List of Accepted Papers

# Title Authors
1 Fake News Detection across Multiple Domains Using Fuzzy Association Rules Xiaofeng Xu, Weisha Zhang, Yuanyuan Huang, Hongyu Lu and Jiazhong Lu
2 Meta Unlearning Zijie Pan, Zuobin Ying, Enmin Zhu and Yajie Wang
3 Updates Leakage Attack against Private Graph Split Learning Hao Yang, Zhuo Ma, Yang Liu, Xinjing Liu, Beiwei Yang and Jianfeng Ma
4 SteDM: Efficient Image Steganography With Diffusion Models Changguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao and Fangwei Wang
5 Toward a QoS-Guaranteed Cloud through Elastic Resource Scaling and Request Updating Bingchen Shen, Jiawei Liu, Gongming Zhao, Hongli Xu and Jianfeng Bao
8 A Dual Detection System of Common Anomalies in FANETs Xueru Du, Yueheng Liu, Di Wang, Junqiao Gao and Yue Cao
10 A scheme of dynamic location privacy-preserving with blockchain in intelligent transportation system Xuhan Zuo, Minghao Wang, Dayong Ye and Shui Yu
13 DBFIA: Diffusion-Based Face Image Anonymization Hanyu Xue, Xin Yuan, Bo Liu and Ming Ding
14 Incremental Board Learning System Based on Feature Selection Yi Xu, Huaiding Qu, Yin Liu and Zhengyue Pan
15 High-Capacity Image Hiding via Compressible Invertible Neural Network Changguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao and Fangwei Wang
17 SMP-NoC: A Flexible and Efficient Shared Memory Protection Unit on Network-on-Chip Teng Wu, Ying He, Shengjun Wei and Changzhen Hu
20 Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data Bin Xie, Jiahao Zhang, Yuling Li, Yusong Li and Xinyu Dong
21 Secure and Revocable Multi-authority CP-ABE for Mobile Cloud Computing Junyang Li, Hongyang Yan, Arthur Sandor Voundi Koe, Weichu Deng and Zhengxi Zhong
22 A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption Jiazheng Quan, Niefeng Wu, Hu Chen, Yamei Wang and Yuexin Zhang
23 A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing Yamei Wang, Yuexin Zhang, Weijing You, Yunru Ma and Derek Wang
25 Software Crowdsourcing Allocation Algorithm Based on Task Priority Ao Mei and Dunhui Yu
29 V-Sketch: A Sketch-based Verification Mechanism for Logical-Physical Rule Consistency in SDN Kejian Li, Yang Du, Guoju Gao, He Huang and Yu-E Sun
30 Resource Management for GPT-based Model  Deployed on Clouds:  Challenges, Solutions, and Future Directions Yongkang Dang, Yiyuan He, Minxian Xu and Kejiang Ye
31 PFDF: Privacy Preserving Federated Decision Forest for Classification Tongyaqi Li, Qingqiang Qi, Chengyu Hu, Xuelei Li, Peng Tang and Shanqing Guo
34 Data-Free Encoder Stealing Attack in Self-supervised Learning Chuan Zhang, Xuhao Ren, Haotian Liang, Qing Fan, Xiangyun Tang, Chunhai Li, Liehuang Zhu and Yajie Wang
36 Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks Zihui Zhou, Yutong Gao and Minfeng Qi
37 A Mini-Model Can Make Machine Unlearning Better Mingkang Zhao, Weng Yu and Congcong Zhu
40 BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection Zehui Wu, Yuwei Xu, Ranfeng Huang, Xinhe Fan, Jingdong Xu and Guang Cheng
43 Dynamic Offloading Control for Waste Sorting Based on Deep Q-Network Jing Wang, Xiaoyang Wang, Jianxiong Guo, Zhiqing Tang, Xingjian Ding and Tian Wang
44 A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT Changsong Yang, Junfu Wu, Yong Ding, Yujue Wang and Hai Liang
45 Hybridization of One- and Two-point Bandits Convex Optimization in Non-stationary Environments Gailun Zeng and Jianxiong Guo
47 An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning Yueqin Ge, Binsi Cai, Yali Gao, Xiaoyong Li, Jinwen Xi, Qiang Han and Yongxin Liang
51 Pessimistic Fault Diagnosis Algorithm for Hypercube-Like Networks Under the BGM Model Lin Chen, Hao Feng, Jiong Wu and Huirui Han
52 A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions Hai Liu, Fangqiong Li and Hongye Peng
53 AutoMiner: Reinforcement Learning-Based Mining Attack Simulator Wei Li, Lide Xue, Ziyang Han, Bingren Chen, Xishan Zhang and Xuehai Zhou
55 Style-specific Music Generation From Image Chang Xu, Xuan Liu, Yu Weng, Shan Jiang, Xiangyun Tang and Minfeng Qi
56 Multimodal Summarization with Modality-Aware Fusion and Summarization Ranking Xuming Ye, Chaomurilige Wang, Zheng Liu, Haoyu Luo, Jun Dong and Yingzhe Luo
58 Enhancing Text-Image Person Re-identification via Intra-Class Relevance Learning Wenbin He, Yutong Gao, Wenjian Liu, Chaomurilige Wang, Zheng Liu and Ao Guo
59 Research on Tropical Cyclone Tracks Classification Methods and Feature Analysis in the Western Northern Pacific Nan Xu, Baisong Yang, Jiangyong Jin, Lihao Deng and Jia Ren
61 BDFC:A New Flow Control Mechanism for Torus Networks Youmeng Li, Haofei Zhang, Yu Deng and Qi Fang
63 FEDNPAIT: Federated Learning with NADAM and PADAM for Instruction Tuning Zhipeng Gao, Yichen Li and Xinlei Yu
64 Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks Yinghao Tang, Jinbiao Lu, Xingkai Kang, Yuhang Li and Hongchen Guo
66 MARO: Enabling Full MPI Automatic Refactoring in DSL-based Programming Framework Tong Lei, Zongjing Chen, Yonggang Che and Chuanfu Xu
67 FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu and Yongjun Wang
69 Coordinated Multi-regional Logistics Path Planning: A Broad Reinforcement Learning Framework Shengwei Li, Congcong Zhu and Zeping Tong
70 A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning Xiang Wu, Aiting Yao, Shantanu Pal, Frank Jiang, Xuejun Li, Jia Xu, Chengzu Dong, Xuefei Chen, Xiuyi Zhang and Xiao Liu
71 Path Optimization Method Under UAV Charging Scheduling Network Tingting Yang, Yiqian Wang, Jie Zhu, Shuyu Chang and Haiping Huang
73 Cross-Modal Mask and Detail Alignment for Text-based Person Retrieval Ao Guo, Xuan Liu, Xianggan Liu, Bingmeng Hu, Jie Yuan and Chiawei Chu
74 PrivARM: Privacy-preserving Association Rule Mining in the Cloud Yuxin Zhang, Hui Han, Guangliang Sun, Wei Wu and Lin Liu
75 Outliers are Real: Detecting VLM-generated Images via One-class Classification Baoping Liu, Bo Liu and Ming Ding
78 FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy Yangyang Guo, Tao Zhang, Xutong Mu, Haoshuo Li, Xuewen Dong and Qi Li
79 DP-CLMI:Differentially Private Contrastive Learning against Membership Inference Attack Yiwen Xia, Junying Zhang, Xindi Ma, Qi Jiang, Ning Xi, Di Lu, Pengbin Feng, Sheng Gao and Jianfeng Ma
83 DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service Shouyue Sun, Feng Wu, Yingzhi Zhang, Lei Cui, Longxiang Gao and Shui Yu
85 Deduplication and approximate analytics for encrypted IoT data in fog-assisted cloud storage Rongxi Wang, Guanxiong Ha, Chunfu Jia, Ruiqi Li and Zhen Su
88 Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis Yukai Liu, Jizhe Jia, Jinhe Wu, Junyu Ai, Meng Shen and Liehuang Zhu
89 MARL-DCF: A dual-channel fusion routing algorithm based on multi-agent reinforcement learning Zhenyu Li, Runyuan Sun, Zhifeng Liang, Bo Liu and Zhenxiang Sun
90 DataJudge: Cross-chain Data Consistency Verification Based on Extended Merkle Hash Tree Yuwei Xu, Junyu Zeng, Jie Cao, Shengjiang Dai, Qiao Xiang and Guang Cheng
91 Prototype enhancement for few-shot point cloud semantic segmentation Zhengyao Li, Gengshen Wu and Yi Liu
92 Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation Peng Yin, Jizhe Jia, Jing Wang, Yukai Liu, Meng Shen and Liehuang Zhu
96 Towards Information Sharing Beetle Antennae Search Optimization Xuan Liu, Chenyan Wang, Wenjian Liu, Lefeng Zhang, Xianggan Liu and Yutong Gao
99 SSC: An SRAM-based Silence Computing Design for On-chip Memory Ziming Chen, Quan Deng, Yiyue Hu, Xiaowei He, Libo Huang and Yongwen Wang
100 TP-BFT: A Faster Asynchronous BFT Consensus with Parallel Structure Shunliang Ye, Qi Chen, Jin Li, Zhihui Ke and Guoyu Yang
101 A Hybrid Vectorized Merge Sort on ARM NEON Jincheng Zhou, Jin Zhang, Xiang Zhang, Tiaojie Xiao, Di Ma and Chunye Gong
103 Time-of-Use Pricing Aware Battery Swapping Station Charging Scheduling via Deep Reinforcement Learning Hao Chen, Chengyi Gu, Desheng Wan, Bincan Yu and Chaocan Xiang
107 LTP: a lightweight on-chip temporary prefetcher for Data-dependent memory accesses Li Mengjin and Zhou Hongwei
110 Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios Zhiwei Zhang, Shuyu Chang, Haiping Huang and Rui Wang
111 A Neural Network-Based PUF Protection Method Against Machine Learning Attack Haolin Jiang, Ding Deng and Shaojie Ni
113 Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey Di Wang, Youyang Qu, Wenjian Liu and Longxiang Gao
114 ORL-EPM: A Profit-Aware and Load-Driven Heterogeneous Resource Management Scheme with Collaborative Edge Computing Fengyi Huang, Yutao Zhang, Wenhua Wang, Jianxiong Guo, Yang Xu, Wentao Fan and Tian Wang
115 Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs Yongxiang Cao, Jixiang Jiang, Guocheng Zhao, Wei Wang, Hongxu Jiang and Yanfei Song
116 Multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments Zhijian Xu, Zhiwei Zhang, Guiyuan Tang, Ziwei Shi, Yulong Shen and Ning Xi
117 AQC: Achieving Precise Bandwidth Allocation with Augmented Queues for Credit-based Proactive Congestion Control Zihan Li, Yani Gong, Dinghuang Hu, Guoyuan Yuan, Cunlu Li and Dezun Dong
126 Invisible Backdoor Attack with Image Contours Triggers Yangzhi Hou and Ying Yang
127 A Cost-Effective Data Placement Strategy based on Battle Royale Optimization in Multi-Cloud Edge Environments Sen Zhang, Lili Xiao, Xin Luo, Zhaohui Zhang and Pengwei Wang
129 Finestra: Multi-Aggregator Swarm Learning for Gradient Leakage Defense Hangkit Choi, Junxuan Liao, Yuming Xiong, Yili Gong, Chuang Hu and Dazhao Cheng
130 A Multi-Holder Role and Strange Attractor-Based Data Possession Proof in Medical Clouds Guo Jin Yuan, Sun Lijuan, Wu Jingchen, Chu Chiawei and Gao Yutong
132 ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization Yuwei Xu, Shengjiang Dai, Junyu Zeng, Jie Cao, Ran He and Qiao Xiang
133 Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time Xiao Wang, Zhou Zhou, Hong Xu, Gangyong Jia, Yuxia Cheng and Qing Wu
134 DIsFU: Protecting Innocent Clients in Federated Unlearning Fanyu Kong, Xiangyun Tang, Yu Weng, Tao Zhang, Hongyang Du, Jiawen Kang and Chi Liu
135 TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting Yuquan Chu, Peng Liu, Jin Fan, Haocheng Ye and Tianfan Jiang
136 An Autoencoder-based Framework for Data Privacy Protection Machine Learning Jiayun Wu, Wei Ren and Xianchao Zhang
138 Multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning Jiao Zhang, Xiong Li and Wei Liang
145 Parallel Implementation of Number-Theoretic Transform on GPU Clusters Daisuke Takahashi
149 Load Balancing Optimizations for Distributed GMRES Algorithm Yuxiang Zhang, Shuaizhe Guo, Jianhua Gao, Weixing Ji and Yizhuo Wang
150 Temperature-Based Watermarking and Detection for Large Language Models Weitong Chen, Zhenxin Zhang, Huali Ren, Pei-Gen Ye, Zhengdao Li and Shanshan Huang
151 Dynamic Privacy Protection with Large Language Model in Social Networks Yizhe Xie, Congcong Zhu, Xinyue Zhang, Xiangyu Hu and Xuan Liu
154 SwinMixer Detector: A two-level traffic flow detection system based on Swin Transformer and MLP-Mixer Lu Lu, Menghao Fang, Xia Li, Minghui Li, Tianwei Lei and Zixiao Kong
158 A Comprehensive Review on Deep Learning System Testing Ying Li, Chun Shan, Zhen Liu and Shuyan Liao
163 A Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries} \titlerunning{A DSSE Scheme for Rapid Conjunctive Queries Zekun Zou, Ruirui Gao, Xiong Li, Xiaofen Wang and Xiaosong Zhang
164 CIGraph: Accelerating graph queries over database with compressed index Zhen Lv, Li Wang, Yingfan Liu, Kankan Zhao and Yanguo Peng
166 A Data Watermark Scheme base on Data Converted Bitmap for Data Trading Xinyu Liu, Wei Ren and Wenmao Liu
167 Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment Ying Zhang, Yutong Gao, Xuan Liu, Lefeng Zhang, Xianggan Liu and Shan Jiang
169 BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT Yao Huang, Zhongyuan Yu, Guijuan Wang, Baobao Chai, Hongliang Zhang and Jiguo Yu
170 Distributed Incentive Algorithm for Fine-gained Offloading in Vehicular Ad Hoc Networks Junhong Wu, Jigang Wu, Yalan Wu and Jiale Huang
171 Blockchain-assisted anonymous data sharing scheme with full accountability for CloudIoT Chuntang Yu, Xia Feng and Yongzhao Zhan
173 CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy Axin Xiang, Youliang Tian, Jinbo Xiong, Zuobin Ying and Changgen Peng
177 Mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation Baohai Wang, Youyang Qu, Longxiang Gao, Conggai Li, Lin Li and David Smith
178 A Power Monitoring Framework of a Post-Quantum Cryptography Web Server Aniello Castiglione, Vincenzo Loia and Alberto Volpe
179 MSA2 : An Efficient Sparsity-Aware Accelerator for Matrix Multiplication with Multi-core Systolic Arrays Minjin Tang, Mei Wen, Junzhong Shen, Jingkui Yang, Zeyu Xue and Zili Shao
180 A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs Dezhi Liu and Zhen Guo
181 AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection Run Jie Yang, Yong De Guo, Jun Yan, Hao Nan Yang and Zi Feng Dai
182 Accelerating Mini-batch HGNN Training by Reducing CUDA Kernels Meng Wu, Jingkai Qiu, Mingyu Yan, Wenming Li, Yang Zhang, Zhimin Zhang, Xiaochun Ye and Dongrui Fan
183 Anycast Routing for Unmanned Aerial Vehicle Networks with Multiple Base-stations Yuhong Xiang, Shuai Gao, Hongchao Wang, Dong Yang and Hongke Zhang
184 Exploring RAPL as a power capping leverage for power and energy constrained infrastructures and applications Vladimir Ostapenco, Laurent Lefèvre, Anne-Cécile Orgerie and Benjamin Fichel
186 A Secure Cross-account Audit Scheme for Cross-chain Transactions Haotian Deng, Zihao Wang, Yajie Wang, Licheng Wang, Liehuang Zhu and Chuan Zhang
187 ZKCross: An Efficient and Reliable Cross-chain Authentication Scheme Based on Lightweight Attribute-based Zero-knowledge Proof Yuwei Xu, Hailang Cai, Jialuo Chen, Qiao Xiang, Jingdong Xu and Guang Cheng
188 LSSMR-SpMM: A Long Row Splitting and Short Row Merging Reordering Approach for Parallel SpMM on Pezy-SC3s Ligang Cao, Qinglin Wang, Shun Yang, Rui Xia, Weihao Guo and Jie Liu
198 Federated Meta Continual Learning for Efficient and Autonomous Edge Inference Bingze Li, Stella Ho, Youyang Qu, Chenhao Xu, Tom H. Luan and Longxiang Gao
203 MC-infer: Zero-knowledge and Real-data-free Model Inference Attack in DLaaS Feng Wu and Lei Cui
204 Certificate-based Transport Layer Security encrypted malicious traffic detection in real-time network environments Suo Yiran, Xue Jingfeng, Guo Wenjie, Du Wenbiao, Han Weijie and Xu Chang
207 Defense Against Textual Backdoors via Elastic Weighted Consolidation-based Machine Unlearning Haojun Xuan, Yajie Wang, Huishu Wu, Tao Liu, Chuan Zhang and Liehuang Zhu
209 Efficient and Privacy-preserving Ranking-based Federated Learning Tao Liu, Xuhao Ren, Yajie Wang, Huishu Wu and Chuan Zhang
213 Cross-Chain Transaction Auditing with Truth Discovery Huishu Wu, Xuhao Ren, Mengxuan Liu, Tao Liu, Yajie Wang, Chuan Zhang and Liehuang Zhu
215 Exploring the Vulnerability of ECG-based Authentication Systems through A Dictionary Attack Approach Bonan Zhang, Chao Chen, Ickjai Lee, Kyungmi Lee and Kok-Leong Ong
217 LBVP: Lightweight Blockchain-based Vehicle Platooning Scheme for Secure and Efficient Platoon Management Wenjie Fan, Zhiquan Liu, Libo Wang, Ying He, Jingjing Guo, Xia Feng and Jianfeng Ma
219 Enhancing Delay-Sensitive Task Offloading: A Multi-Agent Deep Reinforcement Learning Approach for MEC-based AIoT Systems Fengjie Tang, Jia Xu, Xiao Liu, Aiting Yao, Mingyan Fang and Xuejun Li
226 Progressive Multiscale Attention Network for Diabetic Retinopathy Qiuji Zhou, Yongde Guo, Yifeng Liu and Yanzhen Lin
229 Low-Carbon Geographically Distributed Cloud-Edge Task Scheduling Yingjie Zhu, Ji Qi, Zehao Wang, Shengjie Wei, Yan Chen, Tuo Cao, Gangyi Luo and Zhuzhong Qian
232 MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness Yuhang Li, Mei Wen, Junzhong Shen, Zhaoyun Chen and Yang Shi
233 Integrating Blockchain, Smart Contracts, NFTs, and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa Supply Chains Khanh Hong Vo Hong Vo, Triet Nguyen Minh, Son Ha Xuan, Bang Le, Kha Nguyễn, Hung Nhat Nguyen, Vinh Thanh Nguyen and Minh Van Nguyen
235 On-Chain Dynamic Policy Evaluation for Decentralized Access Control Yepeng Ding, Junwei Yu, Hiroyuki Sato, Tohru Kondo and Yan Bai
236 FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing Ruonan Lin, Yuanyuan Zhang, Renwan Bi, Ruihong Huang and Jinbo Xiong
238 The Role of Artificial Intelligence Technologies in Sustainable Urban Development: A Systematic Survey Maria Rosaria Sessa, Ornella Malandrino and Antonio Cesarano
241 PVGwfa: a Multi-level Parallel Sequence-to-graph Alignment Algorithm Chenchen Peng, Shengbo Tang, Yifei Guo, Zeyu Xia, Canqun Yang and Yingbo Cui
242 Enhancing Privacy in Machine Unlearning: Posterior Perturbation against Membership Inference Attack Chen Chen, Hengzhu Liu, Huanhuan Chi and Ping Xiong
246 PEbfs: Implement high-performance breadth-first search on PEZY-SC3s Weihao Guo, Qinglin Wang, Xiaodong Liu, Muchun Peng, Shun Yang, Yaling Liang, Yongzhen Shi, Ligang Cao and Jie Liu
250 DPG-FairFL: A Dual-Phase GAN-based Defense Framework Against Image-based Fairness Data Poisoning Attacks in Federated Learning Yichen Guo, Xinyi Sheng, Wei Bao and Bing Zhou
252 Privacy-Preserving Federated Learning Framework In Response Gaming Systems Qiong Li, Yizhao Zhu and Kaio Leong
253 Textual data de-privatization scheme based on generative adversarial networks Yanning Du, Jinnan Xu, Yaling Zhang, Yichuan Wang and Zhoukai Wang
254 DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios Long Zhao, Xin Chen, Libo Jiao, Mingyang Xu and Jiyuan Wei
255 Modeling and Simulation Verification of Operating Mode Switching of Train Control System Based on Train-to-Train Communication Qiang Li, Ian Liao, Sheng Wen and Yang Xiang
256 Performance Evaluation of NLP Models for European Portuguese: Multi-GPU/Multi-Node Configurations and Optimization Techniques Daniel Santos, Nuno Miquelina, Daniela Schmidt, Paulo Quaresma and Vítor Beires Nogueira
257 FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via Analytical Modeling Liutao Zheng, Huiying Lan, Xiang Liu, Linshan Jiang and Xuehai Zhou
258 Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features Tianchen Guo, Heming Du, Huan Huo, Bo Liu and Xin Yu
259 Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives Miaohua Zhuo, Dongjun Li, Qinglin Yang, Yuan Zhou, Qilin Li, Yuan Liu and Zhihong Tian

Important Dates

Paper Submission Due (Extended)

9 June 2024 (AoE)

Author Notification

10 August 2024

Camera-ready for Accepted Paper Due

 10 September 2024


Author Registration Due

05 September 2024 (AoE)

Conference Date

 29-31 October 2024