网安顶刊IEEE Transactions on Dependable and Secure Computing

本文涉及的产品
密钥管理服务KMS,1000个密钥,100个凭据,1个月
简介: 网安顶刊IEEE Transactions on Dependable and Secure Computing

写在最前面

为了给自己找论文方向,看了看安全的顶刊最近都发了哪些论文

不过后面找到了另一篇博客,感觉更有用hh

指路:

CSDN博主「riusksk」https://blog.csdn.net/riusksk/article/details/131278262

ChatGPT在计算机领域的翻译质量还是欠缺一些,翻译出来的中文有的不够自然,经常完全按照英文的表达方式来,导致中文特别长,很绕。GPT4的翻译效果相对ChatGPT效果要好,会长句变短句,表达顺序更符合中文逻辑,更自然。因此,本文主要用GPT4翻译,Claude对所有议题摘要进行长文总结。

之后直接看那位博主的整理啦

IEEE Transactions on Dependable and Secure Computing

Table of Contents(March-April 2023)Volume 20, Issue 2

战胜针对迁移学习的错误分类攻击

Defeating Misclassification Attacks Against Transfer Learningpp. 886-901

by Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang

用API Knowledgepp减缓基于学习的恶意软件检测器的老化

Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledgepp. 902-916

by Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang

捕获无效输入操作以进行内存损坏诊断

Capturing Invalid Input Manipulations for Memory Corruption Diagnosispp. 917-930

by Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming

去中心化匿名支付中的法规遵从性和强制执行

Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Paymentpp. 931-943

by Liang Xue, Dongxiao Liu, Jianbing Ni, Xiaodong Lin, Xuemin Sherman Shen

安全隐私保护的智能车辆导航系统

A Security and Privacy Preserved Intelligent Vehicle Navigation Systempp. 944-959

by Barnana Baruah, Subhasish Dhal

个性化局部差分隐私保护回归模型

Protecting Regression Models With Personalized Local Differential Privacypp. 960-974

by Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li

你不能总是得到你想要的:android上用户控制的隐私。975-987

You Can’t Always Get What You Want: Towards User-Controlled Privacy on Androidpp. 975-987

by Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo

联邦学习聚合服务:一种高效、安全、更具弹性的实现

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realizationpp. 988-1001

by Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang

VOLERE:基于个人语音挑战的抗泄漏用户认证协议

VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challengespp. 1002-1016

by Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng

I Know Your Social Network Accounts:一种新颖的设备身份关联攻击架构

I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Associationpp. 1017-1030

by Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang

屏蔽:屏蔽运行有漏洞软件的有限资源物联网设备内的跨区域通信

ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stackpp. 1031-1047

by Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza

一种可解释的自动编码器:基于决策树的自动编码器及其在异常检测中的应用

Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detectionpp. 1048-1059

by Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey

CryptoMaze:链下支付的隐私保护拆分

CryptoMaze: Privacy-Preserving Splitting of Off-Chain Paymentspp. 1060-1073

by Subhra Mazumdar, Sushmita Ruj

STRisk:评估黑客入侵风险的社会技术方法

STRisk: A Socio-Technical Approach to Assess Hacking Breaches Riskpp. 1074-1087

by Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim

轻量级:用于嵌入式集成电子系统的轻量级认证

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systemspp. 1088-1103

by Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo

SparkAC:用于安全数据共享和分析的Spark细粒度访问控制

SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analyticspp. 1104-1123

by Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng

裸金属嵌入式设备内存破坏漏洞的发现与识别

Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devicespp. 1124-1138

by Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes, Bruno Crispo

网络入侵检测系统的对抗样本检测,1139-1153

MANDA: On Adversarial Example Detection for Network Intrusion Detection Systempp. 1139-1153

by Ning Wang, Yimin Chen, Yang Xiao, Yang Hu, Wenjing Lou, Y. Thomas Hou

抵御网络攻击的成本高效冗余规划

Redundancy Planning for Cost Efficient Resilience to Cyber Attackspp. 1154-1168

by Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu

在线小额信贷欺诈代理检测:一个大规模的实证研究

Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Studypp. 1169-1185

by Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah

通过语用理解和可视化进行网络信息检索

Cyber Information Retrieval Through Pragmatics Understanding and Visualizationpp. 1186-1199

by Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang

16年的网络钓鱼用户研究:我们学到了什么?

Sixteen Years of Phishing User Studies: What Have We Learned?pp.1200 - 1212

by Shahryar Baki, Rakesh M. Verma

基于社交活动网络增强Sybil检测:随机游走方法

Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approachpp. 1213-1227

by Xiaoying Zhang, Hong Xie, Pei Yi, John C.S. Lui

PressPIN:通过结构传播Soundspp. 1228-1242在移动设备上启用安全的PIN身份验证

PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Soundspp. 1228-1242

by Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang

基于多方计算的大规模恶意安全高效全基因组关联研究

Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computationpp. 1243-1257

by Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma

Stick:为社交网络平台量身定制的端到端加密协议

Stick: An End-to-End Encryption Protocol Tailored for Social Network Platformspp. 1258-1269

by Omar Basem, Abrar Ullah, Hani Ragab Hassen

情境敏感网络漏洞的最优分类和缓解方法研究

Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilitiespp. 1270-1285

by Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah, Xinming Ou

HIBEChain:面向大规模IoTpp的基于分层身份的区块链系统。

HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoTpp.1286 - 1301

by Zhiguo Wan, Wei Liu, Hui Cui

用于加密货币网络异常检测的轻量级标识符无关引擎

Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detectionpp. 1302-1318

by Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang

面向高效隐私保护的单云用户自定义Skyline查询

Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloudpp. 1319-1334

by Songnian

Table of Contents(Sept.-Oct. 2023)Volume 20, Issue 5

改进的分布式秘密共享协议

Improved Protocols for Distributed Secret Sharingpp. 3558-3571

by Roberto De Prisco, Alfredo De Santis, Francesco Palmieri

Go-Sharing:一种基于区块链的跨社交网络照片分享隐私保护框架

Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharingpp. 3572-3587

by Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng

基于密度聚类的密码猜测规则生成

Mangling Rules Generation With Density-Based Clustering for Password Guessingpp. 3588-3600

by Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu, Hanguang Luo

VOSA:面向隐私保护联邦学习的可验证不经意安全聚合

VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learningpp. 3601-3616

by Yong Wang, Aiqing Zhang, Shu Wu, Shui Yu

Smaug:一个tee辅助的安全SQLite嵌入式系统

Smaug: A TEE-Assisted Secured SQLite for Embedded Systemspp. 3617-3635

by Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma

ZeroProKeS:一种面向大规模低成本应用的安全零配置密钥建立协议

ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applicationspp. 3636-3652

by Shahnewaz Karim Sakib, George T Amariucai, Yong Guan

你的标签正在出卖你:垂直联邦学习中的关系泄漏pp. 3653-3668

Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learningpp. 3653-3668

by Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang

基于矩阵的加密图像可逆信息隐藏秘密共享算法

Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Imagespp. 3669-3686

by Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang

为硬件安全探索手写签名图像特征ypp. 3687-3698

Exploring Handwritten Signature Image Features for Hardware Securitypp. 3687-3698

by Mahendra Rathor, Anirban Sengupta, Rahul Chaurasia, Aditya Anshul

逃离共识:即时修订的区块链协议在无权限设置pp. 3699-3715

Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Settingpp. 3699-3715

by Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang

隐式锤:通过隐式访问跨权限边界的Rowhammer

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accessespp. 3716-3733

by Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou

Snoopy:面向大规模监控epp的有限查询网页指纹框架。

Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillancepp.3734 - 3752

by Gargi Mitra, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan, V. Kamakoti

减轻针对钓鱼检测器3753-3769的对抗灰盒攻击

Mitigating Adversarial Gray-Box Attacks Against Phishing Detectorspp. 3753-3769

by Giovanni Apruzzese, V. S. Subrahmanian

面向加密数据的高效隐私保护空间关键词相似性查询

Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Datapp. 3770-3786

by Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao

基于深度生成模型的可复制隐写

Cover Reproducible Steganography via Deep Generative Modelspp. 3787-3798

by Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu

通过Logits分布对深度学习模型的成员推断攻击

Membership Inference Attacks Against Deep Learning Models via Logits Distributionpp. 3799-3808

by Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li

MRSA: 5G HetNetspp中高效安全切换认证的掩码随机阵列协议。

MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNetspp.3809 - 3827

by Yibing Liu, Lijun Huo, Jun Wu, Mohsen Guizani

基于向量置换和移位排序的可撤销指纹模板构造。

Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Orderingpp.3828 - 3844

by Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang

通过硬件木马感染的同步泄露无线芯片

Leaking Wireless ICs via Hardware Trojan-Infected Synchronizationpp. 3845-3859

by Alán Rodrigo Díaz-Rizo, Hassan Aboushady, Haralampos-G.Stratigopoulos

增强隐私的证书透明度3860-3872

Certificate Transparency With Enhanced Privacypp. 3860-3872

by Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur

基于认证矩阵提交的高效可验证无界大小数据库3873-3889

Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitmentpp. 3873-3889

by Haining Yang, Dengguo Feng, Jing Qin

互联网规模的指纹识别在网络空间重用和重命名物联网设备

Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspacepp. 3890-3909

by Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun

差分私有分布频率估计

Differentially Private Distributed Frequency Estimationpp. 3910-3926

by Mengmeng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Tianqing Zhu, Jun Zhao

差分隐私化频率分布中同质性攻击的泄露风险

Disclosure Risk From Homogeneity Attack in Differentially Privately Sanitized Frequency Distributionpp. 3927-3939

by Fang Liu, Xingyuan Zhao

一种面向智能电网的隐私保护状态估计方案3940-3956

A Privacy-Preserving State Estimation Scheme for Smart Gridspp. 3940-3956

by Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota

使用数据起源和度量学习的高级持续性威胁检测

Advanced Persistent Threat Detection Using Data Provenance and Metric Learningpp. 3957-3969

by Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee

说话人识别中音频对抗样本的理解和缓解研究

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognitionpp. 3970-3987

by Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

基于安全电子医疗系统3988-4001敏感数据集的决策树评估

Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systemspp. 3988-4001

by Mingwu Zhang, Yu Chen, Willy Susilo

边缘异常点的发现:基于异常值暴露的跨竖井联邦学习的DDoS检测pp. 4002-4015

Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detectionpp. 4002-4015

by Vahid Pourahmadi, Hyame Assem Alameddine, Mohammad Ali Salahuddin, Raouf Boutaba

基于恒Q谱草图和GA-SVMpp的音频复制粘贴篡改检测。

Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVMpp.4016 - 4031

4016-4031

by Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang, Xin Yao

Sm中混合的安全访问控制方法(ABAC和RBAC)

Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Sm

by Safwa Ameer, James Benson, Ravi Sandhu

ESMAC:基于TEE的多级数据处理高效安全的多用户访问控制

ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processingpp. 4052-4069

by Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan

ADCaDeM:一种基于差分流形的攻击损伤计算新方法4070-4084

ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifoldspp. 4070-4084

by Zhen Liu, ChangZhen Hu, Chun Shan, Zheng Yan

通用且敏感的网络时间隐蔽信道异常检测方法

Generic and Sensitive Anomaly Detection of Network Covert Timing Channelspp. 4085-4100

by Haozhi Li, Tian Song, Yating Yang

亚线性圆复杂度的差分不经意两方模式匹配ypp. 4101-4117

Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexitypp. 4101-4117

by Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu

生成隐写的秘密到图像可逆变换

Secret-to-Image Reversible Transformation for Generative Steganographypp. 4118-4134

by Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi

我仍然知道你去年夏天做了什么:通过流量分析推断敏感用户在消息传递应用程序上的活动

I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysispp. 4135-4153

by Ardavan Bozorgi, Alireza Bahramali, Fateme Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley

使用Quorum证书增强区块链挖掘透明度

Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificatepp. 4154-4168

by Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng

量化攻击树分析的高效通用算法

Efficient and Generic Algorithms for Quantitative Attack Tree Analysispp. 4169-4187

by Milan Lopuhaä-Zwakenberg, Carlos E. Budde, Mariëlle Stoelinga

MARNet:针对协作多智能体强化学习的后门攻击

MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learningpp. 4188-4198

by Yanjiao Chen, Zhicong Zheng, Xueluan Gong

基于分层分组变长编码的云安全可逆数据隐藏算法

Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Securitypp. 4199-4213

by Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang

Cure-GNN:抗对抗攻击的鲁棒曲率增强图神经网络4214-4229

Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attackspp. 4214-4229

by Yang Xiao, Zhuolin Xing, Alex X. Liu, Lei Bai, Qingqi Pei, Lina Yao

建立安全联邦学习互信的多洗牌器框架pp. 4230-4244

A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learningpp. 4230-4244

by Zan Zhou, Changqiao Xu, Mingze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu

云环境下实现高效的隐私保护神经网络训练与预测

Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environmentspp. 4245-4257

by Chuan Zhang, Chenfei Hu, Tong Wu, Liehuang Zhu, Ximeng Liu

PolyCosGraph:一种隐私保护的可撤销脑电生物识别系统

PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric Systempp. 4258-4272

by Min Wang, Song Wang, Jiankun Hu

面向多域协同防御的网络威胁情报共享

Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entitiespp. 4273-4290

by Soumya Purohit, Roshan Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, Prasad Calyam

FIDO得到验证:通用认证框架协议4291-4310的形式化分析

FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocolpp. 4291-4310

by Haonan Feng, Jingjing Guan, Hui Li, Xuesong Pan, Ziming Zhao

SofitMix:一个安全的链下支持比特币兼容的混合协议

SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocolpp. 4311-4324

by Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao

基于区块链的资源受限物联网设备公平云审计

Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devicespp. 4325-4342

by Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng

PEBA:增强用户隐私保护及安全浏览服务覆盖

PEBA: Enhancing User Privacy and Coverage of Safe Browsing Servicespp. 4343-4358

by Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang

SlimBox:轻量级加密流量包检测

SlimBox: Lightweight Packet Inspection over Encrypted Trafficpp. 4359-4371

by Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang

一种面向区块链扩展的分布式隐私感知高通量交易调度方法

A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchainpp. 4372-4386

by Xiaoyu Qiu, Wuhui Chen, Bingxin Tang, Junyuan Liang, Hong-Ning Dai, Zibin Zheng

PRkNN:面向加密数据的高效隐私保护反向kNN查询

PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Datapp. 4387-4402

by Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu

一种智能系统的混合威胁模型

A Hybrid Threat Model for Smart Systemspp. 4403-4417

by Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu

Hercules:提高隐私保护联邦学习的性能

Hercules: Boosting the Performance of Privacy-Preserving Federated Learningpp. 4418-4433

by Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng

计数型布隆过滤器在黑盒攻击下的隐私保护研究

On the Privacy of Counting Bloom Filters Under a Black-Box Attackerpp. 4434-4440

by Sergio Galán, Pedro Reviriego, Stefan Walzer, Alfonso Sánchez-Macian, Shanshan Liu, Fabrizio Lombardi

基于格的多级秘密共享方案的安全性研究

On the Security of a Lattice-Based Multi-Stage Secret Sharing Schemepp. 4441-4442

by Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu

目录
相关文章
|
算法 Serverless 语音技术
Mel-Frequency Cepstral Coefficients,简称 MFCCs
频率倒谱系数(Mel-Frequency Cepstral Coefficients,简称 MFCCs)是一种在语音信号处理中常用的特征提取方法。MFCCs 是通过对语音信号进行傅里叶变换
151 1
|
存储 关系型数据库 索引
Storage Developer Conference 2020总结
Storage Developer Conference 2020总结
71 0
|
机器学习/深度学习 自然语言处理 PyTorch
Re6:读论文 LeSICiN: A Heterogeneous Graph-based Approach for Automatic Legal Statute Identification fro
Re6:读论文 LeSICiN: A Heterogeneous Graph-based Approach for Automatic Legal Statute Identification fro
Re6:读论文 LeSICiN: A Heterogeneous Graph-based Approach for Automatic Legal Statute Identification fro
Re8:读论文 Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Case
Re8:读论文 Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Case
Re8:读论文 Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Case
|
架构师 设计模式 测试技术
谈谈我理解的SA——Systems Architecture
什么是SA? SA即Systems Architecture,是系统体系结构。 系统体系结构是定义系统的结构、行为和系统视图的概念模型。架构师将其系统的形式化描述或表示出来,以支持结构和行为的推理的方式组织。
2618 0
|
网络协议 Linux 块存储
|
网络协议 Linux 虚拟化
|
关系型数据库 物联网 对象存储
Sharing, Storing, and Computing Massive Amounts of Data
Data is crucial to the operation of any business.
1656 0