


default search action
APWeb/WAIM 2024: Jinhua, China - Part IV
- Wenjie Zhang

, Anthony K. H. Tung
, Zhonglong Zheng
, Zhengyi Yang
, Xiaoyang Wang
:
Web and Big Data - 8th International Joint Conference, APWeb-WAIM 2024, Jinhua, China, August 30 - September 1, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14964, Springer 2024, ISBN 978-981-97-7240-7
Database System and Query Optimization
- Huan Zhou

, Lei Yang, Yu Xiao, Yuanxiong He, Jian Hu, Weining Qian:
SAM: A Spatial-Aware Learned Index for Disk-Based Multi-dimensional Search. 3-18 - Zekun Yao, Jiang Zhou, Zhixin Fan, Licheng Shan, Yinliang Yue, Yang Song:

BIVXDB: A Bottom Information Invert Index to Speed up the Query Performance of LSM-Tree. 19-34 - Ziyi Yin, Lihua Zhou, Lizhen Wang, Hongmei Chen:

Dual-Contrastive Multi-view Clustering Under the Guidance of Global Similarity and Pseudo-label. 35-49 - Boyu Yang

, Weiguo Zheng
:
A Powerful Local Search Method for Minimum Steiner Tree Problem. 50-66
Federated and Privacy-Preserving Learning
- Zhi Liu, Xiaohua He, Xulin Ma, Benfeng Wang, Guojiang Shen, Xiangjie Kong:

FedOCD: A One-Shot Federated Framework for Heterogeneous Cross-Domain Recommendation. 69-83 - Yan Zhang, Luyao Wang, Lu Zhou:

Efficient Updateable Private Set Intersection on Outsourced Datasets. 84-99 - Jiatong He, Libing Wu, Zhuangzhuang Zhang

, Na Lu, Xuejiang Wei:
Client Evaluation and Revision in Federated Learning: Towards Defending Free-Riders and Promoting Fairness. 100-118 - Hanqing Yang, Lixin Liu, Jingyu Wang, Zetian Zhang, Yun Hao:

A Secure Dynamic Incentive Scheme for Federated Learning. 119-136 - Zhihui Wang

, Yishan Liu, Yuliang Ni:
A Data Synthesis Approach Based on Local Differential Privacy. 137-151 - Sizheng Yan

, Junping Du
, Zhe Xue
, Ang Li
:
Byzantine-Robust Aggregation for Federated Learning with Reinforcement Learning. 152-166 - Yanjie Luo, Lin Li, Xiaohua Wu, Xiaohui Tao:

Differential Privacy with Data Removal for Online Happiness Assessment. 167-182 - Qu Lu, Hua Dai, Bohan Li, Pengyue Li, Qian Zhou, Qiang Zhou, Geng Yang:

EPCQ: Efficient Privacy-Preserving Contact Query Processing over Trajectory Data in Cloud. 183-198 - Weibin Wu

, Ying Wang
, Yangpan Zhang, Luyao Wang
, Lu Zhou:
Parallel Secure Inference for Multiple Models Based on CKKS. 199-213 - Rong Wang, Siyu Wang:

PrivRBFN: Building Privacy-Preserving Radial Basis Function Networks Based on Federated Learning. 214-227 - Puning Zhao, Jiafei Wu, Zhe Liu:

Robust Federated Learning with Realistic Corruption. 228-242
Network, Blockchain and Edge Computing
- Yixuan Lu, Yun Qu, Dongjie Zhu, Rui Zhang, Haiwen Du:

BTQoS: A Tenant Relationship-Aware QoS Framework for Multi-tenant Distributed Storage System. 245-260 - Yifan Wang

, Yu Tao
, Hao Wang
, Chunpeng Ge
, Lu Zhou
:
ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain. 261-277 - Xinwei Xu, Yongkang Yu, Jinchun He, Qinnan Zhang, Hongwei Zheng, Binghui Guo, Jin Dong, Wangjie Qiu:

MTEC: A Multi-tier Blockchain Storage Framework Using Erasure Coding for IoT Application. 278-293 - Qinglin Xie, Yingyan Li, Yuan Chai, Quan Chen, Fanlong Zhang, Yongchao Tao:

Maintaining Data Freshness in Multi-channel Multi-hop Wireless Networks. 294-308 - Meiqi Yang, Yu Tao, Xiaofei Wu, Chunpeng Ge, Lu Zhou:

Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps. 309-325 - Shaolong Zhou, Hanwen Zhang, Guoju Gao, Yu-e Sun, He Huang, Xiaoyu Wang, Yihuai Wang:

KTSketch: Finding k-Persistent t-Spread Flows in High-Speed Networks. 326-342 - Jining Chen, Linbo Liao, Yongxuan Lai, Liang Song, Fan Yang:

A Multi-Agent Service Migration Algorithm for Mobile Edge Computing with Diversified Services. 343-358 - Ran Bi, Weiye Si, Jiankang Ren, Xiaolin Fang, Yiwei Sun, Bingguo Chen:

Dynamic Computation Scheduling for Hybrid Energy Mobile Edge Computing Networks. 359-376
Anomaly Detection and Security
- Hui Liu, Ke Ji, Zhenxiang Chen, Kun Ma, Xiaofan Zhao:

Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features. 379-393 - Ziyi Wang

, Kui Zhao
:
Detecting Camouflaged Social Bots Through Multi-level Aggregation and Information Encoding. 394-410 - Zhiqiang Zhang, Jiajun Shan, Haiyan Wu, Yanhong Chen, Jinxun Jiang, Weijie Wang:

Deep Sarcasm Detection with Sememe and Syntax Knowledge. 411-431 - Qiang Ouyang, Nankai Lin, Yongmei Zhou, Aimin Yang, Dong Zhou

:
Enhancing Few-Shot Multi-modal Fake News Detection Through Adaptive Fusion. 432-447 - Hao Wang, Ye Wang, Zhaoquan Gu, Yan Jia:

AGAE: Unsupervised Anomaly Detection for Encrypted Malicious Traffic. 448-464 - Ziqi Yuan, Haoyi Zhou

, Qingyun Sun, Jianxin Li:
ColBetect: A Contrastive Learning Framework Featuring Dual Negative Samples for Anomaly Behavior Detection. 465-480 - Fei Ge, Ji Zhang, Zhen Wang, Yuqian Zhou, Zhao Li:

Magnitude-Contrastive Network for Unsupervised Graph Anomaly Detection. 481-493 - Shaojun Duan, Xinye Wang, Zhenyang Yu, Chengxin He, Zhaohang Luo, Song Deng, Lei Duan:

Substructure-Guided Graph-Level Anomaly Detection with Attention-Aware Aggregation. 494-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














