


default search action
24th ICA3PP 2024: Macau, China - Part I
- Tianqing Zhu
, Jin Li
, Aniello Castiglione
:
Algorithms and Architectures for Parallel Processing - 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15251, Springer 2025, ISBN 978-981-96-1524-7 - Xiaofeng Xu
, Weisha Zhang, Yuanyuan Huang
, Hongyu Lu
, Jiazhong Lu
:
Fake News Detection Across Multiple Domains Using Fuzzy Association Rules. 1-20 - Xuhan Zuo
, Minghao Wang
, Dayong Ye
, Shui Yu
:
A Scheme of Dynamic Location Privacy-Preserving with Blockchain in Intelligent Transportation System. 21-39 - Hanyu Xue, Xin Yuan
, Bo Liu
, Ming Ding
:
DBFIA: Diffusion-Based Face Image Anonymization. 40-59 - Jiazheng Quan, Niefeng Wu, Hu Chen
, Yamei Wang, Yuexin Zhang
:
A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-encryption. 60-79 - Tongyaqi Li
, Qingqiang Qi
, Chengyu Hu
, Xuelei Li
, Peng Tang
, Shanqing Guo
:
PFDF: Privacy Preserving Federated Decision Forest for Classification. 80-99 - Chuan Zhang, Xuhao Ren, Haotian Liang, Qing Fan, Xiangyun Tang, Chunhai Li
, Liehuang Zhu, Yajie Wang:
Data-Free Encoder Stealing Attack in Self-supervised Learning. 100-120 - Zihui Zhou, Yutong Gao, Minfeng Qi
:
Data Poisoning Attack Against Reinforcement Learning from Human Feedback in Robot Control Tasks. 121-140 - Mingkang Zhao, Weng Yu, Congcong Zhu:
A Mini-model can Make Machine Unlearning Better. 141-160 - Zehui Wu
, Yuwei Xu
, Ranfeng Huang, Xinhe Fan
, Jingdong Xu
, Guang Cheng
:
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection. 161-181 - Changsong Yang
, Junfu Wu, Hai Liang, Yong Ding, Yujue Wang:
A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT. 182-200 - Hai Liu, Fangqiong Li, Hongye Peng:
A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions. 201-221 - Wei Li, Lide Xue
, Ziyang Han
, Bingren Chen
, Xishan Zhang, Xuehai Zhou
:
AutoMiner: Reinforcement Learning-Based Mining Attack Simulator. 222-241 - Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu, Yongjun Wang:
FedSV: A Privacy-Preserving Byzantine-Robust Federated Learning Scheme with Self-validation. 242-260 - Xiang Wu, Aiting Yao
, Shantanu Pal
, Frank Jiang
, Xuejun Li
, Jia Xu
, Chengzu Dong
, Xuefei Chen, Xiuyi Zhang
, Xiao Liu
:
A Dual-Defense Self-balancing Framework Against Bilateral Model Attacks in Federated Learning. 261-270 - Yuxin Zhang
, Hui Han, Guangliang Sun, Wei Wu
, Lin Liu
:
PrivARM: Privacy-Preserving Association Rule Mining in the Cloud. 271-290 - Baoping Liu, Bo Liu
, Ming Ding
:
Outliers are Real: Detecting VLM-Generated Images via One-Class Classification. 291-308 - Yuquan Chu, Peng Liu, Jin Fan, Haocheng Ye
, Tianfan Jiang:
TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting. 309-318 - Weitong Chen
, Zhenxin Zhang
, Huali Ren, Pei-Gen Ye
, Zhengdao Li
, Shanshan Huang:
Temperature-Based Watermarking and Detection for Large Language Models. 319-329 - Axin Xiang
, Youliang Tian
, Jinbo Xiong
, Zuobin Ying
, Changgen Peng:
CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy. 330-340 - Yiran Suo, Jingfeng Xue, Wenjie Guo, Wenbiao Du
, Weijie Han, Chang Xu:
Certificate-Based Transport Layer Security Encrypted Malicious Traffic Detection in Real-Time Network Environments. 341-350 - Yuhang Li, Mei Wen, Junzhong Shen, Zhaoyun Chen
, Yang Shi:
MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness. 351-361 - Chenchen Peng, Shengbo Tang, Yifei Guo
, Zeyu Xia
, Canqun Yang, Yingbo Cui
:
A Vectorized Sequence-to-Graph Alignment Algorithm. 362-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.