Zhen
, Tijian Cai
:
A Network Traffic Anomaly Detection Method Based on Shapelet and KNN. 53-64 - Xunxun Pi

, Junhang Qiu
:
Multi-channel Deep Q-network Carrier Sense Multiple Access. 65-80 - Haochen Wang, Tianshi Mu, Guocong Feng, Shangbo Wu, Yuanzhang Li:

DFaP: Data Filtering and Purification Against Backdoor Attacks. 81-97 - Xingjiang Cheng

, Fuxing Zhang
, Yun Peng
, Xianmin Wang
, Teng Huang
, Ziye Zhou
, Duncan S. Wong, Changyu Dong
:
A Survey of Privacy Preserving Subgraph Matching Methods. 98-113 - Wenchao Wang

, Jing Qin
, Jinlu Liu
, Xi Zhang
, Xinyi Hou
, Zhongkai Wei
:
The Analysis of Schnorr Multi-Signatures and the Application to AI. 114-130 - Weixuan Tang, Yadong Liu:

Active Defense Against Image Steganography. 131-141 - Teng Wang

, Shuanggen Liu
, Jiangguo Liang, Shuai Wang, Lu Wang, Junying Song:
Strict Differentially Private Support Vector Machines with Dimensionality Reduction. 142-155 - Zhihao Li, Qi Chen, Weichuan Mo, Xiaolin Wang, Li Hu, Yongzhi Cao

:
Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight. 156-171 - Yongwei Lin

, Yucheng Long
, Zhili Zhou
, Yan Pang
, Chunsheng Yang
:
Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions. 172-189 - Chong Shi

, Jiahao Peng
, Shuying Zhu
, Xiaojun Ren
:
From Passive Defense to Proactive Defence: Strategies and Technologies. 190-205 - Xiao Li

, Xunxun Pi
, Hong Tang
, Junhang Qiu
:
Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision. 206-220 - Weijia Li

, Xunxun Pi
, Hong Tang
, Junhang Qiu
:
Multimodal Fatigue Detection in Drivers via Physiological and Visual Signals. 221-236 - Le Wang

, Haonan Yan
, Xiaodong Lin
, Pulei Xiong
:
Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense. 237-252 - Pengyu Lu

, Xianjia Meng
, Ximeng Liu
:
FedCMK: An Efficient Privacy-Preserving Federated Learning Framework. 253-271 - Weixuan Tang, Yingjie Xie:

An Embedded Cost Learning Framework Based on Cumulative Gradient Rewards. 272-282 - Yongjian Xue, Qian Wei, Xiaoliang Gong, Fan Wu, Yunqi Luo, Zhongning Chen:

An Assurance Case Practice of AI-Enabled Systems on Maritime Inspection. 283-299 - Enming Lu

, Fei Peng
:
Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification. 300-315 - Shuai Tang

, Tianshi Mu, Jun Zheng, Yurong Fu, Quanxin Zhang, Jie Yang:
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse. 316-327 - Hengying Xiao, Yangyang Liu:

DZIP: A Data Deduplication-Compatible Enhanced Version of Gzip. 328-341 - Xi Zhang, Ye Su

, Zhongkai Wei, Wenting Shen, Jing Qin:
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security. 342-357 - Rong Huang, Li Chen, Jun Zheng, Quanxin Zhang, Xiao Yu:

Adversarial Attacks Against Object Detection in Remote Sensing Images. 358-367 - Yujie Shao, Tian Chen, Ke Li, Lu Liu:

Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm. 368-381 - Ruozhou Zuo, Haibo Tian, Fangguo Zhang:

Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF. 382-399 - Liang Xue

, Xiaodong Lin
, Pulei Xiong
:
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication. 400-414 - Xie Kanqi, Luo Jun, Liao Bo Xun:

IoT-Inspired Education 4.0 Framework for Higher Education and Industry Needs. 415-429 - Mohammad Ashraf, Sima Hamedifar, Shichao Liu, Chunsheng Yang, Alanoud Alrasheedi:

Multi-agent Reinforcement Learning Based User-Centric Demand Response with Non-intrusive Load Monitoring. 430-445 - Heqiu Cai, Zhanao Zhang, Zhicong Yao, Kanghua Mo, Dixuan Chen, Hongyang Yan:

Decision Poisson: From Universal Gravitation to Offline Reinforcement Learning. 446-455 - Hui Yang, Ruilin Yang, Heqiu Cai, Xiao Zhang, Qingqi Pei, Shaowei Wang, Hongyang Yan:

SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised Learning. 456-467 - Ruilin Yang, Hui Yang, Jiluan Fan

, Changyu Dong, Yan Pang, Duncan S. Wong, Shaowei Wang:
Personalized Differential Privacy in the Shuffle Model. 468-482 - Sihao Huang

, Zhongxiang Liu
, Jiafu Yu
, Yongde Tang
, Zidan Luo
, Yuan Rao
:
MKD: Mutual Knowledge Distillation for Membership Privacy Protection. 483-498 - Zhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:

Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm. 499-512 - Jiaxuan Wu, Wei-Yang Chiu

, Weizhi Meng
:
KEP: Keystroke Evoked Potential for EEG-Based User Authentication. 513-530 - Peiming Xu, Meiling Zheng, Lingling Xu:

Verifiable Secure Aggregation Protocol Under Federated Learning. 531-547 - Wei Xie, Wenmin Li

, Huimin Zhang:
Electronic Voting Privacy Protection Scheme Based on Double Signature in Consortium Blockchain. 548-562 - Razy Youhana Adam, Weizhi Meng

:
Securing 5G Positioning via Zero Trust Architecture. 563-578 - Ning Xu

, Jiluan Fan
, Zikai Wen
:
Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility. 579-592

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














