default search action
20th ICIC 2024: Tianjin, China - Part IX
- De-Shuang Huang, Wei Chen, Jiayang Guo:
Advanced Intelligent Computing Technology and Applications - 20th International Conference, ICIC 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part IX. Lecture Notes in Computer Science 14870, Springer 2024, ISBN 978-981-97-5605-6
Information Security
- Jian-Xun Mi, Xiangjin Zhao, Yongtao Chen, Xiao Cheng, Peng Tian, Xiaohong Lv, Jiayong Zhong:
Non-targeted Adversarial Attacks on Object Detection Models. 3-12 - Rongna Xie, Xiaoyu Chen, Xinru Zhang, Guang Yang, Guozhen Shi:
Block Cipher Algorithms Identification Scheme Based on KFDA. 13-24 - Haizhou Bao, Minhao Chen, Yiming Huo, Guorong Yu, Lei Nie, Peng Li, Yuxuan Wang:
Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and LSTM. 25-37 - Hao Huang, Wentao Chen, Weidong Fang, Wei Chen, Wai-Hung Ip, Kai-Leung Yung:
A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid. 38-48 - Xiaochun Wu, Jiawang Zhang, Qi Yao, Wanli Lyu:
Reversible Data Hiding Based on Octree Partitioning and Arithmetic Coding in Encrypted Three-Dimensional Mesh Models. 49-60 - Chang Liu, Xiaowei He, Bin Wang, Xinru Sun, Yixuan Luo, Yiji Zeng, Xinyu Wang, Jianhang Wang, Haofei Zhao:
A Differential Privacy Federated Learning Scheme with Improved Noise Perturbation. 61-71 - Liang Wang, Hao Chen, Lina Zuo, Haibo Liu:
U-shaped Vertical Split Learning with Local Differential Privacy for Privacy Preserving. 72-81 - Zhihua Liu, Shenquan Liu, Jian Zhang:
An Intrusion Detection Method for Industrial Internet Fusing Multi-Scale TCN and Transformer Network. 82-96 - Chao-Hsien Hsieh, Fengya Xu, Dehong Kong, Qingqing Yang, Yue Ma:
CSQF-BA: Efficient Container Query Technology for Cloud Security Query Framework with Bat Algorithm. 97-109 - Ruizhong Du, Xijie She, Mingyue Li, Ziyuan Wang:
Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions. 110-121 - Songyang Wu, Bochen Shen, Hao Zheng, Wenqi Sun, Qi Sun, Shuang Wang:
FedURL: A BERT-based Federated Malicious URL Detection Framework. 122-131 - Li Wen, Pengfei Xue, Yi Shen, Wanmeng Ding, Min Zhang:
Show Criminals' True Color: Chinese Variant Toxic Text Restoration Based on Pointer-Generator Network. 132-145 - Ziyuan Yang, Haipeng Qu, Ying Hua, Xiaoshuai Zhang, Xijun Lin:
Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning. 146-157 - Zhihao Shi, Yaozong Xu, Maode Ma, Yanan Zhang:
An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks. 158-167 - Botao Zhang, Fan Shi, Chengxi Xu, Pengfei Xue, Jiankun Sun:
CAKGC: A Clustering Method of Cybercrime Assets Knowledge Graph Based on Feature Fusion. 168-185 - Yisheng Li, Xuekang Peng, Zhichao Lian:
Multi-texture Fusion Attack: A Robust Adversarial Camouflage in Physical World. 186-198 - Rui Jing, Wei Chen, Xiaoxin Wu, Zehua Wang, Zijian Tian, Fan Zhang:
When Blockchain Meets Asynchronous Federated Learning. 199-207 - Taiqiang Li, Zhen Zhang, Heng Qian, Qiuyue Wang, Guanqun Su, Lingzhen Meng:
A High-Dimensional Data Trust Publishing Method Based on Attention Mechanism and Differential Privacy. 208-219 - Lei Wu, Xiaofeng Zhong, Jingju Liu, Xiang Wang:
PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains. 220-232 - Chenghang Huo, Jindong Cui, Ru Ma, Yunfei Luo, Fuzhi Zhang:
Spammer Group Detection Approach Based on Deep Reinforcement Learning. 233-244 - Chenting Li, Dan Li, Yuqian Zhou:
A Dual Auditing Scheme of Cross-Chain Data Shared Among the Blockchain Network. 245-256 - Yanan Zhang, Jingru Xing, Yaozong Xu, Maode Ma, Cong Wang:
DM-CIFA: Detection and Mitigation of Collusion Interesting Flooding Attacks in NDNs. 257-266 - Zhongjie Mi, Xinghao Jiang, Tanfeng Sun, Ke Xu, Qiang Xu, Laijin Meng:
Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal Inconsistencies. 267-280 - Zeshuai Li, Xiaoyan Liang:
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning. 281-293 - Jialiang Wang, Liuyang Nie, Zhaojun Gu, Huan Zhao:
Real-Time Detection for GPS Spoofing of Quad-Rotor Helicopter Based on Data Fusion. 294-305 - Shaojie Ji, Yan Liu, Xiaoyu Guo, Mengmeng Jia:
The Micro-scale Adversarial Detection Algorithm for Overlapping Communities Based on Genetic Algorithms. 306-315 - ShenHong Cao, Kaixi Wang, Yanbin Fan:
Steganalysis of VoIP Streams via Bidirectional Correlation Extract Network. 316-327 - Hao Fan, Zhaoyang Ma, Yong Li, Rui Tian, Yunli Chen, Chenlong Gao:
MixPrompt: Enhancing Generalizability and Adversarial Robustness for Vision-Language Models via Prompt Fusion. 328-339 - Kuiye Ding, Xin Yang, Jintao Chen, Chao Liu, Songyao Hou, Wenyuan Yang:
UB-CRAF: A User Behavior-Driven Co-resident Risk Assessment Framework for Dynamically Migrating VMs in Clouds. 340-351 - Gang Yang, Bo Wu, Weifeng Mou, Linna Fan, Xuan Shen, Jun He:
DAS-Gen: Continual Signature Generation for Evolving Malicious Traffic. 352-362 - Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:
Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph. 363-374 - Bin Ma, Hongtao Duan, Ruihe Ma, Chunpeng Wang, Xiaolong Li:
A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding. 375-385 - Jia Jia, Linghui Li, Pengfei Qiu, Binsi Cai, Xu Kang, Ximing Li, Xiaoyong Li:
Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation. 386-396 - Jian Chen, Ming Jiang, Fuyun He:
Model Construction and Empirical Research on Cross-Platform Propagation of Disinformation. 397-408 - Qing Qian, Yi-Lin Kuang, Yi Yue:
EPTLENet: Replay Attack Detection with Efficient Parameter Transfer Learning Based on ERes2Net. 409-421 - Hanwen Li, Shanshan Wang, Yadi Han, Changlin Liu, Zhenxiang Chen:
Constructing Adversarial Network Attacks in Realistic Network Environments. 422-435 - Xin Yang, Jintao Chen, Kuiye Ding, Chao Liu, Jiashen Liu, Songyao Hou:
An Adaptive VM Allocation Approach for Mitigating Co-resident Attack in Cloud Based on Improved NSGA-II. 436-448 - Zhenkun Guo, Yeshen He, Yifan Fan, Xueliang Wang, Meiming Fu, Yiying Zhang:
A Dual Channel Attention Mechanism-Based Intrusion Detection Model for Advanced Metering Infrastructure. 449-457 - Ziqian Li, Yeshen He, Yiying Zhang, Siwei Li, Cong Wang, Xiankun Zhang:
Attribute-Based Encryption Method for Data Privacy Security Protection. 458-467 - Yiying Zhang, Yanping Dong, Ke Liu, Xiankun Zhang, Xianfan Sun, Siwei Li:
Intrusion Detection in Power Cyber-Physical Systems Using Denoising Autoencoder and EQL v2 Loss Function. 468-478 - Hao Ma, Ting Li, Meiming Fu, Xueliang Wang, Yeshen He, Yiying Zhang:
An Intrusion Detection Model of Incorporating Deep Residual Shrinking Networks for Power Internet of Things. 479-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.