# | Title | Authors |
1 | Fake News Detection across Multiple Domains Using Fuzzy Association Rules | Xiaofeng Xu, Weisha Zhang, Yuanyuan Huang, Hongyu Lu and Jiazhong Lu |
2 | Meta Unlearning | Zijie Pan, Zuobin Ying, Enmin Zhu and Yajie Wang |
3 | Updates Leakage Attack against Private Graph Split Learning | Hao Yang, Zhuo Ma, Yang Liu, Xinjing Liu, Beiwei Yang and Jianfeng Ma |
4 | SteDM: Efficient Image Steganography With Diffusion Models | Changguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao and Fangwei Wang |
5 | Toward a QoS-Guaranteed Cloud through Elastic Resource Scaling and Request Updating | Bingchen Shen, Jiawei Liu, Gongming Zhao, Hongli Xu and Jianfeng Bao |
8 | A Dual Detection System of Common Anomalies in FANETs | Xueru Du, Yueheng Liu, Di Wang, Junqiao Gao and Yue Cao |
10 | A scheme of dynamic location privacy-preserving with blockchain in intelligent transportation system | Xuhan Zuo, Minghao Wang, Dayong Ye and Shui Yu |
13 | DBFIA: Diffusion-Based Face Image Anonymization | Hanyu Xue, Xin Yuan, Bo Liu and Ming Ding |
14 | Incremental Board Learning System Based on Feature Selection | Yi Xu, Huaiding Qu, Yin Liu and Zhengyue Pan |
15 | High-Capacity Image Hiding via Compressible Invertible Neural Network | Changguang Wang, Haoyi Shi, Qingru Li, Dongmei Zhao and Fangwei Wang |
17 | SMP-NoC: A Flexible and Efficient Shared Memory Protection Unit on Network-on-Chip | Teng Wu, Ying He, Shengjun Wei and Changzhen Hu |
20 | Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data | Bin Xie, Jiahao Zhang, Yuling Li, Yusong Li and Xinyu Dong |
21 | Secure and Revocable Multi-authority CP-ABE for Mobile Cloud Computing | Junyang Li, Hongyang Yan, Arthur Sandor Voundi Koe, Weichu Deng and Zhengxi Zhong |
22 | A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption | Jiazheng Quan, Niefeng Wu, Hu Chen, Yamei Wang and Yuexin Zhang |
23 | A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing | Yamei Wang, Yuexin Zhang, Weijing You, Yunru Ma and Derek Wang |
25 | Software Crowdsourcing Allocation Algorithm Based on Task Priority | Ao Mei and Dunhui Yu |
29 | V-Sketch: A Sketch-based Verification Mechanism for Logical-Physical Rule Consistency in SDN | Kejian Li, Yang Du, Guoju Gao, He Huang and Yu-E Sun |
30 | Resource Management for GPT-based Model Deployed on Clouds: Challenges, Solutions, and Future Directions | Yongkang Dang, Yiyuan He, Minxian Xu and Kejiang Ye |
31 | PFDF: Privacy Preserving Federated Decision Forest for Classification | Tongyaqi Li, Qingqiang Qi, Chengyu Hu, Xuelei Li, Peng Tang and Shanqing Guo |
34 | Data-Free Encoder Stealing Attack in Self-supervised Learning | Chuan Zhang, Xuhao Ren, Haotian Liang, Qing Fan, Xiangyun Tang, Chunhai Li, Liehuang Zhu and Yajie Wang |
36 | Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks | Zihui Zhou, Yutong Gao and Minfeng Qi |
37 | A Mini-Model Can Make Machine Unlearning Better | Mingkang Zhao, Weng Yu and Congcong Zhu |
40 | BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection | Zehui Wu, Yuwei Xu, Ranfeng Huang, Xinhe Fan, Jingdong Xu and Guang Cheng |
43 | Dynamic Offloading Control for Waste Sorting Based on Deep Q-Network | Jing Wang, Xiaoyang Wang, Jianxiong Guo, Zhiqing Tang, Xingjian Ding and Tian Wang |
44 | A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT | Changsong Yang, Junfu Wu, Yong Ding, Yujue Wang and Hai Liang |
45 | Hybridization of One- and Two-point Bandits Convex Optimization in Non-stationary Environments | Gailun Zeng and Jianxiong Guo |
47 | An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning | Yueqin Ge, Binsi Cai, Yali Gao, Xiaoyong Li, Jinwen Xi, Qiang Han and Yongxin Liang |
51 | Pessimistic Fault Diagnosis Algorithm for Hypercube-Like Networks Under the BGM Model | Lin Chen, Hao Feng, Jiong Wu and Huirui Han |
52 | A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions | Hai Liu, Fangqiong Li and Hongye Peng |
53 | AutoMiner: Reinforcement Learning-Based Mining Attack Simulator | Wei Li, Lide Xue, Ziyang Han, Bingren Chen, Xishan Zhang and Xuehai Zhou |
55 | Style-specific Music Generation From Image | Chang Xu, Xuan Liu, Yu Weng, Shan Jiang, Xiangyun Tang and Minfeng Qi |
56 | Multimodal Summarization with Modality-Aware Fusion and Summarization Ranking | Xuming Ye, Chaomurilige Wang, Zheng Liu, Haoyu Luo, Jun Dong and Yingzhe Luo |
58 | Enhancing Text-Image Person Re-identification via Intra-Class Relevance Learning | Wenbin He, Yutong Gao, Wenjian Liu, Chaomurilige Wang, Zheng Liu and Ao Guo |
59 | Research on Tropical Cyclone Tracks Classification Methods and Feature Analysis in the Western Northern Pacific | Nan Xu, Baisong Yang, Jiangyong Jin, Lihao Deng and Jia Ren |
61 | BDFC:A New Flow Control Mechanism for Torus Networks | Youmeng Li, Haofei Zhang, Yu Deng and Qi Fang |
63 | FEDNPAIT: Federated Learning with NADAM and PADAM for Instruction Tuning | Zhipeng Gao, Yichen Li and Xinlei Yu |
64 | Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks | Yinghao Tang, Jinbiao Lu, Xingkai Kang, Yuhang Li and Hongchen Guo |
66 | MARO: Enabling Full MPI Automatic Refactoring in DSL-based Programming Framework | Tong Lei, Zongjing Chen, Yonggang Che and Chuanfu Xu |
67 | FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation | Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu and Yongjun Wang |
69 | Coordinated Multi-regional Logistics Path Planning: A Broad Reinforcement Learning Framework | Shengwei Li, Congcong Zhu and Zeping Tong |
70 | A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning | Xiang Wu, Aiting Yao, Shantanu Pal, Frank Jiang, Xuejun Li, Jia Xu, Chengzu Dong, Xuefei Chen, Xiuyi Zhang and Xiao Liu |
71 | Path Optimization Method Under UAV Charging Scheduling Network | Tingting Yang, Yiqian Wang, Jie Zhu, Shuyu Chang and Haiping Huang |
73 | Cross-Modal Mask and Detail Alignment for Text-based Person Retrieval | Ao Guo, Xuan Liu, Xianggan Liu, Bingmeng Hu, Jie Yuan and Chiawei Chu |
74 | PrivARM: Privacy-preserving Association Rule Mining in the Cloud | Yuxin Zhang, Hui Han, Guangliang Sun, Wei Wu and Lin Liu |
75 | Outliers are Real: Detecting VLM-generated Images via One-class Classification | Baoping Liu, Bo Liu and Ming Ding |
78 | FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy | Yangyang Guo, Tao Zhang, Xutong Mu, Haoshuo Li, Xuewen Dong and Qi Li |
79 | DP-CLMI:Differentially Private Contrastive Learning against Membership Inference Attack | Yiwen Xia, Junying Zhang, Xindi Ma, Qi Jiang, Ning Xi, Di Lu, Pengbin Feng, Sheng Gao and Jianfeng Ma |
83 | DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service | Shouyue Sun, Feng Wu, Yingzhi Zhang, Lei Cui, Longxiang Gao and Shui Yu |
85 | Deduplication and approximate analytics for encrypted IoT data in fog-assisted cloud storage | Rongxi Wang, Guanxiong Ha, Chunfu Jia, Ruiqi Li and Zhen Su |
88 | Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis | Yukai Liu, Jizhe Jia, Jinhe Wu, Junyu Ai, Meng Shen and Liehuang Zhu |
89 | MARL-DCF: A dual-channel fusion routing algorithm based on multi-agent reinforcement learning | Zhenyu Li, Runyuan Sun, Zhifeng Liang, Bo Liu and Zhenxiang Sun |
90 | DataJudge: Cross-chain Data Consistency Verification Based on Extended Merkle Hash Tree | Yuwei Xu, Junyu Zeng, Jie Cao, Shengjiang Dai, Qiao Xiang and Guang Cheng |
91 | Prototype enhancement for few-shot point cloud semantic segmentation | Zhengyao Li, Gengshen Wu and Yi Liu |
92 | Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation | Peng Yin, Jizhe Jia, Jing Wang, Yukai Liu, Meng Shen and Liehuang Zhu |
96 | Towards Information Sharing Beetle Antennae Search Optimization | Xuan Liu, Chenyan Wang, Wenjian Liu, Lefeng Zhang, Xianggan Liu and Yutong Gao |
99 | SSC: An SRAM-based Silence Computing Design for On-chip Memory | Ziming Chen, Quan Deng, Yiyue Hu, Xiaowei He, Libo Huang and Yongwen Wang |
100 | TP-BFT: A Faster Asynchronous BFT Consensus with Parallel Structure | Shunliang Ye, Qi Chen, Jin Li, Zhihui Ke and Guoyu Yang |
101 | A Hybrid Vectorized Merge Sort on ARM NEON | Jincheng Zhou, Jin Zhang, Xiang Zhang, Tiaojie Xiao, Di Ma and Chunye Gong |
103 | Time-of-Use Pricing Aware Battery Swapping Station Charging Scheduling via Deep Reinforcement Learning | Hao Chen, Chengyi Gu, Desheng Wan, Bincan Yu and Chaocan Xiang |
107 | LTP: a lightweight on-chip temporary prefetcher for Data-dependent memory accesses | Li Mengjin and Zhou Hongwei |
110 | Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios | Zhiwei Zhang, Shuyu Chang, Haiping Huang and Rui Wang |
111 | A Neural Network-Based PUF Protection Method Against Machine Learning Attack | Haolin Jiang, Ding Deng and Shaojie Ni |
113 | Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey | Di Wang, Youyang Qu, Wenjian Liu and Longxiang Gao |
114 | ORL-EPM: A Profit-Aware and Load-Driven Heterogeneous Resource Management Scheme with Collaborative Edge Computing | Fengyi Huang, Yutao Zhang, Wenhua Wang, Jianxiong Guo, Yang Xu, Wentao Fan and Tian Wang |
115 | Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs | Yongxiang Cao, Jixiang Jiang, Guocheng Zhao, Wei Wang, Hongxu Jiang and Yanfei Song |
116 | Multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments | Zhijian Xu, Zhiwei Zhang, Guiyuan Tang, Ziwei Shi, Yulong Shen and Ning Xi |
117 | AQC: Achieving Precise Bandwidth Allocation with Augmented Queues for Credit-based Proactive Congestion Control | Zihan Li, Yani Gong, Dinghuang Hu, Guoyuan Yuan, Cunlu Li and Dezun Dong |
126 | Invisible Backdoor Attack with Image Contours Triggers | Yangzhi Hou and Ying Yang |
127 | A Cost-Effective Data Placement Strategy based on Battle Royale Optimization in Multi-Cloud Edge Environments | Sen Zhang, Lili Xiao, Xin Luo, Zhaohui Zhang and Pengwei Wang |
129 | Finestra: Multi-Aggregator Swarm Learning for Gradient Leakage Defense | Hangkit Choi, Junxuan Liao, Yuming Xiong, Yili Gong, Chuang Hu and Dazhao Cheng |
130 | A Multi-Holder Role and Strange Attractor-Based Data Possession Proof in Medical Clouds | Guo Jin Yuan, Sun Lijuan, Wu Jingchen, Chu Chiawei and Gao Yutong |
132 | ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization | Yuwei Xu, Shengjiang Dai, Junyu Zeng, Jie Cao, Ran He and Qiao Xiang |
133 | Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time | Xiao Wang, Zhou Zhou, Hong Xu, Gangyong Jia, Yuxia Cheng and Qing Wu |
134 | DIsFU: Protecting Innocent Clients in Federated Unlearning | Fanyu Kong, Xiangyun Tang, Yu Weng, Tao Zhang, Hongyang Du, Jiawen Kang and Chi Liu |
135 | TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting | Yuquan Chu, Peng Liu, Jin Fan, Haocheng Ye and Tianfan Jiang |
136 | An Autoencoder-based Framework for Data Privacy Protection Machine Learning | Jiayun Wu, Wei Ren and Xianchao Zhang |
138 | Multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning | Jiao Zhang, Xiong Li and Wei Liang |
145 | Parallel Implementation of Number-Theoretic Transform on GPU Clusters | Daisuke Takahashi |
149 | Load Balancing Optimizations for Distributed GMRES Algorithm | Yuxiang Zhang, Shuaizhe Guo, Jianhua Gao, Weixing Ji and Yizhuo Wang |
150 | Temperature-Based Watermarking and Detection for Large Language Models | Weitong Chen, Zhenxin Zhang, Huali Ren, Pei-Gen Ye, Zhengdao Li and Shanshan Huang |
151 | Dynamic Privacy Protection with Large Language Model in Social Networks | Yizhe Xie, Congcong Zhu, Xinyue Zhang, Xiangyu Hu and Xuan Liu |
154 | SwinMixer Detector: A two-level traffic flow detection system based on Swin Transformer and MLP-Mixer | Lu Lu, Menghao Fang, Xia Li, Minghui Li, Tianwei Lei and Zixiao Kong |
158 | A Comprehensive Review on Deep Learning System Testing | Ying Li, Chun Shan, Zhen Liu and Shuyan Liao |
163 | A Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries} \titlerunning{A DSSE Scheme for Rapid Conjunctive Queries | Zekun Zou, Ruirui Gao, Xiong Li, Xiaofen Wang and Xiaosong Zhang |
164 | CIGraph: Accelerating graph queries over database with compressed index | Zhen Lv, Li Wang, Yingfan Liu, Kankan Zhao and Yanguo Peng |
166 | A Data Watermark Scheme base on Data Converted Bitmap for Data Trading | Xinyu Liu, Wei Ren and Wenmao Liu |
167 | Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment | Ying Zhang, Yutong Gao, Xuan Liu, Lefeng Zhang, Xianggan Liu and Shan Jiang |
169 | BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT | Yao Huang, Zhongyuan Yu, Guijuan Wang, Baobao Chai, Hongliang Zhang and Jiguo Yu |
170 | Distributed Incentive Algorithm for Fine-gained Offloading in Vehicular Ad Hoc Networks | Junhong Wu, Jigang Wu, Yalan Wu and Jiale Huang |
171 | Blockchain-assisted anonymous data sharing scheme with full accountability for CloudIoT | Chuntang Yu, Xia Feng and Yongzhao Zhan |
173 | CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy | Axin Xiang, Youliang Tian, Jinbo Xiong, Zuobin Ying and Changgen Peng |
177 | Mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation | Baohai Wang, Youyang Qu, Longxiang Gao, Conggai Li, Lin Li and David Smith |
178 | A Power Monitoring Framework of a Post-Quantum Cryptography Web Server | Aniello Castiglione, Vincenzo Loia and Alberto Volpe |
179 | MSA2 : An Efficient Sparsity-Aware Accelerator for Matrix Multiplication with Multi-core Systolic Arrays | Minjin Tang, Mei Wen, Junzhong Shen, Jingkui Yang, Zeyu Xue and Zili Shao |
180 | A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs | Dezhi Liu and Zhen Guo |
181 | AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection | Run Jie Yang, Yong De Guo, Jun Yan, Hao Nan Yang and Zi Feng Dai |
182 | Accelerating Mini-batch HGNN Training by Reducing CUDA Kernels | Meng Wu, Jingkai Qiu, Mingyu Yan, Wenming Li, Yang Zhang, Zhimin Zhang, Xiaochun Ye and Dongrui Fan |
183 | Anycast Routing for Unmanned Aerial Vehicle Networks with Multiple Base-stations | Yuhong Xiang, Shuai Gao, Hongchao Wang, Dong Yang and Hongke Zhang |
184 | Exploring RAPL as a power capping leverage for power and energy constrained infrastructures and applications | Vladimir Ostapenco, Laurent Lefèvre, Anne-Cécile Orgerie and Benjamin Fichel |
186 | A Secure Cross-account Audit Scheme for Cross-chain Transactions | Haotian Deng, Zihao Wang, Yajie Wang, Licheng Wang, Liehuang Zhu and Chuan Zhang |
187 | ZKCross: An Efficient and Reliable Cross-chain Authentication Scheme Based on Lightweight Attribute-based Zero-knowledge Proof | Yuwei Xu, Hailang Cai, Jialuo Chen, Qiao Xiang, Jingdong Xu and Guang Cheng |
188 | LSSMR-SpMM: A Long Row Splitting and Short Row Merging Reordering Approach for Parallel SpMM on Pezy-SC3s | Ligang Cao, Qinglin Wang, Shun Yang, Rui Xia, Weihao Guo and Jie Liu |
198 | Federated Meta Continual Learning for Efficient and Autonomous Edge Inference | Bingze Li, Stella Ho, Youyang Qu, Chenhao Xu, Tom H. Luan and Longxiang Gao |
203 | MC-infer: Zero-knowledge and Real-data-free Model Inference Attack in DLaaS | Feng Wu and Lei Cui |
204 | Certificate-based Transport Layer Security encrypted malicious traffic detection in real-time network environments | Suo Yiran, Xue Jingfeng, Guo Wenjie, Du Wenbiao, Han Weijie and Xu Chang |
207 | Defense Against Textual Backdoors via Elastic Weighted Consolidation-based Machine Unlearning | Haojun Xuan, Yajie Wang, Huishu Wu, Tao Liu, Chuan Zhang and Liehuang Zhu |
209 | Efficient and Privacy-preserving Ranking-based Federated Learning | Tao Liu, Xuhao Ren, Yajie Wang, Huishu Wu and Chuan Zhang |
213 | Cross-Chain Transaction Auditing with Truth Discovery | Huishu Wu, Xuhao Ren, Mengxuan Liu, Tao Liu, Yajie Wang, Chuan Zhang and Liehuang Zhu |
215 | Exploring the Vulnerability of ECG-based Authentication Systems through A Dictionary Attack Approach | Bonan Zhang, Chao Chen, Ickjai Lee, Kyungmi Lee and Kok-Leong Ong |
217 | LBVP: Lightweight Blockchain-based Vehicle Platooning Scheme for Secure and Efficient Platoon Management | Wenjie Fan, Zhiquan Liu, Libo Wang, Ying He, Jingjing Guo, Xia Feng and Jianfeng Ma |
219 | Enhancing Delay-Sensitive Task Offloading: A Multi-Agent Deep Reinforcement Learning Approach for MEC-based AIoT Systems | Fengjie Tang, Jia Xu, Xiao Liu, Aiting Yao, Mingyan Fang and Xuejun Li |
226 | Progressive Multiscale Attention Network for Diabetic Retinopathy | Qiuji Zhou, Yongde Guo, Yifeng Liu and Yanzhen Lin |
229 | Low-Carbon Geographically Distributed Cloud-Edge Task Scheduling | Yingjie Zhu, Ji Qi, Zehao Wang, Shengjie Wei, Yan Chen, Tuo Cao, Gangyi Luo and Zhuzhong Qian |
232 | MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness | Yuhang Li, Mei Wen, Junzhong Shen, Zhaoyun Chen and Yang Shi |
233 | Integrating Blockchain, Smart Contracts, NFTs, and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa Supply Chains | Khanh Hong Vo Hong Vo, Triet Nguyen Minh, Son Ha Xuan, Bang Le, Kha Nguyễn, Hung Nhat Nguyen, Vinh Thanh Nguyen and Minh Van Nguyen |
235 | On-Chain Dynamic Policy Evaluation for Decentralized Access Control | Yepeng Ding, Junwei Yu, Hiroyuki Sato, Tohru Kondo and Yan Bai |
236 | FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing | Ruonan Lin, Yuanyuan Zhang, Renwan Bi, Ruihong Huang and Jinbo Xiong |
238 | The Role of Artificial Intelligence Technologies in Sustainable Urban Development: A Systematic Survey | Maria Rosaria Sessa, Ornella Malandrino and Antonio Cesarano |
241 | PVGwfa: a Multi-level Parallel Sequence-to-graph Alignment Algorithm | Chenchen Peng, Shengbo Tang, Yifei Guo, Zeyu Xia, Canqun Yang and Yingbo Cui |
242 | Enhancing Privacy in Machine Unlearning: Posterior Perturbation against Membership Inference Attack | Chen Chen, Hengzhu Liu, Huanhuan Chi and Ping Xiong |
246 | PEbfs: Implement high-performance breadth-first search on PEZY-SC3s | Weihao Guo, Qinglin Wang, Xiaodong Liu, Muchun Peng, Shun Yang, Yaling Liang, Yongzhen Shi, Ligang Cao and Jie Liu |
250 | DPG-FairFL: A Dual-Phase GAN-based Defense Framework Against Image-based Fairness Data Poisoning Attacks in Federated Learning | Yichen Guo, Xinyi Sheng, Wei Bao and Bing Zhou |
252 | Privacy-Preserving Federated Learning Framework In Response Gaming Systems | Qiong Li, Yizhao Zhu and Kaio Leong |
253 | Textual data de-privatization scheme based on generative adversarial networks | Yanning Du, Jinnan Xu, Yaling Zhang, Yichuan Wang and Zhoukai Wang |
254 | DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios | Long Zhao, Xin Chen, Libo Jiao, Mingyang Xu and Jiyuan Wei |
255 | Modeling and Simulation Verification of Operating Mode Switching of Train Control System Based on Train-to-Train Communication | Qiang Li, Ian Liao, Sheng Wen and Yang Xiang |
256 | Performance Evaluation of NLP Models for European Portuguese: Multi-GPU/Multi-Node Configurations and Optimization Techniques | Daniel Santos, Nuno Miquelina, Daniela Schmidt, Paulo Quaresma and Vítor Beires Nogueira |
257 | FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via Analytical Modeling | Liutao Zheng, Huiying Lan, Xiang Liu, Linshan Jiang and Xuehai Zhou |
258 | Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features | Tianchen Guo, Heming Du, Huan Huo, Bo Liu and Xin Yu |
259 | Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives | Miaohua Zhuo, Dongjun Li, Qinglin Yang, Yuan Zhou, Qilin Li, Yuan Liu and Zhihong Tian |
Paper Submission Due (Extended)
9 June 2024 (AoE)
Author Notification
10 August 2024
Camera-ready for Accepted Paper Due
10 September 2024
05 September 2024 (AoE)
Conference Date
29-31 October 2024