default search action
1st AIS&P 2023: Guangzhou, China - Part I
- Jaideep Vaidya, Moncef Gabbouj, Jin Li:
Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14509, Springer 2024, ISBN 978-981-99-9784-8 - Yawen Feng, Shengke Zeng, Jixiang Xiao, Shuai Cheng, Fengchun Zhang:
Fine-Grained Searchable Encryption Scheme Against Keyword Brute-Force Attacks. 1-15 - Jixiang Xiao, Shengke Zeng, Yawen Feng, Shuai Cheng:
Fine-Grained Authorized Secure Deduplication with Dynamic Policy. 16-32 - Wei Zhang, Weixuan Tang, Yuan Rao, Bin Li, Jiwu Huang:
Deep Multi-image Hiding with Random Key. 33-41 - Zixin Wang, Bing Mi, Kongyang Chen:
Member Inference Attacks in Federated Contrastive Learning. 42-52 - Si Yu, Xin Xie, Zhao Li, Wenbing Zhen, Tijian Cai:
A Network Traffic Anomaly Detection Method Based on Shapelet and KNN. 53-64 - Xunxun Pi, Junhang Qiu:
Multi-channel Deep Q-network Carrier Sense Multiple Access. 65-80 - Haochen Wang, Tianshi Mu, Guocong Feng, ShangBo Wu, Yuanzhang Li:
DFaP: Data Filtering and Purification Against Backdoor Attacks. 81-97 - Xingjiang Cheng, Fuxing Zhang, Yun Peng, Xianmin Wang, Teng Huang, Ziye Zhou, Duncan S. Wong, Changyu Dong:
A Survey of Privacy Preserving Subgraph Matching Methods. 98-113 - Wenchao Wang, Jing Qin, Jinlu Liu, Xi Zhang, Xinyi Hou, Zhongkai Wei:
The Analysis of Schnorr Multi-Signatures and the Application to AI. 114-130 - Weixuan Tang, Yadong Liu:
Active Defense Against Image Steganography. 131-141 - Teng Wang, Shuanggen Liu, Jiangguo Liang, Shuai Wang, Lu Wang, Junying Song:
Strict Differentially Private Support Vector Machines with Dimensionality Reduction. 142-155 - Zhihao Li, Qi Chen, Weichuan Mo, Xiaolin Wang, Li Hu, Yongzhi Cao:
Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight. 156-171 - Yongwei Lin, Yucheng Long, Zhili Zhou, Yan Pang, Chunsheng Yang:
Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions. 172-189 - Chong Shi, Jiahao Peng, Shuying Zhu, Xiaojun Ren:
From Passive Defense to Proactive Defence: Strategies and Technologies. 190-205 - Xiao Li, Xunxun Pi, Hong Tang, Junhang Qiu:
Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision. 206-220 - Weijia Li, Xunxun Pi, Hong Tang, Junhang Qiu:
Multimodal Fatigue Detection in Drivers via Physiological and Visual Signals. 221-236 - Le Wang, Haonan Yan, Xiaodong Lin, Pulei Xiong:
Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense. 237-252 - Pengyu Lu, Xianjia Meng, Ximeng Liu:
FedCMK: An Efficient Privacy-Preserving Federated Learning Framework. 253-271 - Weixuan Tang, Yingjie Xie:
An Embedded Cost Learning Framework Based on Cumulative Gradient Rewards. 272-282 - Yongjian Xue, Qian Wei, Xiaoliang Gong, Fan Wu, Yunqi Luo, Zhongning Chen:
An Assurance Case Practice of AI-Enabled Systems on Maritime Inspection. 283-299 - Enming Lu, Fei Peng:
Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification. 300-315 - Shuai Tang, Tianshi Mu, Jun Zheng, Yurong Fu, Quanxin Zhang, Jie Yang:
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse. 316-327 - Hengying Xiao, Yangyang Liu:
DZIP: A Data Deduplication-Compatible Enhanced Version of Gzip. 328-341 - Xi Zhang, Ye Su, Zhongkai Wei, Wenting Shen, Jing Qin:
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security. 342-357 - Rong Huang, Li Chen, Jun Zheng, Quanxin Zhang, Xiao Yu:
Adversarial Attacks Against Object Detection in Remote Sensing Images. 358-367 - Yujie Shao, Tian Chen, Ke Li, Lu Liu:
Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm. 368-381 - Ruozhou Zuo, Haibo Tian, Fangguo Zhang:
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF. 382-399 - Liang Xue, Xiaodong Lin, Pulei Xiong:
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication. 400-414 - Xie Kanqi, Luo Jun, Liao Bo Xun:
IoT-Inspired Education 4.0 Framework for Higher Education and Industry Needs. 415-429 - Mohammad Ashraf, Sima Hamedifar, Shichao Liu, Chunsheng Yang, Alanoud Alrasheedi:
Multi-agent Reinforcement Learning Based User-Centric Demand Response with Non-intrusive Load Monitoring. 430-445 - Heqiu Cai, Zhanao Zhang, Zhicong Yao, Kanghua Mo, Dixuan Chen, Hongyang Yan:
Decision Poisson: From Universal Gravitation to Offline Reinforcement Learning. 446-455 - Hui Yang, Ruilin Yang, Heqiu Cai, Xiao Zhang, Qingqi Pei, Shaowei Wang, Hongyang Yan:
SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised Learning. 456-467 - Ruilin Yang, Hui Yang, Jiluan Fan, Changyu Dong, Yan Pang, Duncan S. Wong, Shaowei Wang:
Personalized Differential Privacy in the Shuffle Model. 468-482 - Sihao Huang, Zhongxiang Liu, Jiafu Yu, Yongde Tang, Zidan Luo, Yuan Rao:
MKD: Mutual Knowledge Distillation for Membership Privacy Protection. 483-498 - Zhiwei Chang, Hanfeng Zhang, Yue Yang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm. 499-512 - Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng:
KEP: Keystroke Evoked Potential for EEG-Based User Authentication. 513-530 - Peiming Xu, Meiling Zheng, Lingling Xu:
Verifiable Secure Aggregation Protocol Under Federated Learning. 531-547 - Wei Xie, Wenmin Li, Huimin Zhang:
Electronic Voting Privacy Protection Scheme Based on Double Signature in Consortium Blockchain. 548-562 - Razy Youhana Adam, Weizhi Meng:
Securing 5G Positioning via Zero Trust Architecture. 563-578 - Ning Xu, Jiluan Fan, Zikai Wen:
Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility. 579-592
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.