整体 发表于 2025-3-25 07:08:34

http://reply.papertrans.cn/87/8636/863525/863525_21.png

留恋 发表于 2025-3-25 09:23:03

http://reply.papertrans.cn/87/8636/863525/863525_22.png

过于平凡 发表于 2025-3-25 12:44:56

1865-0929 2022, which took place in Xi‘an, China, in October 2022..The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of

CRP743 发表于 2025-3-25 17:02:54

D2D Authentication Scheme for IoT-enabled Smart Homee can ensure that two intelligent devices can authenticate each other with the assistance of a home gateway. The security and performance analysis shows that the proposal is secure and efficient for the application in the smart home environment.

的阐明 发表于 2025-3-25 21:04:18

Secure Asynchronous Federated Learning for Edge Computing Deviceseighted secure asynchronous federated learning scheme, WASecAgg, which can ensure training accuracy and data privacy on the premise of guaranteeing the training efficiency of federated learning. The final experiments show that WASecAgg performs better in terms of training efficiency, training accuracy and privacy-preserving of federated learning.

crease 发表于 2025-3-26 00:55:39

A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXttraditional convolutional neural network. The experiments on a network security dataset show that the model is superior to other models in the network security situation assessment effect and its comprehensive performance in accuracy, precision and F-score.

Platelet 发表于 2025-3-26 05:35:57

Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection the attack detection module will detect the DDoS attack. Finally, attack defense module is introduced to filter attack packets and protect controller computing resources. We used the NSL-KDD dataset for evaluation and comparison with other schemes. Experimental results show that our scheme can detect and defend against DDoS attacks accurately.

废墟 发表于 2025-3-26 11:46:03

http://reply.papertrans.cn/87/8636/863525/863525_28.png

精致 发表于 2025-3-26 14:55:02

http://reply.papertrans.cn/87/8636/863525/863525_29.png

NEG 发表于 2025-3-26 17:40:34

A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryptionrom a large amount of datasets. Training word vector in machine learning needs a lot of datasets to train and output a model, however, some of which might contain private and sensitive information, and the training phase will lead to the exposure of the trained model and user datasets. In order to o
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security and Privacy in Social Networks and Big Data; 8th International Sy Xiaofeng Chen,Xinyi Huang,Mirosław Kutyłowski Conference proceed