標(biāo)題: Titlebook: Emerging Information Security and Applications; 4th International Co Jun Shao,Sokratis K. Katsikas,Weizhi Meng Conference proceedings 2024 [打印本頁] 作者: Bunion 時間: 2025-3-21 19:53
書目名稱Emerging Information Security and Applications影響因子(影響力)
書目名稱Emerging Information Security and Applications影響因子(影響力)學(xué)科排名
書目名稱Emerging Information Security and Applications網(wǎng)絡(luò)公開度
書目名稱Emerging Information Security and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Information Security and Applications被引頻次
書目名稱Emerging Information Security and Applications被引頻次學(xué)科排名
書目名稱Emerging Information Security and Applications年度引用
書目名稱Emerging Information Security and Applications年度引用學(xué)科排名
書目名稱Emerging Information Security and Applications讀者反饋
書目名稱Emerging Information Security and Applications讀者反饋學(xué)科排名
作者: 食物 時間: 2025-3-21 23:40
Nachhaltiges Planen, Bauen und Wohnen federated training to overcome the data silos issue. In addition, we leverage a homomorphic cryptosystem and the Schnorr signature algorithm to ensure the security and integrity of local model parameters. Security analysis and experimental results show that the proposed scheme can not only protect 作者: 莎草 時間: 2025-3-22 01:55 作者: Dorsal 時間: 2025-3-22 06:50 作者: invulnerable 時間: 2025-3-22 11:32
Andreas Georg Scherer,Guido Palazzockets in bypassing machine learning detection techniques. We then propose a voting ensemble method to improve adversarial attack detection. The voting ensemble proposed increases the accuracy of adversarial detection, providing a new level of protection against adversarial example attacks.作者: 晚來的提名 時間: 2025-3-22 15:44 作者: 晚來的提名 時間: 2025-3-22 19:31
,Towards Efficient Universal Adversarial Attack on?Audio Classification Models: A?Two-Step Method,st step, we generate audio-dependent (individual) perturbations for each target example. In the second phase, we aggregate the generated perturbations and fine-turn them into UAPs. By this strategy, we can optimize the desired UAPs at an ideal starting point, resulting in a remarkably efficient. Exp作者: 樂章 時間: 2025-3-22 22:14 作者: faculty 時間: 2025-3-23 01:38
,Enhancing Chinese Named Entity Recognition with?Disentangled Expert Knowledge,f two objectives, we propose a novel framework that disentangle the original NER labels into two additional training labels for entity segmentation and entity classification respectively. Then we introduce two dedicated expert models to effectively extract specific knowledge from the disentangled la作者: LATHE 時間: 2025-3-23 06:37
,Chinese Named Entity Recognition Within the?Electric Power Domain,t. Results demonstrate that the proposed model outperforms both the BiLSTM-CRF model and the BERT-softmax model in NER tasks across the electrical power domain and various other domains. This study contributes to the advancement of NER applications in the electrical power domain and holds significan作者: 心胸開闊 時間: 2025-3-23 11:11 作者: 含糊其辭 時間: 2025-3-23 13:58 作者: enumaerate 時間: 2025-3-23 19:44 作者: Culpable 時間: 2025-3-24 00:38 作者: 政府 時間: 2025-3-24 04:44
A Systematic Method for Constructing ICT Supply Chain Security Requirements,ly chain security assurance. Firstly, the security environment of ICT supply chain is established through ICT supply chain relationship, product life cycle stages, security driving factors and security properties. Then it is proposed to derive ICT supply chain security requirements from regulatory r作者: 安心地散步 時間: 2025-3-24 08:40 作者: fertilizer 時間: 2025-3-24 10:53 作者: Individual 時間: 2025-3-24 15:19 作者: Hla461 時間: 2025-3-24 22:45
,Toward the?Tradeoffs Between Privacy, Fairness and?Utility in?Federated Learning, leakage due to the advantage of the client’s local training. Researchers have struggled to design fair FL systems that ensure fairness of results. However, the interplay between fairness and privacy has been less studied. Increasing the fairness of FL systems can have an impact on user privacy, whi作者: febrile 時間: 2025-3-25 00:29
,Chinese Named Entity Recognition Within the?Electric Power Domain,domain. In this study, we harness an extensive corpus of textual data drawn from the electrical power systems domain, comprising regulations, reports, and other pertinent materials. Leveraging this corpus, we construct an Electrical Power Systems Corpus and proceed to annotate entities within this t作者: 氣候 時間: 2025-3-25 07:05 作者: CLASP 時間: 2025-3-25 11:14
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN,rsarial attacks. This paper introduces a novel method based on bit-rate modulation for implementing covert channels between devices connected over a wide area network. This attack can be exploited to exfiltrate sensitive information from a machine (i.e., covert sender) and stealthily transfer it to 作者: acheon 時間: 2025-3-25 15:27 作者: 持久 時間: 2025-3-25 18:26 作者: 表主動 時間: 2025-3-25 22:13
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/308272.jpg作者: 悶熱 時間: 2025-3-26 02:21 作者: 并入 時間: 2025-3-26 06:17 作者: Hallowed 時間: 2025-3-26 10:24 作者: 煤渣 時間: 2025-3-26 16:03
Marijan Kosel,Jürgen Wei?enrieder attacks by examples with indistinguishable perturbations that produce incorrect predictions. There are two types of perturbations, i.e., audio-dependent and audio-agnostic. Audio-dependent perturbations involve crafting perturbations for each clean example, while audio-agnostic attacks create a uni作者: Seizure 時間: 2025-3-26 18:59 作者: plasma 時間: 2025-3-26 22:26
https://doi.org/10.1007/978-3-658-31130-8ly chain security assurance. Firstly, the security environment of ICT supply chain is established through ICT supply chain relationship, product life cycle stages, security driving factors and security properties. Then it is proposed to derive ICT supply chain security requirements from regulatory r作者: muscle-fibers 時間: 2025-3-27 05:08 作者: 斑駁 時間: 2025-3-27 06:27
,Fallstudie ?Consumer Electronics“,o pre-defined categories, .entity classification. Current NER tasks follows sequence tagging scheme and assign the characters to different labels by considering both segmentation position and entity categories. In such a scheme, the characters in the same entity will be regarded as different classes作者: calamity 時間: 2025-3-27 09:31
Nachhaltiges Wachstum im Mittelstandd rules. However, these data often contain sensitive information of users. This paper designs a DNN Classification Model for Ciphertext Data (DNN-CMED), which consists of three-party entities, including two servers and one client. The auxiliary server assists the model training server in completing 作者: Felicitous 時間: 2025-3-27 16:41
https://doi.org/10.1007/978-3-658-20174-6 leakage due to the advantage of the client’s local training. Researchers have struggled to design fair FL systems that ensure fairness of results. However, the interplay between fairness and privacy has been less studied. Increasing the fairness of FL systems can have an impact on user privacy, whi作者: artifice 時間: 2025-3-27 20:53
Blockchain und nachhaltige Energiedomain. In this study, we harness an extensive corpus of textual data drawn from the electrical power systems domain, comprising regulations, reports, and other pertinent materials. Leveraging this corpus, we construct an Electrical Power Systems Corpus and proceed to annotate entities within this t作者: medium 時間: 2025-3-28 01:47 作者: 典型 時間: 2025-3-28 03:53 作者: opinionated 時間: 2025-3-28 09:15 作者: 親密 時間: 2025-3-28 11:32 作者: 構(gòu)想 時間: 2025-3-28 18:14
1865-0929 A 2023, held in Hangzhou, China, in December 2023.?.The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited? to cyber intelligence techniques, multimedia security, blockchain and distributed ledger 作者: 秘方藥 時間: 2025-3-28 18:45 作者: 躲債 時間: 2025-3-29 02:22
1865-0929 tion, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security..978-981-99-9613-1978-981-99-9614-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: amyloid 時間: 2025-3-29 05:19
Nachhaltiges Wachstum im Mittelstand The classification process of DNN-CMED is given based on the above protocol. Through safety analysis and experiments, it shows that the models have better security and practicality. The results show that this model has better results in terms of accuracy, time and communication overhead, and on the MNIST test set.作者: Compatriot 時間: 2025-3-29 07:56
https://doi.org/10.1007/978-3-658-20174-6w that the accuracy of the fair model with privacy increases because privacy breaks the constraints of the fairness metrics. In our experiments, we conclude the relationship between privacy, fairness and utility, and there is a tradeoff between these.作者: NEG 時間: 2025-3-29 13:32
,Deep Neural Network Model over?Encrypted Data, The classification process of DNN-CMED is given based on the above protocol. Through safety analysis and experiments, it shows that the models have better security and practicality. The results show that this model has better results in terms of accuracy, time and communication overhead, and on the MNIST test set.作者: Bravado 時間: 2025-3-29 19:02
,Toward the?Tradeoffs Between Privacy, Fairness and?Utility in?Federated Learning,w that the accuracy of the fair model with privacy increases because privacy breaks the constraints of the fairness metrics. In our experiments, we conclude the relationship between privacy, fairness and utility, and there is a tradeoff between these.作者: Compatriot 時間: 2025-3-29 20:52
Maximilian Cedzich,Roland Jochem, it is feasible to represent the elliptic curve points only by their x-coordinate or y-coordinate through a compression function. This approach enables saving a significant amount of communication or storage in protocols such as BLS and IBE, thereby enhancing their efficiency.作者: 古代 時間: 2025-3-30 01:05
,Pairing Compression on?Some Elliptic Curves with?Subgroups of?Embedding Degree 6 and?Its Applicatio, it is feasible to represent the elliptic curve points only by their x-coordinate or y-coordinate through a compression function. This approach enables saving a significant amount of communication or storage in protocols such as BLS and IBE, thereby enhancing their efficiency.