找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Privacy in Social Networks and Big Data; 8th International Sy Xiaofeng Chen,Xinyi Huang,Mirosław Kutyłowski Conference proceed

[复制链接]
楼主: Opiate
发表于 2025-3-25 07:08:34 | 显示全部楼层
发表于 2025-3-25 09:23:03 | 显示全部楼层
发表于 2025-3-25 12:44:56 | 显示全部楼层
1865-0929 2022, which took place in Xi‘an, China, in October 2022..The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of
发表于 2025-3-25 17:02:54 | 显示全部楼层
D2D Authentication Scheme for IoT-enabled Smart Homee can ensure that two intelligent devices can authenticate each other with the assistance of a home gateway. The security and performance analysis shows that the proposal is secure and efficient for the application in the smart home environment.
发表于 2025-3-25 21:04:18 | 显示全部楼层
Secure Asynchronous Federated Learning for Edge Computing Deviceseighted secure asynchronous federated learning scheme, WASecAgg, which can ensure training accuracy and data privacy on the premise of guaranteeing the training efficiency of federated learning. The final experiments show that WASecAgg performs better in terms of training efficiency, training accuracy and privacy-preserving of federated learning.
发表于 2025-3-26 00:55:39 | 显示全部楼层
A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXttraditional convolutional neural network. The experiments on a network security dataset show that the model is superior to other models in the network security situation assessment effect and its comprehensive performance in accuracy, precision and F-score.
发表于 2025-3-26 05:35:57 | 显示全部楼层
Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection the attack detection module will detect the DDoS attack. Finally, attack defense module is introduced to filter attack packets and protect controller computing resources. We used the NSL-KDD dataset for evaluation and comparison with other schemes. Experimental results show that our scheme can detect and defend against DDoS attacks accurately.
发表于 2025-3-26 11:46:03 | 显示全部楼层
发表于 2025-3-26 14:55:02 | 显示全部楼层
发表于 2025-3-26 17:40:34 | 显示全部楼层
A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryptionrom a large amount of datasets. Training word vector in machine learning needs a lot of datasets to train and output a model, however, some of which might contain private and sensitive information, and the training phase will lead to the exposure of the trained model and user datasets. In order to o
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 00:41
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表