


default search action
6th ML4CS 2024: Hangzhou, China
- Yang Xiang, Jian Shen:

Machine Learning for Cyber Security - 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024, Proceedings. Lecture Notes in Computer Science 15566, Springer 2025, ISBN 978-981-96-4565-7 - Jianfei Sun, Qiang Gao, Cong Wu, Yuxian Li, Jiacheng Wang

, Dusit Niyato:
Secure Resource Allocation via Constrained Deep Reinforcement Learning. 1-15 - Zongxiang Yi, Bo Li, Wanhui Zhang, Zhiqiang Lin, Lishan Ke:

Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. 16-42 - Mingdi Shen, Tianqi Zhou, Chen Wang, Shijia Hong:

A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. 43-55 - Shijia Hong, Tianqi Zhou, Huijie Yang, Mingdi Shen, Wenying Zheng:

Decentralized Continuous Group Key Agreement for UAV Ad-Hoc Network. 56-69 - Peng Zhang, Dongyan Qiu, Ao Duan, Hongwei Liu:

Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. 70-80 - Xiaozhi Deng, Qinqin Wu, Yi Tang, Yongbao Wang:

Blockchain-Aided Revocable Threshold Group Signature Scheme for the Smart Grid. 81-89 - Guojun Wang, Guixin Jiang, Yushuai Zhao, Yinglin Ji:

Privacy-Preserving Three-Factors Authentication and Key Agreement for Federated Learning. 90-103 - Mingliang Wang, Haowen Tan, Wenying Zheng:

Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. 104-117 - Haiyan Yu, Qingru Ma, Yilu Zhu, Yuxin Cui

:
Multi-keyword Searchable Data Auditing for Cloud-Based Machine Learning. 118-132 - Jingang Li, Zhaoyi Liu, Huijie Yang, Tianqi Zhou, Wenying Zheng:

A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-server Learning. 133-147 - Shigang Liu

, Lin Li
, Xinbo Ban, Chao Chen, Jun Zhang, Seyit Camtepe, Yang Xiang:
Automatic Software Vulnerability Detection in Binary Code. 148-166 - Jinzhihao Zhang, Jia Yang, Weiqi Zhou:

Malicious Code Detection Based on Generative Adversarial Model. 167-183 - Huimin Gong

, Zongliang Shen, Hua Zhang, Lei Qiao, Huawei Wang, Chi Zhang:
Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. 184-196 - Zhenghua Cai, Yongji Wang, Hua Zhang, Lei Qiao, Huawei Wang, Chi Zhang:

Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. 197-214 - Qianshi Wang, Chongjun Xu, Huayu Yang, Xilin Zhai, Hua Zhang:

A Malicious Websites Classifier Based on an Improved Relation Network. 215-230 - Leiming Yan, Tao Zhou, Xianyi Chen:

Unknown Category Malicious Traffic Detection Based on Contrastive Learning. 231-245 - Dixuan Chen, Hongyang Yan, Jiatong Lin, Fan Chen, Yu Cheng:

SoftPromptAttack: Advancing Backdoor Attacks in Language Models Through Prompt Learning Paradigms. 246-257 - Wei Wu

, Chen Wang
, Qiuhao Xu, Wei Kong
:
Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. 258-270 - Nan Li, Zhaojian Gao, Jiabin Ye, Wei Tang, Xun Che, Yadang Chen:

A Novel and Efficient Multi-scale Spatio-Temporal Residual Network for Multi-class Intrusion Detection. 271-283 - Yuluo Zeng, Xinlei Sheng, Kai Zhao, Suliu Yang:

Provable Data Auditing Scheme from Trusted Execution Environment. 284-298 - Haoyao Xu, Yitong Li, Haibo Tian:

Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints. 299-315 - Yiting Pan, Xuefeng Zhang:

A Two-Stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. 316-331 - Kun Li, Hongyang Yan, Jiatong Lin, Fan Chen, Yu Cheng, Dongyang Liang:

GAN-Based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. 332-346 - Wenzhang Dai, Le Sun

:
Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. 347-361 - Jinming Huang, Jin Wang, Shengyang Gao, Zilong Jin:

A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. 362-376 - Xin Zhang, Chi Zhang, Shuyan Liu, Zilong Jin:

A Vehicles Scheduling Algorithm Based on Clustering Based Federated Learning. 377-391 - Chun Yang, Guoqing Xu, Liang Ma, Zilong Jin:

A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. 392-407 - Jian Su, Chang Yang, Jian Zhang:

YOLO-LiteMax: An Improved Model for UAV Small Object Detection. 408-422 - Cui Yun, Lei Zhou, Shuangshuang Xing, Ning Yang, Pan Zhao, Zhiguo Chen:

LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. 423-437 - Weizhe Tu, Zheng Dong, Tao Zhang, Wenying Zheng:

Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval. 438-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














