


default search action
24th ICA3PP 2024: Macau, China - Part I
- Tianqing Zhu

, Jin Li
, Aniello Castiglione
:
Algorithms and Architectures for Parallel Processing - 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15251, Springer 2025, ISBN 978-981-96-1524-7 - Xiaofeng Xu

, Weisha Zhang, Yuanyuan Huang
, Hongyu Lu
, Jiazhong Lu
:
Fake News Detection Across Multiple Domains Using Fuzzy Association Rules. 1-20 - Xuhan Zuo

, Minghao Wang
, Dayong Ye
, Shui Yu
:
A Scheme of Dynamic Location Privacy-Preserving with Blockchain in Intelligent Transportation System. 21-39 - Hanyu Xue, Xin Yuan

, Bo Liu
, Ming Ding
:
DBFIA: Diffusion-Based Face Image Anonymization. 40-59 - Jiazheng Quan, Niefeng Wu, Hu Chen

, Yamei Wang, Yuexin Zhang
:
A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-encryption. 60-79 - Tongyaqi Li

, Qingqiang Qi
, Chengyu Hu
, Xuelei Li
, Peng Tang
, Shanqing Guo
:
PFDF: Privacy Preserving Federated Decision Forest for Classification. 80-99 - Chuan Zhang, Xuhao Ren, Haotian Liang, Qing Fan, Xiangyun Tang, Chunhai Li

, Liehuang Zhu, Yajie Wang:
Data-Free Encoder Stealing Attack in Self-supervised Learning. 100-120 - Zihui Zhou, Yutong Gao, Minfeng Qi

:
Data Poisoning Attack Against Reinforcement Learning from Human Feedback in Robot Control Tasks. 121-140 - Mingkang Zhao, Weng Yu, Congcong Zhu:

A Mini-model can Make Machine Unlearning Better. 141-160 - Zehui Wu

, Yuwei Xu
, Ranfeng Huang
, Xinhe Fan
, Jingdong Xu
, Guang Cheng
:
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection. 161-181 - Changsong Yang

, Junfu Wu, Hai Liang, Yong Ding, Yujue Wang:
A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT. 182-200 - Hai Liu

, Fangqiong Li, Hongye Peng:
A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions. 201-221 - Wei Li, Lide Xue

, Ziyang Han
, Bingren Chen
, Xishan Zhang, Xuehai Zhou
:
AutoMiner: Reinforcement Learning-Based Mining Attack Simulator. 222-241 - Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu, Yongjun Wang:

FedSV: A Privacy-Preserving Byzantine-Robust Federated Learning Scheme with Self-validation. 242-260 - Xiang Wu, Aiting Yao

, Shantanu Pal
, Frank Jiang
, Xuejun Li
, Jia Xu
, Chengzu Dong
, Xuefei Chen, Xiuyi Zhang
, Xiao Liu
:
A Dual-Defense Self-balancing Framework Against Bilateral Model Attacks in Federated Learning. 261-270 - Yuxin Zhang

, Hui Han, Guangliang Sun, Wei Wu
, Lin Liu
:
PrivARM: Privacy-Preserving Association Rule Mining in the Cloud. 271-290 - Baoping Liu, Bo Liu

, Ming Ding
:
Outliers are Real: Detecting VLM-Generated Images via One-Class Classification. 291-308 - Yuquan Chu, Peng Liu, Jin Fan, Haocheng Ye

, Tianfan Jiang:
TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting. 309-318 - Weitong Chen

, Zhenxin Zhang
, Huali Ren, Pei-Gen Ye
, Zhengdao Li
, Shanshan Huang:
Temperature-Based Watermarking and Detection for Large Language Models. 319-329 - Axin Xiang

, Youliang Tian
, Jinbo Xiong
, Zuobin Ying
, Changgen Peng:
CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy. 330-340 - Yiran Suo, Jingfeng Xue, Wenjie Guo, Wenbiao Du

, Weijie Han, Chang Xu:
Certificate-Based Transport Layer Security Encrypted Malicious Traffic Detection in Real-Time Network Environments. 341-350 - Yuhang Li, Mei Wen, Junzhong Shen, Zhaoyun Chen

, Yang Shi:
MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness. 351-361 - Chenchen Peng, Shengbo Tang, Yifei Guo

, Zeyu Xia
, Canqun Yang, Yingbo Cui
:
A Vectorized Sequence-to-Graph Alignment Algorithm. 362-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














