We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 1,866 results
  1. Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication

    Machine learning enables organizations and individuals to improve efficiency and productivity. With an abundance of data and computational resources,...
    Liang Xue, **aodong Lin, Pulei **ong in Artificial Intelligence Security and Privacy
    Conference paper 2024
  2. Securing 5G Positioning via Zero Trust Architecture

    5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning...
    Razy Youhana Adam, Weizhi Meng in Artificial Intelligence Security and Privacy
    Conference paper 2024
  3. A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse

    In the context of the evolving Data LakeHouse distributed architecture and the inescapable challenges posed by DM-Crypt, a verifiable dynamic...
    Shuai Tang, Tianshi Mu, ... Jie Yang in Artificial Intelligence Security and Privacy
    Conference paper 2024
  4. Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm

    SM9 is an identity-based cryptographic algorithm based on elliptic curves, which has high security and low management costs. However, its...
    Yujie Shao, Tian Chen, ... Lu Liu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  5. A Survey of Privacy Preserving Subgraph Matching Methods

    Due to the widespread of large-scale graph data and the increasing popularity of cloud computation, more and more graph processing tasks are...
    **ngjiang Cheng, Fuxing Zhang, ... Changyu Dong in Artificial Intelligence Security and Privacy
    Conference paper 2024
  6. Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision

    Artificial inspection of surface defects in chip inductors faces issues such as low efficiency and poor accuracy. To enhance production efficiency,...
    **ao Li, Xunxun Pi, ... Junhang Qiu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  7. Multi-channel Deep Q-network Carrier Sense Multiple Access

    With the continuous development of network communication and the application of many specific scenarios, the dynamics of network traffic continues to...
    Conference paper 2024
  8. Verifiable Secure Aggregation Protocol Under Federated Learning

    Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple...
    Peiming Xu, Meiling Zheng, Lingling Xu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  9. Adversarial Attacks Against Object Detection in Remote Sensing Images

    With the continuous development of artificial intelligence technology and the increasing richness of remote sensing data, deep convolutional neural...
    Rong Huang, Li Chen, ... **ao Yu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  10. Team Management

    In this chapter, we’ll take a look at how to manage an offensive cybersecurity service. I am not trying to teach all the concepts of project...
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  11. Engagement Security

    Engagement security is an often overlooked aspect of managing an offensive cybersecurity team. We are focused on evaluating the security of other...
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  12. Reporting

    An assessment is only as good as its report. The report is your final opportunity to communicate the value that your team produced for the client....
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  13. Operational Management

    The execution of offensive cybersecurity projects requires a coordinated team, communication with the client, and a properly prepared project. Each...
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  14. The Wedge

    Your team has conducted a world-class assessment. They communicated with the client throughout the whole process, so the client is thoroughly aware...
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  15. Application of Lattice-Based Unique Ring Signature in Blockchain Transactions

    Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the...
    Fengyin Li, Junhui Wang, ... **long Yu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  16. Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility

    As phishing threats intensify, incidents like the “COVID-19 vaccination form” phishing website underscore the limitations of relying solely on...
    Ning Xu, Jiluan Fan, Zikai Wen in Artificial Intelligence Security and Privacy
    Conference paper 2024
  17. A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing

    Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control....
    Gong Wang, **anghan Zheng, ... Weipeng **e in Artificial Intelligence Security and Privacy
    Conference paper 2024
  18. An Image Copyright Authentication Model Based on Blockchain and Digital Watermark

    To solve the problems of digital image leakage and tampering as well as the low imperceptibility of watermarking algorithms in the traditional...
    Conference paper 2024
  19. Member Inference Attacks in Federated Contrastive Learning

    In the past, the research community has studied privacy issues in federated learning, self-supervised learning, and deep models. However, privacy...
    Zixin Wang, Bing Mi, Kongyang Chen in Artificial Intelligence Security and Privacy
    Conference paper 2024
  20. Digital Watermarking: Pathway to Secure!

    The progression in information technology has led to some thoughtful anxieties about the piracy and exclusive rights of digital content. The...
    Chapter 2024
Did you find what you were looking for? Share feedback.