整体
发表于 2025-3-25 07:08:34
http://reply.papertrans.cn/87/8636/863525/863525_21.png
留恋
发表于 2025-3-25 09:23:03
http://reply.papertrans.cn/87/8636/863525/863525_22.png
过于平凡
发表于 2025-3-25 12:44:56
1865-0929 2022, which took place in Xi‘an, China, in October 2022..The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of
CRP743
发表于 2025-3-25 17:02:54
D2D Authentication Scheme for IoT-enabled Smart Homee can ensure that two intelligent devices can authenticate each other with the assistance of a home gateway. The security and performance analysis shows that the proposal is secure and efficient for the application in the smart home environment.
的阐明
发表于 2025-3-25 21:04:18
Secure Asynchronous Federated Learning for Edge Computing Deviceseighted secure asynchronous federated learning scheme, WASecAgg, which can ensure training accuracy and data privacy on the premise of guaranteeing the training efficiency of federated learning. The final experiments show that WASecAgg performs better in terms of training efficiency, training accuracy and privacy-preserving of federated learning.
crease
发表于 2025-3-26 00:55:39
A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXttraditional convolutional neural network. The experiments on a network security dataset show that the model is superior to other models in the network security situation assessment effect and its comprehensive performance in accuracy, precision and F-score.
Platelet
发表于 2025-3-26 05:35:57
Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection the attack detection module will detect the DDoS attack. Finally, attack defense module is introduced to filter attack packets and protect controller computing resources. We used the NSL-KDD dataset for evaluation and comparison with other schemes. Experimental results show that our scheme can detect and defend against DDoS attacks accurately.
废墟
发表于 2025-3-26 11:46:03
http://reply.papertrans.cn/87/8636/863525/863525_28.png
精致
发表于 2025-3-26 14:55:02
http://reply.papertrans.cn/87/8636/863525/863525_29.png
NEG
发表于 2025-3-26 17:40:34
A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryptionrom a large amount of datasets. Training word vector in machine learning needs a lot of datasets to train and output a model, however, some of which might contain private and sensitive information, and the training phase will lead to the exposure of the trained model and user datasets. In order to o