


default search action
6th ML4CS 2024: Hangzhou, China
- Yang Xiang, Jian Shen:
Machine Learning for Cyber Security - 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024, Proceedings. Lecture Notes in Computer Science 15566, Springer 2025, ISBN 978-981-96-4565-7 - Jianfei Sun, Qiang Gao, Cong Wu, Yuxian Li, Jiacheng Wang, Dusit Niyato:
Secure Resource Allocation via Constrained Deep Reinforcement Learning. 1-15 - Zongxiang Yi, Bo Li, Wanhui Zhang, Zhiqiang Lin, Lishan Ke:
Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. 16-42 - Mingdi Shen, Tianqi Zhou, Chen Wang, Shijia Hong:
A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. 43-55 - Shijia Hong, Tianqi Zhou, Huijie Yang, Mingdi Shen, Wenying Zheng:
Decentralized Continuous Group Key Agreement for UAV Ad-Hoc Network. 56-69 - Peng Zhang, Dongyan Qiu, Ao Duan, Hongwei Liu:
Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. 70-80 - Xiaozhi Deng, Qinqin Wu, Yi Tang, Yongbao Wang:
Blockchain-Aided Revocable Threshold Group Signature Scheme for the Smart Grid. 81-89 - Guojun Wang, Guixin Jiang, Yushuai Zhao, Yinglin Ji:
Privacy-Preserving Three-Factors Authentication and Key Agreement for Federated Learning. 90-103 - Mingliang Wang, Haowen Tan, Wenying Zheng:
Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. 104-117 - Haiyan Yu, Qingru Ma, Yilu Zhu, Yuxin Cui:
Multi-keyword Searchable Data Auditing for Cloud-Based Machine Learning. 118-132 - Jingang Li, Zhaoyi Liu, Huijie Yang, Tianqi Zhou, Wenying Zheng:
A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-server Learning. 133-147 - Shigang Liu
, Lin Li
, Xinbo Ban, Chao Chen, Jun Zhang, Seyit Camtepe, Yang Xiang:
Automatic Software Vulnerability Detection in Binary Code. 148-166 - Jinzhihao Zhang, Jia Yang, Weiqi Zhou:
Malicious Code Detection Based on Generative Adversarial Model. 167-183 - Huimin Gong, Zongliang Shen, Hua Zhang, Lei Qiao, Huawei Wang, Chi Zhang:
Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. 184-196 - Zhenghua Cai, Yongji Wang, Hua Zhang, Lei Qiao, Huawei Wang, Chi Zhang:
Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. 197-214 - Qianshi Wang, Chongjun Xu, Huayu Yang, Xilin Zhai, Hua Zhang:
A Malicious Websites Classifier Based on an Improved Relation Network. 215-230 - Leiming Yan, Tao Zhou, Xianyi Chen:
Unknown Category Malicious Traffic Detection Based on Contrastive Learning. 231-245 - Dixuan Chen, Hongyang Yan, Jiatong Lin, Fan Chen, Yu Cheng:
SoftPromptAttack: Advancing Backdoor Attacks in Language Models Through Prompt Learning Paradigms. 246-257 - Wei Wu
, Chen Wang
, Qiuhao Xu, Wei Kong
:
Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. 258-270 - Nan Li, Zhaojian Gao, Jiabin Ye, Wei Tang, Xun Che, Yadang Chen:
A Novel and Efficient Multi-scale Spatio-Temporal Residual Network for Multi-class Intrusion Detection. 271-283 - Yuluo Zeng, Xinlei Sheng, Kai Zhao, Suliu Yang:
Provable Data Auditing Scheme from Trusted Execution Environment. 284-298 - Haoyao Xu, Yitong Li, Haibo Tian:
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints. 299-315 - Yiting Pan, Xuefeng Zhang:
A Two-Stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. 316-331 - Kun Li, Hongyang Yan, Jiatong Lin, Fan Chen, Yu Cheng, Dongyang Liang:
GAN-Based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. 332-346 - Wenzhang Dai, Le Sun
:
Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. 347-361 - Jinming Huang, Jin Wang, Shengyang Gao, Zilong Jin:
A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. 362-376 - Xin Zhang, Chi Zhang, Shuyan Liu, Zilong Jin:
A Vehicles Scheduling Algorithm Based on Clustering Based Federated Learning. 377-391 - Chun Yang, Guoqing Xu, Liang Ma, Zilong Jin:
A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. 392-407 - Jian Su, Chang Yang, Jian Zhang:
YOLO-LiteMax: An Improved Model for UAV Small Object Detection. 408-422 - Cui Yun, Lei Zhou, Shuangshuang Xing, Ning Yang, Pan Zhao, Zhiguo Chen:
LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. 423-437 - Weizhe Tu, Zheng Dong, Tao Zhang, Wenying Zheng:
Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval. 438-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.