We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 1,743 results
  1. Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication

    Machine learning enables organizations and individuals to improve efficiency and productivity. With an abundance of data and computational resources,...
    Liang Xue, **aodong Lin, Pulei **ong in Artificial Intelligence Security and Privacy
    Conference paper 2024
  2. A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse

    In the context of the evolving Data LakeHouse distributed architecture and the inescapable challenges posed by DM-Crypt, a verifiable dynamic...
    Shuai Tang, Tianshi Mu, ... Jie Yang in Artificial Intelligence Security and Privacy
    Conference paper 2024
  3. Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision

    Artificial inspection of surface defects in chip inductors faces issues such as low efficiency and poor accuracy. To enhance production efficiency,...
    **ao Li, Xunxun Pi, ... Junhang Qiu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  4. Multi-channel Deep Q-network Carrier Sense Multiple Access

    With the continuous development of network communication and the application of many specific scenarios, the dynamics of network traffic continues to...
    Conference paper 2024
  5. Adversarial Attacks Against Object Detection in Remote Sensing Images

    With the continuous development of artificial intelligence technology and the increasing richness of remote sensing data, deep convolutional neural...
    Rong Huang, Li Chen, ... **ao Yu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  6. Secure Position-Aware Graph Neural Networks for Session-Based Recommendation

    Session-based recommendation, a specific type of recommendation system, leverages users’ interaction sequences to provide recommendations....
    Hongzhe Liu, Fengyin Li, Huayu Cheng in Artificial Intelligence Security and Privacy
    Conference paper 2024
  7. A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing

    Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control....
    Gong Wang, **anghan Zheng, ... Weipeng **e in Artificial Intelligence Security and Privacy
    Conference paper 2024
  8. Design of a Fast Recognition Method for College Students’ Classroom Expression Images Based on Deep Learning

    The expressions of students in class will directly reflect their classroom state. Therefore, this paper proposes a fast recognition method for...
    **yun Jiang, Jia Yu, Luying Min in Artificial Intelligence Security and Privacy
    Conference paper 2024
  9. An Image Copyright Authentication Model Based on Blockchain and Digital Watermark

    To solve the problems of digital image leakage and tampering as well as the low imperceptibility of watermarking algorithms in the traditional...
    Conference paper 2024
  10. Secured Digital Watermarking Using Neural Networks

    Neural network has evolved as a technological breakthrough that has the potential to solve hard computational complexity. In the recent past, the...
    Purba Pal, Sharmila Ghosh, ... Joy Lal Sarkar in Multimedia Watermarking
    Chapter 2024
  11. Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions

    With the rapid growth of edge devices such as smartphones, wearables, and mobile networks, how to effectively utilize a large amount of private data...
    Yongwei Lin, Yucheng Long, ... Chunsheng Yang in Artificial Intelligence Security and Privacy
    Conference paper 2024
  12. Securing 5G Positioning via Zero Trust Architecture

    5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning...
    Razy Youhana Adam, Weizhi Meng in Artificial Intelligence Security and Privacy
    Conference paper 2024
  13. Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm

    SM9 is an identity-based cryptographic algorithm based on elliptic curves, which has high security and low management costs. However, its...
    Yujie Shao, Tian Chen, ... Lu Liu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  14. A Survey of Privacy Preserving Subgraph Matching Methods

    Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are...
    **ngjiang Cheng, Fuxing Zhang, ... Changyu Dong in Artificial Intelligence Security and Privacy
    Conference paper 2024
  15. Verifiable Secure Aggregation Protocol Under Federated Learning

    Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple...
    Peiming Xu, Meiling Zheng, Lingling Xu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  16. Application of Lattice-Based Unique Ring Signature in Blockchain Transactions

    Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the...
    Fengyin Li, Junhui Wang, ... **long Yu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  17. Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility

    As phishing threats intensify, incidents like the “COVID-19 vaccination form” phishing website underscore the limitations of relying solely on...
    Ning Xu, Jiluan Fan, Zikai Wen in Artificial Intelligence Security and Privacy
    Conference paper 2024
  18. Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection

    Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding network security and data integrity. Nevertheless, the challenge of...
    Conference paper 2024
  19. A Graph-Based Vertical Federation Broad Learning System

    A broad learning system is a lightweight deep neural network with breadth expansion, which is widely used in face recognition, error detection, and...
    Junrong Ge, Fengyin Li, ... Liangna Sun in Artificial Intelligence Security and Privacy
    Conference paper 2024
  20. EPoLORE: Efficient and Privacy Preserved Logistic Regression Scheme

    Logistic regression, as one of the classification method, is widely used in machine learning. Due to the complexity of training process, outsourcing...
    Wendan Zhang, Yuhong Sun, ... Chen Zhang in Artificial Intelligence Security and Privacy
    Conference paper 2024
Did you find what you were looking for? Share feedback.