| # | Title | Authors |
| 1 | Fake News Detection across Multiple Domains Using Fuzzy Association Rules | Xiaofeng Xu, Weisha Zhang, Yuanyuan Huang, Hongyu Lu and Jiazhong Lu |
| 2 | Meta Unlearning | Zijie Pan, Zuobin Ying, Enmin Zhu and Yajie Wang |
| 3 | Updates Leakage Attack against Private Graph Split Learning | Hao Yang, Zhuo Ma, Yang Liu, Xinjing Liu, Beiwei Yang and Jianfeng Ma |
| 4 | SteDM: Efficient Image Steganography With Diffusion Models | Changguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao and Fangwei Wang |
| 5 | Toward a QoS-Guaranteed Cloud through Elastic Resource Scaling and Request Updating | Bingchen Shen, Jiawei Liu, Gongming Zhao, Hongli Xu and Jianfeng Bao |
| 8 | A Dual Detection System of Common Anomalies in FANETs | Xueru Du, Yueheng Liu, Di Wang, Junqiao Gao and Yue Cao |
| 10 | A scheme of dynamic location privacy-preserving with blockchain in intelligent transportation system | Xuhan Zuo, Minghao Wang, Dayong Ye and Shui Yu |
| 13 | DBFIA: Diffusion-Based Face Image Anonymization | Hanyu Xue, Xin Yuan, Bo Liu and Ming Ding |
| 14 | Incremental Board Learning System Based on Feature Selection | Yi Xu, Huaiding Qu, Yin Liu and Zhengyue Pan |
| 15 | High-Capacity Image Hiding via Compressible Invertible Neural Network | Changguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao and Fangwei Wang |
| 17 | SMP-NoC: A Flexible and Efficient Shared Memory Protection Unit on Network-on-Chip | Teng Wu, Ying He, Shengjun Wei and Changzhen Hu |
| 20 | Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data | Bin Xie, Jiahao Zhang, Yuling Li, Yusong Li and Xinyu Dong |
| 21 | Secure and Revocable Multi-authority CP-ABE for Mobile Cloud Computing | Junyang Li, Hongyang Yan, Arthur Sandor Voundi Koe, Weichu Deng and Zhengxi Zhong |
| 22 | A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption | Jiazheng Quan, Niefeng Wu, Hu Chen, Yamei Wang and Yuexin Zhang |
| 23 | A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing | Yamei Wang, Yuexin Zhang, Weijing You, Yunru Ma and Derek Wang |
| 25 | Software Crowdsourcing Allocation Algorithm Based on Task Priority | Ao Mei and Dunhui Yu |
| 29 | V-Sketch: A Sketch-based Verification Mechanism for Logical-Physical Rule Consistency in SDN | Kejian Li, Yang Du, Guoju Gao, He Huang and Yu-E Sun |
| 30 | Resource Management for GPT-based Model Deployed on Clouds: Challenges, Solutions, and Future Directions | Yongkang Dang, Yiyuan He, Minxian Xu and Kejiang Ye |
| 31 | PFDF: Privacy Preserving Federated Decision Forest for Classification | Tongyaqi Li, Qingqiang Qi, Chengyu Hu, Xuelei Li, Peng Tang and Shanqing Guo |
| 34 | Data-Free Encoder Stealing Attack in Self-supervised Learning | Chuan Zhang, Xuhao Ren, Haotian Liang, Qing Fan, Xiangyun Tang, Chunhai Li, Liehuang Zhu and Yajie Wang |
| 36 | Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks | Zihui Zhou, Yutong Gao and Minfeng Qi |
| 37 | A Mini-Model Can Make Machine Unlearning Better | Mingkang Zhao, Weng Yu and Congcong Zhu |
| 40 | BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection | Zehui Wu, Yuwei Xu, Ranfeng Huang, Xinhe Fan, Jingdong Xu and Guang Cheng |
| 43 | Dynamic Offloading Control for Waste Sorting Based on Deep Q-Network | Jing Wang, Xiaoyang Wang, Jianxiong Guo, Zhiqing Tang, Xingjian Ding and Tian Wang |
| 44 | A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT | Changsong Yang, Junfu Wu, Yong Ding, Yujue Wang and Hai Liang |
| 45 | Hybridization of One- and Two-point Bandits Convex Optimization in Non-stationary Environments | Gailun Zeng and Jianxiong Guo |
| 47 | An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning | Yueqin Ge, Binsi Cai, Yali Gao, Xiaoyong Li, Jinwen Xi, Qiang Han and Yongxin Liang |
| 51 | Pessimistic Fault Diagnosis Algorithm for Hypercube-Like Networks Under the BGM Model | Lin Chen, Hao Feng, Jiong Wu and Huirui Han |
| 52 | A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions | Hai Liu, Fangqiong Li and Hongye Peng |
| 53 | AutoMiner: Reinforcement Learning-Based Mining Attack Simulator | Wei Li, Lide Xue, Ziyang Han, Bingren Chen, Xishan Zhang and Xuehai Zhou |
| 55 | Style-specific Music Generation From Image | Chang Xu, Xuan Liu, Yu Weng, Shan Jiang, Xiangyun Tang and Minfeng Qi |
| 56 | Multimodal Summarization with Modality-Aware Fusion and Summarization Ranking | Xuming Ye, Chaomurilige Wang, Zheng Liu, Haoyu Luo, Jun Dong and Yingzhe Luo |
| 58 | Enhancing Text-Image Person Re-identification via Intra-Class Relevance Learning | Wenbin He, Yutong Gao, Wenjian Liu, Chaomurilige Wang, Zheng Liu and Ao Guo |
| 59 | Research on Tropical Cyclone Tracks Classification Methods and Feature Analysis in the Western Northern Pacific | Nan Xu, Baisong Yang, Jiangyong Jin, Lihao Deng and Jia Ren |
| 61 | BDFC:A New Flow Control Mechanism for Torus Networks | Youmeng Li, Haofei Zhang, Yu Deng and Qi Fang |
| 63 | FEDNPAIT: Federated Learning with NADAM and PADAM for Instruction Tuning | Zhipeng Gao, Yichen Li and Xinlei Yu |
| 64 | Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks | Yinghao Tang, Jinbiao Lu, Xingkai Kang, Yuhang Li and Hongchen Guo |
| 66 | MARO: Enabling Full MPI Automatic Refactoring in DSL-based Programming Framework | Tong Lei, Zongjing Chen, Yonggang Che and Chuanfu Xu |
| 67 | FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation | Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu and Yongjun Wang |
| 69 | Coordinated Multi-regional Logistics Path Planning: A Broad Reinforcement Learning Framework | Shengwei Li, Congcong Zhu and Zeping Tong |
| 70 | A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning | Xiang Wu, Aiting Yao, Shantanu Pal, Frank Jiang, Xuejun Li, Jia Xu, Chengzu Dong, Xuefei Chen, Xiuyi Zhang and Xiao Liu |
| 71 | Path Optimization Method Under UAV Charging Scheduling Network | Tingting Yang, Yiqian Wang, Jie Zhu, Shuyu Chang and Haiping Huang |
| 73 | Cross-Modal Mask and Detail Alignment for Text-based Person Retrieval | Ao Guo, Xuan Liu, Xianggan Liu, Bingmeng Hu, Jie Yuan and Chiawei Chu |
| 74 | PrivARM: Privacy-preserving Association Rule Mining in the Cloud | Yuxin Zhang, Hui Han, Guangliang Sun, Wei Wu and Lin Liu |
| 75 | Outliers are Real: Detecting VLM-generated Images via One-class Classification | Baoping Liu, Bo Liu and Ming Ding |
| 78 | FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy | Yangyang Guo, Tao Zhang, Xutong Mu, Haoshuo Li, Xuewen Dong and Qi Li |
| 79 | DP-CLMI:Differentially Private Contrastive Learning against Membership Inference Attack | Yiwen Xia, Junying Zhang, Xindi Ma, Qi Jiang, Ning Xi, Di Lu, Pengbin Feng, Sheng Gao and Jianfeng Ma |
| 83 | DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service | Shouyue Sun, Feng Wu, Yingzhi Zhang, Lei Cui, Longxiang Gao and Shui Yu |
| 85 | Deduplication and approximate analytics for encrypted IoT data in fog-assisted cloud storage | Rongxi Wang, Guanxiong Ha, Chunfu Jia, Ruiqi Li and Zhen Su |
| 88 | Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis | Yukai Liu, Jizhe Jia, Jinhe Wu, Junyu Ai, Meng Shen and Liehuang Zhu |
| 89 | MARL-DCF: A dual-channel fusion routing algorithm based on multi-agent reinforcement learning | Zhenyu Li, Runyuan Sun, Zhifeng Liang, Bo Liu and Zhenxiang Sun |
| 90 | DataJudge: Cross-chain Data Consistency Verification Based on Extended Merkle Hash Tree | Yuwei Xu, Junyu Zeng, Jie Cao, Shengjiang Dai, Qiao Xiang and Guang Cheng |
| 91 | Prototype enhancement for few-shot point cloud semantic segmentation | Zhengyao Li, Gengshen Wu and Yi Liu |
| 92 | Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation | Peng Yin, Jizhe Jia, Jing Wang, Yukai Liu, Meng Shen and Liehuang Zhu |
| 96 | Towards Information Sharing Beetle Antennae Search Optimization | Xuan Liu, Chenyan Wang, Wenjian Liu, Lefeng Zhang, Xianggan Liu and Yutong Gao |
| 99 | SSC: An SRAM-based Silence Computing Design for On-chip Memory | Ziming Chen, Quan Deng, Yiyue Hu, Xiaowei He, Libo Huang and Yongwen Wang |
| 100 | TP-BFT: A Faster Asynchronous BFT Consensus with Parallel Structure | Shunliang Ye, Qi Chen, Jin Li, Zhihui Ke and Guoyu Yang |
| 101 | A Hybrid Vectorized Merge Sort on ARM NEON | Jincheng Zhou, Jin Zhang, Xiang Zhang, Tiaojie Xiao, Di Ma and Chunye Gong |
| 103 | Time-of-Use Pricing Aware Battery Swapping Station Charging Scheduling via Deep Reinforcement Learning | Hao Chen, Chengyi Gu, Desheng Wan, Bincan Yu and Chaocan Xiang |
| 107 | LTP: a lightweight on-chip temporary prefetcher for Data-dependent memory accesses | Li Mengjin and Zhou Hongwei |
| 110 | Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios | Zhiwei Zhang, Shuyu Chang, Haiping Huang and Rui Wang |
| 111 | A Neural Network-Based PUF Protection Method Against Machine Learning Attack | Haolin Jiang, Ding Deng and Shaojie Ni |
| 113 | Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey | Di Wang, Youyang Qu, Wenjian Liu and Longxiang Gao |
| 114 | ORL-EPM: A Profit-Aware and Load-Driven Heterogeneous Resource Management Scheme with Collaborative Edge Computing | Fengyi Huang, Yutao Zhang, Wenhua Wang, Jianxiong Guo, Yang Xu, Wentao Fan and Tian Wang |
| 115 | Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs | Yongxiang Cao, Jixiang Jiang, Guocheng Zhao, Wei Wang, Hongxu Jiang and Yanfei Song |
| 116 | Multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments | Zhijian Xu, Zhiwei Zhang, Guiyuan Tang, Ziwei Shi, Yulong Shen and Ning Xi |
| 117 | AQC: Achieving Precise Bandwidth Allocation with Augmented Queues for Credit-based Proactive Congestion Control | Zihan Li, Yani Gong, Dinghuang Hu, Guoyuan Yuan, Cunlu Li and Dezun Dong |
| 126 | Invisible Backdoor Attack with Image Contours Triggers | Yangzhi Hou and Ying Yang |
| 127 | A Cost-Effective Data Placement Strategy based on Battle Royale Optimization in Multi-Cloud Edge Environments | Sen Zhang, Lili Xiao, Xin Luo, Zhaohui Zhang and Pengwei Wang |
| 129 | Finestra: Multi-Aggregator Swarm Learning for Gradient Leakage Defense | Hangkit Choi, Junxuan Liao, Yuming Xiong, Yili Gong, Chuang Hu and Dazhao Cheng |
| 130 | A Multi-Holder Role and Strange Attractor-Based Data Possession Proof in Medical Clouds | Guo Jin Yuan, Sun Lijuan, Wu Jingchen, Chu Chiawei and Gao Yutong |
| 132 | ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization | Yuwei Xu, Shengjiang Dai, Junyu Zeng, Jie Cao, Ran He and Qiao Xiang |
| 133 | Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time | Xiao Wang, Zhou Zhou, Hong Xu, Gangyong Jia, Yuxia Cheng and Qing Wu |
| 134 | DIsFU: Protecting Innocent Clients in Federated Unlearning | Fanyu Kong, Xiangyun Tang, Yu Weng, Tao Zhang, Hongyang Du, Jiawen Kang and Chi Liu |
| 135 | TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting | Yuquan Chu, Peng Liu, Jin Fan, Haocheng Ye and Tianfan Jiang |
| 136 | An Autoencoder-based Framework for Data Privacy Protection Machine Learning | Jiayun Wu, Wei Ren and Xianchao Zhang |
| 138 | Multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning | Jiao Zhang, Xiong Li and Wei Liang |
| 145 | Parallel Implementation of Number-Theoretic Transform on GPU Clusters | Daisuke Takahashi |
| 149 | Load Balancing Optimizations for Distributed GMRES Algorithm | Yuxiang Zhang, Shuaizhe Guo, Jianhua Gao, Weixing Ji and Yizhuo Wang |
| 150 | Temperature-Based Watermarking and Detection for Large Language Models | Weitong Chen, Zhenxin Zhang, Huali Ren, Pei-Gen Ye, Zhengdao Li and Shanshan Huang |
| 151 | Dynamic Privacy Protection with Large Language Model in Social Networks | Yizhe Xie, Congcong Zhu, Xinyue Zhang, Xiangyu Hu and Xuan Liu |
| 154 | SwinMixer Detector: A two-level traffic flow detection system based on Swin Transformer and MLP-Mixer | Lu Lu, Menghao Fang, Xia Li, Minghui Li, Tianwei Lei and Zixiao Kong |
| 158 | A Comprehensive Review on Deep Learning System Testing | Ying Li, Chun Shan, Zhen Liu and Shuyan Liao |
| 163 | A Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries} \titlerunning{A DSSE Scheme for Rapid Conjunctive Queries | Zekun Zou, Ruirui Gao, Xiong Li, Xiaofen Wang and Xiaosong Zhang |
| 164 | CIGraph: Accelerating graph queries over database with compressed index | Zhen Lv, Li Wang, Yingfan Liu, Kankan Zhao and Yanguo Peng |
| 166 | A Data Watermark Scheme base on Data Converted Bitmap for Data Trading | Xinyu Liu, Wei Ren and Wenmao Liu |
| 167 | Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment | Ying Zhang, Yutong Gao, Xuan Liu, Lefeng Zhang, Xianggan Liu and Shan Jiang |
| 169 | BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT | Yao Huang, Zhongyuan Yu, Guijuan Wang, Baobao Chai, Hongliang Zhang and Jiguo Yu |
| 170 | Distributed Incentive Algorithm for Fine-gained Offloading in Vehicular Ad Hoc Networks | Junhong Wu, Jigang Wu, Yalan Wu and Jiale Huang |
| 171 | Blockchain-assisted anonymous data sharing scheme with full accountability for CloudIoT | Chuntang Yu, Xia Feng and Yongzhao Zhan |
| 173 | CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy | Axin Xiang, Youliang Tian, Jinbo Xiong, Zuobin Ying and Changgen Peng |
| 177 | Mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation | Baohai Wang, Youyang Qu, Longxiang Gao, Conggai Li, Lin Li and David Smith |
| 178 | A Power Monitoring Framework of a Post-Quantum Cryptography Web Server | Aniello Castiglione, Vincenzo Loia and Alberto Volpe |
| 179 | MSA2 : An Efficient Sparsity-Aware Accelerator for Matrix Multiplication with Multi-core Systolic Arrays | Minjin Tang, Mei Wen, Junzhong Shen, Jingkui Yang, Zeyu Xue and Zili Shao |
| 180 | A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs | Dezhi Liu and Zhen Guo |
| 181 | AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection | Run Jie Yang, Yong De Guo, Jun Yan, Hao Nan Yang and Zi Feng Dai |
| 182 | Accelerating Mini-batch HGNN Training by Reducing CUDA Kernels | Meng Wu, Jingkai Qiu, Mingyu Yan, Wenming Li, Yang Zhang, Zhimin Zhang, Xiaochun Ye and Dongrui Fan |
| 183 | Anycast Routing for Unmanned Aerial Vehicle Networks with Multiple Base-stations | Yuhong Xiang, Shuai Gao, Hongchao Wang, Dong Yang and Hongke Zhang |
| 184 | Exploring RAPL as a power capping leverage for power and energy constrained infrastructures and applications | Vladimir Ostapenco, Laurent Lefèvre, Anne-Cécile Orgerie and Benjamin Fichel |
| 186 | A Secure Cross-account Audit Scheme for Cross-chain Transactions | Haotian Deng, Zihao Wang, Yajie Wang, Licheng Wang, Liehuang Zhu and Chuan Zhang |
| 187 | ZKCross: An Efficient and Reliable Cross-chain Authentication Scheme Based on Lightweight Attribute-based Zero-knowledge Proof | Yuwei Xu, Hailang Cai, Jialuo Chen, Qiao Xiang, Jingdong Xu and Guang Cheng |
| 188 | LSSMR-SpMM: A Long Row Splitting and Short Row Merging Reordering Approach for Parallel SpMM on Pezy-SC3s | Ligang Cao, Qinglin Wang, Shun Yang, Rui Xia, Weihao Guo and Jie Liu |
| 198 | Federated Meta Continual Learning for Efficient and Autonomous Edge Inference | Bingze Li, Stella Ho, Youyang Qu, Chenhao Xu, Tom H. Luan and Longxiang Gao |
| 203 | MC-infer: Zero-knowledge and Real-data-free Model Inference Attack in DLaaS | Feng Wu and Lei Cui |
| 204 | Certificate-based Transport Layer Security encrypted malicious traffic detection in real-time network environments | Suo Yiran, Xue Jingfeng, Guo Wenjie, Du Wenbiao, Han Weijie and Xu Chang |
| 207 | Defense Against Textual Backdoors via Elastic Weighted Consolidation-based Machine Unlearning | Haojun Xuan, Yajie Wang, Huishu Wu, Tao Liu, Chuan Zhang and Liehuang Zhu |
| 209 | Efficient and Privacy-preserving Ranking-based Federated Learning | Tao Liu, Xuhao Ren, Yajie Wang, Huishu Wu and Chuan Zhang |
| 213 | Cross-Chain Transaction Auditing with Truth Discovery | Huishu Wu, Xuhao Ren, Mengxuan Liu, Tao Liu, Yajie Wang, Chuan Zhang and Liehuang Zhu |
| 215 | Exploring the Vulnerability of ECG-based Authentication Systems through A Dictionary Attack Approach | Bonan Zhang, Chao Chen, Ickjai Lee, Kyungmi Lee and Kok-Leong Ong |
| 217 | LBVP: Lightweight Blockchain-based Vehicle Platooning Scheme for Secure and Efficient Platoon Management | Wenjie Fan, Zhiquan Liu, Libo Wang, Ying He, Jingjing Guo, Xia Feng and Jianfeng Ma |
| 219 | Enhancing Delay-Sensitive Task Offloading: A Multi-Agent Deep Reinforcement Learning Approach for MEC-based AIoT Systems | Fengjie Tang, Jia Xu, Xiao Liu, Aiting Yao, Mingyan Fang and Xuejun Li |
| 226 | Progressive Multiscale Attention Network for Diabetic Retinopathy | Qiuji Zhou, Yongde Guo, Yifeng Liu and Yanzhen Lin |
| 229 | Low-Carbon Geographically Distributed Cloud-Edge Task Scheduling | Yingjie Zhu, Ji Qi, Zehao Wang, Shengjie Wei, Yan Chen, Tuo Cao, Gangyi Luo and Zhuzhong Qian |
| 232 | MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness | Yuhang Li, Mei Wen, Junzhong Shen, Zhaoyun Chen and Yang Shi |
| 233 | Integrating Blockchain, Smart Contracts, NFTs, and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa Supply Chains | Khanh Hong Vo Hong Vo, Triet Nguyen Minh, Son Ha Xuan, Bang Le, Kha Nguyễn, Hung Nhat Nguyen, Vinh Thanh Nguyen and Minh Van Nguyen |
| 235 | On-Chain Dynamic Policy Evaluation for Decentralized Access Control | Yepeng Ding, Junwei Yu, Hiroyuki Sato, Tohru Kondo and Yan Bai |
| 236 | FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing | Ruonan Lin, Yuanyuan Zhang, Renwan Bi, Ruihong Huang and Jinbo Xiong |
| 238 | The Role of Artificial Intelligence Technologies in Sustainable Urban Development: A Systematic Survey | Maria Rosaria Sessa, Ornella Malandrino and Antonio Cesarano |
| 241 | PVGwfa: a Multi-level Parallel Sequence-to-graph Alignment Algorithm | Chenchen Peng, Shengbo Tang, Yifei Guo, Zeyu Xia, Canqun Yang and Yingbo Cui |
| 242 | Enhancing Privacy in Machine Unlearning: Posterior Perturbation against Membership Inference Attack | Chen Chen, Hengzhu Liu, Huanhuan Chi and Ping Xiong |
| 246 | PEbfs: Implement high-performance breadth-first search on PEZY-SC3s | Weihao Guo, Qinglin Wang, Xiaodong Liu, Muchun Peng, Shun Yang, Yaling Liang, Yongzhen Shi, Ligang Cao and Jie Liu |
| 250 | DPG-FairFL: A Dual-Phase GAN-based Defense Framework Against Image-based Fairness Data Poisoning Attacks in Federated Learning | Yichen Guo, Xinyi Sheng, Wei Bao and Bing Zhou |
| 252 | Privacy-Preserving Federated Learning Framework In Response Gaming Systems | Qiong Li, Yizhao Zhu and Kaio Leong |
| 253 | Textual data de-privatization scheme based on generative adversarial networks | Yanning Du, Jinnan Xu, Yaling Zhang, Yichuan Wang and Zhoukai Wang |
| 254 | DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios | Long Zhao, Xin Chen, Libo Jiao, Mingyang Xu and Jiyuan Wei |
| 255 | Modeling and Simulation Verification of Operating Mode Switching of Train Control System Based on Train-to-Train Communication | Qiang Li, Ian Liao, Sheng Wen and Yang Xiang |
| 256 | Performance Evaluation of NLP Models for European Portuguese: Multi-GPU/Multi-Node Configurations and Optimization Techniques | Daniel Santos, Nuno Miquelina, Daniela Schmidt, Paulo Quaresma and Vítor Beires Nogueira |
| 257 | FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via Analytical Modeling | Liutao Zheng, Huiying Lan, Xiang Liu, Linshan Jiang and Xuehai Zhou |
| 258 | Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features | Tianchen Guo, Heming Du, Huan Huo, Bo Liu and Xin Yu |
| 259 | Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives | Miaohua Zhuo, Dongjun Li, Qinglin Yang, Yuan Zhou, Qilin Li, Yuan Liu and Zhihong Tian |
Paper Submission Due (Extended)
9 June 2024 (AoE)
Author Notification
10 August 2024
Camera-ready for Accepted Paper Due
10 September 2024
05 September 2024 (AoE)
Conference Date
29-31 October 2024
{{ 'en' == 'cn' ? item.name : item.name_en }}
{{ 'en' == 'cn' ? item.desc : item.desc_en }}