


default search action
4th ICDIS 2022: Shenzhen, China
- 4th International Conference on Data Intelligence and Security, ICDIS 2022, Shenzhen, China, August 24-26, 2022. IEEE 2022, ISBN 978-1-6654-5968-6

- Xuan Wang:

Message from the General Chair: ICDIS 2022. xv - Emin Huseynov

:
Passwordless VPN using FIDO2 Security Keys: Modern authentication security for legacy VPN systems. 1-3 - Zoe Lin Jiang, Songjiang Shi, Hongxiao Wang, Peng Yang, Xuan Wang, Yulin Wu, Yantao Zhong, Yan Jia:

Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness. 1-8 - Liyao Xiong, Zoe Lin Jiang, Yi Huang, Jianzong Wang, Jing Xiao, Weizhe Zhang, Xuan Wang:

Efficient Private Set Intersection Based on Functional Encryption. 9-15 - Yang Song, Haiying Gao:

Token Open Security Model for Updatable Encryption. 16-21 - Zechao Liu, Jing He, Ran Shi:

Feature Selection of Intrusion Detection Method Based on Improved GWO. 22-26 - Zechao Liu, Ran Shi, Mingyu Lei, Yulin Wu:

Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVM. 27-30 - Brian Lewandowski, Randy C. Paffenroth

, Kayleigh Campbell:
Improving Network Intrusion Detection Using Autoencoder Feature Residuals. 31-39 - Utkarsh Verma, Yonghong Huang, Carl Woodward, Craig Schmugar, Prashanth Palasamudram Ramagopal, Celeste Fralick:

Attacking Malware Detection using Adversarial Machine Learning. 40-49 - Yupan Chen, Zhihong Liu:

HLT: A Hierarchical Vulnerability Detection Model Based on Transformer. 50-54 - Zhendong Wu, Shan Li, Bin Wang, Tianjian Liu, Yongsheng Zhu, Chenming Zhu, Mingqing Hu:

Detecting Vulnerabilities in Ethereum Smart Contracts with Deep Learning. 55-60 - Xiangkai Yang, Wenjian Luo, Licai Zhang, Zhijian Chen, Jiahai Wang:

Data Leakage Attack via Backdoor Misclassification Triggers of Deep Learning Models. 61-66 - Wenchao Wang, Chuanyi Liu, Zhaoguo Wang, Tiancai Liang:

FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples. 67-74 - Minghua Hou, Linlin Tang, Shuhan Qi, Yang Liu

:
A Robust Watermarking Method For Image Processing Models. 75-81 - Kriti Rai Saini, Vinayak Jigajinni, Jaya Dofe:

Performance Comparison of Cryptosystems in Context to Internet of Things. 82-87 - Chenxu Wang, Ming Zhang

, Jinjing Zhao, Xiaohui Kuang:
Black-Box Adversarial Attacks on Deep Neural Networks: A Survey. 88-93 - Ying Hu, Wanqiu Zhang, Yong Zhang:

A BSO-based Feature Selection Algorithm Under Privacy Protection. 94-98 - Hao Jiang, Yuerong Liao, Qianwei Yu:

A Negative Survey based Method for Preserving Topology Privacy in Social Networks. 99-104 - Ran Liu, Tian Gao, Mingqiang Guo:

Reconstructing Negative Survey with Least Squares Criterion. 105-110 - Ran Liu, Fengzhen Yu, Mingqiang Guo:

Accuracy Prediction of Negative Surveys. 111-117 - Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian:

NegDL: Privacy-preserving Deep Learning Based on Negative Database. 118-126 - Qian Chen, Lin Yao, Yulin Wu, Xuan Wang, Weizhe Zhang, Zoe Lin Jiang, Yang Liu, Mamoun Alazab:

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption. 127-133 - Zoe Lin Jiang, Yijian Pan, Maoshun Fan, Lin Yao, Yang Liu, Yulin Wu, Siu-Ming Yiu, Xuan Wang, Junbin Fang

:
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature. 134-141 - Chuan Zhang, Chenfei Hu, Mingyang Zhao, Yulin Wu, Tong Wu:

Achieving Efficient and Privacy-Preserving Arbitrary Geographic Range Query for Cloud. 142-147 - Peiyi Han, Yunzhe Guo, Shaoming Duan, Chuanyi Liu, Yuxing Zhou:

Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption. 148-154 - Yili Fang, Tao Yang:

Empirical Study on Frequency Adversarial Perturbation for Medical Image Privacy Protection. 155-159 - Walaa Alnasser, Ghazaleh Beigi, Ahmadreza Mosallanezhad, Huan Liu:

PPSL: Privacy-Preserving Text Classification for Split Learning. 160-167 - Shuting Jiao, Shu Zhang, Feng Gao, Ting Wang:

Data Security Search Based on Semi-Supervised Sensitive Classifier. 168-173 - Christoph Lipps, Jan Herbst, Rekha Reddy, Lars Franke, Sven Becker, Marco Rahm, Hans Dieter Schotten:

Reconfigurable Intelligent Surfaces: A Physical Layer Security Perspective. 174-181 - Patrick Nnaji

, Harsh Kumar
, Sanjeev Kumar:
Wireless Smart Electric Meter Operation under Data Security Attacks. 182-187 - Angelo Saadeh, Vaibhavi Kumari, Stéphane Bressan:

Epsilon-Differentially Private and Fully Secure Logistic Regression on Vertically Split Data. 188-193 - Dejun Xiang, Rui Zhou, Lingfei Ma, Qingming Zeng, Ximing Fu

, Qiang Wang, Bin Chen, Yan Jia:
Decoupling Consensus and Storage in Consortium Blockchains by Erasure Codes. 194-199 - Jinhui Liu, Bowen Zhang

, Di Wu, Mingjie Li, Bo Tang:
A Secure and Large-Scale Multiparty Conditional Payment Scheme based on Blockchain. 200-207 - Hao Lin, Weiqi Luo

, Kangkang Wei, Minglin Liu:
IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTION. 208-212 - Nabil Shawkat, Jesse Simpson, Jamil Saquer:

Evaluation of Different ML and Text Processing Techniques for Hate Speech Detection. 213-219 - Huan Zhang, Rongliang Chen, Kangfeng Zheng, Liang Gu, Xiujuan Wang:

Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction. 220-227 - Yutong Wu, Han Qiu, Tianwei Zhang, Jiwei Li, Meikang Qiu:

Watermarking Pre-trained Encoders in Contrastive Learning. 228-233 - Daohui Ge, Yunan Li

, Bingwen Jia, Ruyi Liu
, Qiguang Miao
:
MCTrack: Multi-Head Contrastive Network for Visual Tracking. 234-241 - Ye Ding, Qi Wan, Ziyuan Liu, Jie Wang:

MultiShadow: Shadow Synthesis for Multiple Virtual Objects. 242-247 - Huang Yi Gong, Feng Chun Hui, Bai Dan Dan:

IReF: Improved Residual Feature For Video Frame Deletion Forensics. 248-253 - RongPing Zou, Bin Zhu, Yi Chen, Bo Xie:

Vision and Knowledge Bimodal Fine-grained Recognition Based on Hierarchical Structured Knowledge Extraction. 254-260 - Mengxi Ya, Tao Dai, Ling Liu, Jieyin Lv, Shu-Tao Xia:

Context Feature Guided Network for Image Super-resolution. 261-266 - Cong Li, Yuan Rao, Jian Yang, Kai Yang, Hao Fan, Junyu Dong:

Calibrated Relighting Network for Image Light Transfer. 267-274 - Kai Yang, Yumeng Jiang, Lin Qi, Hao Fan, Shu Zhang, Junyu Dong:

Visual Semantic SLAM Based on Examination of Moving Consistency in Dynamic Scenes. 275-282 - Zhizhi Zhang, Zihan Ji:

Open-set Pets Facial Recognition Using Deep Learning and Statistical Learning. 283-287 - Turky N. Alotaiby, Saleh A. Alshebeili

, Gaseb Alotibi
, Ghaith N. Alotaibi:
Recurrence Quantification Analysis for PPG/ECG-Based Subject Authentication. 288-291 - Qiong Liu, Yangcheng Zhou, Wei Liu, Guangrui Li, Chenxu Li, Wenbai Chen:

RGCFace: Regularized Global Center loss for Deep Facial Expression Recognition. 292-297 - Jingxu Huang, Lang Xiang, Guangrui Li, Qiong Liu:

A Light Model for Corrosion Segmentation with Multi-Scale Information and CRF. 298-305 - Xun Du, Zhenchao Tao, Lei Li:

Dynamic Graph Pattern Matching in Medical Knowledge Graphs. 306-313 - Chong Mo, Ye Wang, Yan Jia, Cui Luo, Ye Ding:

Temporal Knowledge Graph Reasoning based on Graph Convolution Network. 314-320 - Dafeng Zhang, Xingwei Wang, Qiang He, Fei Gao, Bo Yi, Min Huang:

Cultural Resource Recommender System with Knowledge Graph Convolutional Network. 321-328 - Li Ni, Qi Zhou, Wei Li, Yiwen Zhang:

Cluster Affiliation Model for Local Community Detection. 329-335 - Zirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu:

Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning. 336-343 - Wenbai Chen, Guohong Yi, Huixiang Liu, Qili Chen, Weizhao Chen, Peiliang Wu:

Fast classification of indoor functional areas based on a pre-trained lightweight network. 344-349 - Jiayang Wu, Wensheng Gan, Zhenlian Qi:

Behavioral Sequence Classification with Constraints. 350-357 - Tingfu Zhou, Wensheng Gan, Zhenlian Qi:

Weighted Contiguous Sequential Pattern Mining. 358-365 - Zhenqiang Ye, Shicheng Wan, Wensheng Gan, Jiahui Chen, Linlin Tang:

Fuzzy Utility Mining on Temporal Data. 366-373 - Wakana Maeda, Yuji Higuchi, Kazuhiro Minami, Ikuya Morikawa:

Membership Inference Countermeasure With A Partially Synthetic Data Approach. 374-381 - Song Qin, Lei Zhang, Shuhan Qi, Jiajia Zhang, Huale Li, Xuan Wang, Jing Xiao:

EFDO: Solving Extensive-Form Games Based On Double Oracle. 382-387 - Huale Li, Shuhan Qi, Jiajia Zhang, Dandan Zhang, Lin Yao, Xuan Wang, Qi Li, Jing Xiao:

NFSP-PER: An efficient sampling NFSP-based method with prioritized experience replay. 388-393 - Yanglin Liu, Yang Liu, Mehdi Gheisari:

CFDMA: A Novel Click Fraud Detection Method in Mobile Advertising. 394-401 - Yifan Liu, Yuan Rao, Guanqi Qi, Hao Fan, Junyu Dong:

Robust Initialization for Stereo Visual-Inertial SLAM with Polar-Based Gravity Estimation. 402-407 - Huansheng Ning, Zhangfeng Pi, Wenxi Wang

, Fadi Farha
, Shunkun Yang:
A Review on Serious Games for Disaster Relief. 408-414 - Qi Qiu, Junyi He, Tao Zhu

:
DE with A new population initialization method for the dynamic multidimensional knapsack problems. 415-421 - Yuqi Sun, Xuan Wang, Yi Zheng, Lin Yao, Shuhan Qi, Linlin Tang, Hong Yi, Kunlei Dong:

Underwater Object Detection with Swin Transformer. 422-427 - Jiajia Zhang, Mingxin Zhan, Shuhan Qi, Nanwei Yu, Dongrun Zheng, Xuan Wang, Jing Xiao:

Information Entropy of Uncertainty Control: An Uncertainty Management Method in Imperfect Information Games. 428-434 - Jiajia Zhang, Zengyue Guo, Huale Li

, Xuan Wang, Dongming Liu, Shuhan Qi:
LwDeepStack: A lightweight DeepStack based on knowledge distillation. 435-441 - Dongrun Zheng, Jiajia Zhang, Xuan Wang, Xiao Guo, Jing Xiao:

Dual Feature Fusion Trade Execution Framework with DDQN. 442-446 - Furong Duan, Tao Zhu

, Jinqiang Wang, Zhenyu Liu:
A Multiscale Windows Deep Learning Aproach For Sensor-Based Human Activity Recogniton. 447-452 - Malik Ali Judge, Awais Manzoor

, Saif ul Islam, Ishfaq Ahmad:
Intelligent Residential Demand Response Optimization under Real-time Pricing: A Comparison of Heuristics. 456-462 - Jingya Zang, Anguo Dong:

Stylistic Pattern Guided Tip Extraction from Music Reviews. 463-468 - Houjun Liang, Rui Xie, Wanhuai Zhou, Bo Li

, Dianjie Bi, Hao Chang:
Extended Grey Model Based on Particle Swarm Optimization and Its Application in Cotton Yield Prediction. 469-473 - Xiao Wu, Dekang Zhang, Xiaorui Liu:

Primary Study on the Face-recognition Framework with anti-spoofing function. 474-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














