


default search action
24th ICA3PP 2024: Macau, China - Part V
- Tianqing Zhu

, Jin Li
, Aniello Castiglione
:
Algorithms and Architectures for Parallel Processing - 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V. Lecture Notes in Computer Science 15255, Springer 2025, ISBN 978-981-96-1547-6 - Yueqin Ge

, Yali Gao
, Xiaoyong Li
, Binsi Cai
, Jinwen Xi
, Qiang Han, Yongxin Liang:
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning. 1-11 - Yinghao Tang, Jinbiao Lu, Xingkai Kang, Yuhang Li, Hongchen Guo:

Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks. 12-21 - Yangyang Guo, Tao Zhang

, Xutong Mu
, Haoshuo Li, Xuewen Dong
, Qi Li
:
FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy. 22-40 - Junying Zhang

, Yiwen Xia, Xindi Ma
, Qi Jiang
, Ning Xi
, Di Lu
, Pengbin Feng, Sheng Gao
, Jianfeng Ma
:
DP-CLMI:Differentially Private Contrastive Learning Against Membership Inference Attack. 41-60 - Shouyue Sun, Feng Wu, Yingzhi Zhang, Lei Cui, Longxiang Gao, Shui Yu:

DT-UPD: User Privacy Data Protection Through Distribution Transformation in Unlearning Cloud Service. 61-77 - Rongxi Wang, Guanxiong Ha

, Chunfu Jia
, Ruiqi Li
, Zhen Su
:
Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-Assisted Cloud Storage. 78-97 - Yukai Liu, Jizhe Jia, Jinhe Wu, Junyu Ai, Meng Shen, Liehuang Zhu:

Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis. 98-110 - Peng Yin, Jizhe Jia, Jing Wang, Yukai Liu, Meng Shen, Liehuang Zhu:

Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation. 111-126 - Zhiwei Zhang, Shuyu Chang, Haiping Huang, Rui Wang:

Optimizing Self-training Sample Selection for Euphemism Detection in Special Scenarios. 127-144 - Di Wang

, Wenjian Liu, Longxiang Gao, Y. Neil Qu, Hu Zhang, Jihong Shi:
Modal-Centric Insights Into Multimodal Federated Learning for Smart Healthcare: A Survey. 145-160 - Xiao Wang, Zhou Zhou, Hong Xu, Gangyong Jia, Yuxia Cheng, Qing Wu:

Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time. 161-180 - Ying Li, Chun Shan, Zhen Liu, Shuyan Liao:

A Comprehensive Review on Deep Learning System Testing. 181-191 - Zhen Lv

, Li Wang, Yingfan Liu
, Kankan Zhao
, Yanguo Peng
:
CIGraph: Accelerating Graph Queries over Database with Compressed Index. 192-202 - Ying Zhang, Yutong Gao

, Xuan Liu
, Lefeng Zhang
, Xianggan Liu, Shan Jiang
:
Language-Based Colorization with Sparse Attention and Multi-scale Cross-Modal Semantic Alignment. 203-218 - Aniello Castiglione

, Vincenzo Loia
, Alberto Volpe
:
A Power Monitoring Framework of a Post-quantum Cryptography Web Server. 219-232 - Dezhi Liu, Zhen Guo:

A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs. 233-243 - Bingze Li, Stella Ho

, Youyang Qu
, Chenhao Xu
, Tom H. Luan
, Longxiang Gao
:
Federated Meta Continual Learning for Efficient and Autonomous Edge Inference. 244-263 - Qiuji Zhou, Yongde Guo

, Yifeng Liu, YanZhen Lin:
Progressive Multiscale Attention Network for Diabetic Retinopathy. 264-279 - Ruonan Lin, Yuanyuan Zhang

, Renwan Bi
, Ruihong Huang
, Jinbo Xiong
:
FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing. 280-289 - Long Zhao, Xin Chen, Libo Jiao, Mingyang Xu, Jiyuan Wei:

DRL-Based UAV Collaborative Task Offloading for Post-disaster Scenarios. 290-300 - Tianchen Guo, Heming Du, Huan Huo, Bo Liu

, Xin Yu
:
Who is Being Impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-Specific Features. 301-320 - Miaohua Zhuo, Dongjun Li

, Qinglin Yang
, Yuan Zhou, Yuan Liu
, Zhihong Tian
:
Review of Incentive Mechanisms of Differential Privacy Based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives. 321-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














