芭蕾舞女演员 发表于 2025-3-30 08:43:36

Targeted Universal Adversarial Attack Based on Fourier Transformtability of deep learning, enhances researchers’ understanding of neural networks, and contributes to the development of next-generation artificial intelligence, which has attracted widespread research in various fields. The targeted adversarial attack problem based on sample features faces two prob

使成波状 发表于 2025-3-30 14:27:45

Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intystems (IDS) frequently rely on centralized data gathering and processing, which raises privacy and scalability concerns. In this research, we present a privacy-preserving, explainable IDS using Federated Learning (FL) and deep learning techniques. Specifically, we integrate Artificial Neural Networ

indubitable 发表于 2025-3-30 16:58:24

http://reply.papertrans.cn/29/2845/284453/284453_53.png

补角 发表于 2025-3-30 22:32:06

http://reply.papertrans.cn/29/2845/284453/284453_54.png

悬崖 发表于 2025-3-31 01:55:20

However, some data contains privacy concerns, and legal disputes among collaborating factories that are common. In this paper, we propose a searchable and privacy preserving data sharing scheme for manufacturing collaboration. Sensitive data is outsourced to a Cloud Service Provider (CSP), avoiding

THROB 发表于 2025-3-31 05:44:51

http://reply.papertrans.cn/29/2845/284453/284453_56.png

物质 发表于 2025-3-31 12:20:34

http://reply.papertrans.cn/29/2845/284453/284453_57.png

Heart-Attack 发表于 2025-3-31 14:31:45

Ideologische Besetzungen des Dorfesamount of money in a transaction. However, the Snowden revelation alerts us that the implementation of cryptographic algorithms in practice might be substituted covertly which would result in a complete breach of the security of the cryptosystem. In this work, we turn to evaluate the potential hazar

Extemporize 发表于 2025-3-31 20:12:48

Klein on Certainty and Canonical Beliefsccessibility, and efficiency. Utilizing decentralized platforms, our study integrates smart contracts, encrypted Non-Fungible Tokens (NFTs), and the InterPlanetary File System (IPFS) to address data integrity and transparency challenges. We evaluated various encryption algorithms—RSA, RC4, DES, ChaC

Enthralling 发表于 2025-3-31 23:46:07

https://doi.org/10.1007/978-1-137-08545-0 one of the most widely used arithmetic systems in practice. One of the main challenges in constructing zero-knowledge argument/proof protocols for relations over a ring is how to ensure sufficient number of challenges to fulfill the necessary knowledge-soundness requirements. In this paper, we esta
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data Security and Privacy Protection; Second International Xiaofeng Chen,Xinyi Huang,Moti Yung Conference proceedings 2025 The Editor(s) (i