


default search action
24th ICA3PP 2024: Macau, China - Part IV
- Tianqing Zhu

, Jin Li
, Aniello Castiglione
:
Algorithms and Architectures for Parallel Processing - 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 15254, Springer 2025, ISBN 978-981-96-1544-5 - Teng Wu

, Ying He
, Shengjun Wei
, Changzhen Hu:
SMP-NoC: A Flexible and Efficient Shared Memory Protection Unit on Network-on-Chip. 1-11 - Yamei Wang, Yuexin Zhang

, Weijing You
, Yunru Ma, Derui Wang
:
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing. 12-21 - Tong Lei

, Zongjing Chen
, Yonggang Che
, Chuanfu Xu
:
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework. 22-39 - Ziming Chen, Quan Deng

, Yiyue Hu, Xiaowei He, Libo Huang, Yongwen Wang:
SSC: An SRAM-Based Silence Computing Design for On-chip Memory. 40-59 - Shunliang Ye, Qi Chen, Fuan Xiao, Zhihui Ke, Guoyu Yang, Huawei Ma:

TP-BFT: A Faster Asynchronous BFT Consensus with Parallel Structure. 60-79 - Mengjin Li, Hongwei Zhou:

LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses. 80-99 - Haolin Jiang, Chenxi Zhu, Ding Deng, Shengqiang Lou, Pengyue Sun, Lei Chen:

A Neural Network-Based PUF Protection Method Against Machine Learning Attack. 100-113 - Yongxiang Cao

, Jixiang Jiang, Guocheng Zhao, Wei Wang, Hongxu Jiang
, Yanfei Song
:
Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs. 114-133 - Zhijian Xu

, Zhiwei Zhang
, Guiyuan Tang, Ziwei Shi, Yulong Shen
, Ning Xi
:
Multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments. 134-153 - Yangzhi Hou, Ying Yang:

Invisible Backdoor Attack with Image Contours Triggers. 154-171 - Hangkit Choi, Junxuan Liao, Yuming Xiong, Yili Gong, Chuang Hu, Dazhao Cheng:

Finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense. 172-192 - Fanyu Kong

, Xiangyun Tang
, Yu Weng
, Tao Zhang
, Hongyang Du
, Jiawen Kang
, Chi Liu
:
DIsFU: Protecting Innocent Clients in Federated Unlearning. 193-207 - Jiao Zhang, Xiong Li

, Wei Liang
:
Multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning. 208-227 - Yizhe Xie, Congcong Zhu

, Xinyue Zhang, Xiangyu Hu
, Xuan Liu
:
Dynamic Privacy Protection with Large Language Model in Social Networks. 228-248 - Zekun Zou, Ruirui Gao, Xiong Li, Xiaofen Wang, Xiaosong Zhang:

A Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries. 249-269 - Xinyu Liu

, Wei Ren
, Wenmao Liu
, Xianghan Zheng
:
A Data Watermark Scheme Base on Data Converted Bitmap for Data Trading. 270-289 - Junhong Wu, Yalan Wu, Jiale Huang, Jigang Wu:

Distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks. 290-299 - Baohai Wang, Youyang Qu

, Longxiang Gao, Conggai Li
, Lin Li
, David B. Smith:
Mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation. 300-314 - Runjie Yang, Yongde Guo

, Jun Yan, Haonan Yang, Zifeng Dai:
AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection. 315-325 - Tao Liu, Xuhao Ren, Yajie Wang, Huishu Wu, Chuan Zhang:

Efficient and Privacy-Preserving Ranking-Based Federated Learning. 326-336 - Yepeng Ding

, Junwei Yu
, Hiroyuki Sato
, Tohru Kondo
, Yan Bai
:
On-Chain Dynamic Policy Evaluation for Decentralized Access Control. 337-346 - Yichen Guo, Xinyi Sheng

, Wei Bao
, Bing Bing Zhou
:
DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning. 347-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














