


default search action
24th ICA3PP 2024: Macau, China - Part V
- Tianqing Zhu
, Jin Li
, Aniello Castiglione
:
Algorithms and Architectures for Parallel Processing - 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V. Lecture Notes in Computer Science 15255, Springer 2025, ISBN 978-981-96-1547-6 - Yueqin Ge
, Yali Gao
, Xiaoyong Li
, Binsi Cai
, Jinwen Xi
, Qiang Han, Yongxin Liang:
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning. 1-11 - Yinghao Tang, Jinbiao Lu, Xingkai Kang, Yuhang Li, Hongchen Guo:
Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks. 12-21 - Yangyang Guo, Tao Zhang
, Xutong Mu
, Haoshuo Li, Xuewen Dong
, Qi Li
:
FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy. 22-40 - Junying Zhang
, Yiwen Xia, Xindi Ma
, Qi Jiang
, Ning Xi
, Di Lu
, Pengbin Feng, Sheng Gao
, Jianfeng Ma
:
DP-CLMI:Differentially Private Contrastive Learning Against Membership Inference Attack. 41-60 - Shouyue Sun, Feng Wu, Yingzhi Zhang, Lei Cui, Longxiang Gao, Shui Yu:
DT-UPD: User Privacy Data Protection Through Distribution Transformation in Unlearning Cloud Service. 61-77 - Rongxi Wang, Guanxiong Ha
, Chunfu Jia
, Ruiqi Li
, Zhen Su
:
Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-Assisted Cloud Storage. 78-97 - Yukai Liu, Jizhe Jia, Jinhe Wu, Junyu Ai, Meng Shen, Liehuang Zhu:
Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis. 98-110 - Peng Yin, Jizhe Jia, Jing Wang, Yukai Liu, Meng Shen, Liehuang Zhu:
Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation. 111-126 - Zhiwei Zhang, Shuyu Chang, Haiping Huang, Rui Wang:
Optimizing Self-training Sample Selection for Euphemism Detection in Special Scenarios. 127-144 - Di Wang
, Wenjian Liu, Longxiang Gao, Y. Neil Qu, Hu Zhang, Jihong Shi:
Modal-Centric Insights Into Multimodal Federated Learning for Smart Healthcare: A Survey. 145-160 - Xiao Wang, Zhou Zhou, Hong Xu, Gangyong Jia, Yuxia Cheng, Qing Wu:
Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time. 161-180 - Ying Li, Chun Shan, Zhen Liu, Shuyan Liao:
A Comprehensive Review on Deep Learning System Testing. 181-191 - Zhen Lv
, Li Wang, Yingfan Liu
, Kankan Zhao
, Yanguo Peng
:
CIGraph: Accelerating Graph Queries over Database with Compressed Index. 192-202 - Ying Zhang, Yutong Gao
, Xuan Liu
, Lefeng Zhang
, Xianggan Liu, Shan Jiang
:
Language-Based Colorization with Sparse Attention and Multi-scale Cross-Modal Semantic Alignment. 203-218 - Aniello Castiglione
, Vincenzo Loia
, Alberto Volpe
:
A Power Monitoring Framework of a Post-quantum Cryptography Web Server. 219-232 - Dezhi Liu, Zhen Guo:
A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs. 233-243 - Bingze Li, Stella Ho
, Youyang Qu
, Chenhao Xu
, Tom H. Luan
, Longxiang Gao
:
Federated Meta Continual Learning for Efficient and Autonomous Edge Inference. 244-263 - Qiuji Zhou, Yongde Guo, Yifeng Liu, YanZhen Lin:
Progressive Multiscale Attention Network for Diabetic Retinopathy. 264-279 - Ruonan Lin, Yuanyuan Zhang
, Renwan Bi
, Ruihong Huang
, Jinbo Xiong
:
FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing. 280-289 - Long Zhao, Xin Chen, Libo Jiao, Mingyang Xu, Jiyuan Wei:
DRL-Based UAV Collaborative Task Offloading for Post-disaster Scenarios. 290-300 - Tianchen Guo, Heming Du, Huan Huo, Bo Liu
, Xin Yu
:
Who is Being Impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-Specific Features. 301-320 - Miaohua Zhuo, Dongjun Li, Qinglin Yang
, Yuan Zhou, Yuan Liu
, Zhihong Tian
:
Review of Incentive Mechanisms of Differential Privacy Based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives. 321-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.