Constrict 发表于 2025-3-21 19:56:16
书目名称Information Security and Cryptology影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465371<br><br> <br><br>书目名称Information Security and Cryptology读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465371<br><br> <br><br>珊瑚 发表于 2025-3-21 22:52:12
http://reply.papertrans.cn/47/4654/465371/465371_2.pngHyperplasia 发表于 2025-3-22 02:43:56
http://reply.papertrans.cn/47/4654/465371/465371_3.pngnotification 发表于 2025-3-22 06:42:15
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations an increasingly important role in federated learning. This paper discusses vertical federated logistic regression (VFLR), one of the most popular VFL models. In existing VFLR solutions, homomorphic encryption (HE) is widely used to guarantee privacy. However, HE also entails huge communication and细胞膜 发表于 2025-3-22 10:28:50
Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing FL training process, the statistical heterogeneity between different clients can compromise the overall performance of the global model and its generalization ability on each client, making it difficult for the training process to converge. This paper proposes an efficient clustered FL (cFL) methodENACT 发表于 2025-3-22 13:20:27
TIA: Token Importance Transferable Attack on Vision Transformersto transfer-based attacks, in which attackers can use a local surrogate model to generate adversarial examples, then transfer these malicious examples to attack the target black-box ViT directly. Suffering from the threat of transfer-based attacks, it is challenging to deploy ViTs to security-criticEXPEL 发表于 2025-3-22 19:01:21
Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyberhallenges due to complex and time-consuming polynomial multiplication, which can be accelerated using number-theoretic transform (NTT). In this work, we propose a novel approach of hardware acceleration for NTT-based polynomial multiplication in CRYSTALS-Kyber on FPGA. Our approach leverages pipelinImplicit 发表于 2025-3-23 00:54:26
http://reply.papertrans.cn/47/4654/465371/465371_8.pngdiskitis 发表于 2025-3-23 04:53:32
http://reply.papertrans.cn/47/4654/465371/465371_9.png潜伏期 发表于 2025-3-23 06:06:39
http://reply.papertrans.cn/47/4654/465371/465371_10.png