


default search action
4th ICDIS 2022: Shenzhen, China
- 4th International Conference on Data Intelligence and Security, ICDIS 2022, Shenzhen, China, August 24-26, 2022. IEEE 2022, ISBN 978-1-6654-5968-6
- Xuan Wang:
Message from the General Chair: ICDIS 2022. xv - Emin Huseynov:
Passwordless VPN using FIDO2 Security Keys: Modern authentication security for legacy VPN systems. 1-3 - Zoe Lin Jiang, Songjiang Shi, Hongxiao Wang, Peng Yang, Xuan Wang, Yulin Wu, Yantao Zhong, Yan Jia:
Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness. 1-8 - Liyao Xiong, Zoe Lin Jiang, Yi Huang, Jianzong Wang, Jing Xiao, Weizhe Zhang, Xuan Wang:
Efficient Private Set Intersection Based on Functional Encryption. 9-15 - Yang Song, Haiying Gao:
Token Open Security Model for Updatable Encryption. 16-21 - Zechao Liu, Jing He, Ran Shi:
Feature Selection of Intrusion Detection Method Based on Improved GWO. 22-26 - Zechao Liu, Ran Shi, Mingyu Lei, Yulin Wu:
Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVM. 27-30 - Brian Lewandowski, Randy C. Paffenroth
, Kayleigh Campbell:
Improving Network Intrusion Detection Using Autoencoder Feature Residuals. 31-39 - Utkarsh Verma, Yonghong Huang, Carl Woodward, Craig Schmugar, Prashanth Palasamudram Ramagopal, Celeste Fralick:
Attacking Malware Detection using Adversarial Machine Learning. 40-49 - Yupan Chen, Zhihong Liu:
HLT: A Hierarchical Vulnerability Detection Model Based on Transformer. 50-54 - Zhendong Wu, Shan Li, Bin Wang, Tianjian Liu, Yongsheng Zhu, Chenming Zhu, Mingqing Hu:
Detecting Vulnerabilities in Ethereum Smart Contracts with Deep Learning. 55-60 - Xiangkai Yang, Wenjian Luo, Licai Zhang, Zhijian Chen, Jiahai Wang:
Data Leakage Attack via Backdoor Misclassification Triggers of Deep Learning Models. 61-66 - Wenchao Wang, Chuanyi Liu, Zhaoguo Wang, Tiancai Liang:
FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples. 67-74 - Minghua Hou, Linlin Tang, Shuhan Qi, Yang Liu
:
A Robust Watermarking Method For Image Processing Models. 75-81 - Kriti Rai Saini, Vinayak Jigajinni, Jaya Dofe:
Performance Comparison of Cryptosystems in Context to Internet of Things. 82-87 - Chenxu Wang, Ming Zhang
, Jinjing Zhao, Xiaohui Kuang:
Black-Box Adversarial Attacks on Deep Neural Networks: A Survey. 88-93 - Ying Hu, Wanqiu Zhang, Yong Zhang:
A BSO-based Feature Selection Algorithm Under Privacy Protection. 94-98 - Hao Jiang, Yuerong Liao, Qianwei Yu:
A Negative Survey based Method for Preserving Topology Privacy in Social Networks. 99-104 - Ran Liu, Tian Gao, Mingqiang Guo:
Reconstructing Negative Survey with Least Squares Criterion. 105-110 - Ran Liu, Fengzhen Yu, Mingqiang Guo:
Accuracy Prediction of Negative Surveys. 111-117 - Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian:
NegDL: Privacy-preserving Deep Learning Based on Negative Database. 118-126 - Qian Chen, Lin Yao, Yulin Wu, Xuan Wang, Weizhe Zhang, Zoe Lin Jiang, Yang Liu, Mamoun Alazab:
PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption. 127-133 - Zoe Lin Jiang, Yijian Pan, Maoshun Fan, Lin Yao, Yang Liu, Yulin Wu, Siu-Ming Yiu, Xuan Wang, Junbin Fang:
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature. 134-141 - Chuan Zhang, Chenfei Hu, Mingyang Zhao, Yulin Wu, Tong Wu:
Achieving Efficient and Privacy-Preserving Arbitrary Geographic Range Query for Cloud. 142-147 - Peiyi Han, Yunzhe Guo, Shaoming Duan, Chuanyi Liu, Yuxing Zhou:
Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption. 148-154 - Yili Fang, Tao Yang:
Empirical Study on Frequency Adversarial Perturbation for Medical Image Privacy Protection. 155-159 - Walaa Alnasser, Ghazaleh Beigi, Ahmadreza Mosallanezhad, Huan Liu:
PPSL: Privacy-Preserving Text Classification for Split Learning. 160-167 - Shuting Jiao, Shu Zhang, Feng Gao, Ting Wang:
Data Security Search Based on Semi-Supervised Sensitive Classifier. 168-173 - Christoph Lipps, Jan Herbst, Rekha Reddy, Lars Franke, Sven Becker, Marco Rahm, Hans Dieter Schotten:
Reconfigurable Intelligent Surfaces: A Physical Layer Security Perspective. 174-181 - Patrick Nnaji
, Harsh Kumar
, Sanjeev Kumar:
Wireless Smart Electric Meter Operation under Data Security Attacks. 182-187 - Angelo Saadeh, Vaibhavi Kumari, Stéphane Bressan:
Epsilon-Differentially Private and Fully Secure Logistic Regression on Vertically Split Data. 188-193 - Dejun Xiang, Rui Zhou, Lingfei Ma, Qingming Zeng, Ximing Fu
, Qiang Wang, Bin Chen, Yan Jia:
Decoupling Consensus and Storage in Consortium Blockchains by Erasure Codes. 194-199 - Jinhui Liu, Bowen Zhang, Di Wu, Mingjie Li, Bo Tang:
A Secure and Large-Scale Multiparty Conditional Payment Scheme based on Blockchain. 200-207 - Hao Lin, Weiqi Luo, Kangkang Wei, Minglin Liu:
IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTION. 208-212 - Nabil Shawkat, Jesse Simpson, Jamil Saquer:
Evaluation of Different ML and Text Processing Techniques for Hate Speech Detection. 213-219 - Huan Zhang, Rongliang Chen, Kangfeng Zheng, Liang Gu, Xiujuan Wang:
Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction. 220-227 - Yutong Wu, Han Qiu, Tianwei Zhang, Jiwei Li, Meikang Qiu:
Watermarking Pre-trained Encoders in Contrastive Learning. 228-233 - Daohui Ge, Yunan Li
, Bingwen Jia, Ruyi Liu
, Qiguang Miao
:
MCTrack: Multi-Head Contrastive Network for Visual Tracking. 234-241 - Ye Ding, Qi Wan, Ziyuan Liu, Jie Wang:
MultiShadow: Shadow Synthesis for Multiple Virtual Objects. 242-247 - Huang Yi Gong, Feng Chun Hui, Bai Dan Dan:
IReF: Improved Residual Feature For Video Frame Deletion Forensics. 248-253 - RongPing Zou, Bin Zhu, Yi Chen, Bo Xie:
Vision and Knowledge Bimodal Fine-grained Recognition Based on Hierarchical Structured Knowledge Extraction. 254-260 - Mengxi Ya, Tao Dai, Ling Liu, Jieyin Lv, Shu-Tao Xia:
Context Feature Guided Network for Image Super-resolution. 261-266 - Cong Li, Yuan Rao, Jian Yang, Kai Yang, Hao Fan, Junyu Dong:
Calibrated Relighting Network for Image Light Transfer. 267-274 - Kai Yang, Yumeng Jiang, Lin Qi, Hao Fan, Shu Zhang, Junyu Dong:
Visual Semantic SLAM Based on Examination of Moving Consistency in Dynamic Scenes. 275-282 - Zhizhi Zhang, Zihan Ji:
Open-set Pets Facial Recognition Using Deep Learning and Statistical Learning. 283-287 - Turky N. Alotaiby, Saleh A. Alshebeili
, Gaseb Alotibi
, Ghaith N. Alotaibi:
Recurrence Quantification Analysis for PPG/ECG-Based Subject Authentication. 288-291 - Qiong Liu, Yangcheng Zhou, Wei Liu, Guangrui Li, Chenxu Li, Wenbai Chen:
RGCFace: Regularized Global Center loss for Deep Facial Expression Recognition. 292-297 - Jingxu Huang, Lang Xiang, Guangrui Li, Qiong Liu:
A Light Model for Corrosion Segmentation with Multi-Scale Information and CRF. 298-305 - Xun Du, Zhenchao Tao, Lei Li:
Dynamic Graph Pattern Matching in Medical Knowledge Graphs. 306-313 - Chong Mo, Ye Wang, Yan Jia, Cui Luo, Ye Ding:
Temporal Knowledge Graph Reasoning based on Graph Convolution Network. 314-320 - Dafeng Zhang, Xingwei Wang, Qiang He, Fei Gao, Bo Yi, Min Huang:
Cultural Resource Recommender System with Knowledge Graph Convolutional Network. 321-328 - Li Ni, Qi Zhou, Wei Li, Yiwen Zhang:
Cluster Affiliation Model for Local Community Detection. 329-335 - Zirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu:
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning. 336-343 - Wenbai Chen, Guohong Yi, Huixiang Liu, Qili Chen, Weizhao Chen, Peiliang Wu:
Fast classification of indoor functional areas based on a pre-trained lightweight network. 344-349 - Jiayang Wu, Wensheng Gan, Zhenlian Qi:
Behavioral Sequence Classification with Constraints. 350-357 - Tingfu Zhou, Wensheng Gan, Zhenlian Qi:
Weighted Contiguous Sequential Pattern Mining. 358-365 - Zhenqiang Ye, Shicheng Wan, Wensheng Gan, Jiahui Chen, Linlin Tang:
Fuzzy Utility Mining on Temporal Data. 366-373 - Wakana Maeda, Yuji Higuchi, Kazuhiro Minami, Ikuya Morikawa:
Membership Inference Countermeasure With A Partially Synthetic Data Approach. 374-381 - Song Qin, Lei Zhang, Shuhan Qi, Jiajia Zhang, Huale Li, Xuan Wang, Jing Xiao:
EFDO: Solving Extensive-Form Games Based On Double Oracle. 382-387 - Huale Li, Shuhan Qi, Jiajia Zhang, Dandan Zhang, Lin Yao, Xuan Wang, Qi Li, Jing Xiao:
NFSP-PER: An efficient sampling NFSP-based method with prioritized experience replay. 388-393 - Yanglin Liu, Yang Liu, Mehdi Gheisari:
CFDMA: A Novel Click Fraud Detection Method in Mobile Advertising. 394-401 - Yifan Liu, Yuan Rao, Guanqi Qi, Hao Fan, Junyu Dong:
Robust Initialization for Stereo Visual-Inertial SLAM with Polar-Based Gravity Estimation. 402-407 - Huansheng Ning, Zhangfeng Pi, Wenxi Wang
, Fadi Farha
, Shunkun Yang:
A Review on Serious Games for Disaster Relief. 408-414 - Qi Qiu, Junyi He, Tao Zhu
:
DE with A new population initialization method for the dynamic multidimensional knapsack problems. 415-421 - Yuqi Sun, Xuan Wang, Yi Zheng, Lin Yao, Shuhan Qi, Linlin Tang, Hong Yi, Kunlei Dong:
Underwater Object Detection with Swin Transformer. 422-427 - Jiajia Zhang, Mingxin Zhan, Shuhan Qi, Nanwei Yu, Dongrun Zheng, Xuan Wang, Jing Xiao:
Information Entropy of Uncertainty Control: An Uncertainty Management Method in Imperfect Information Games. 428-434 - Jiajia Zhang, Zengyue Guo, Huale Li, Xuan Wang, Dongming Liu, Shuhan Qi:
LwDeepStack: A lightweight DeepStack based on knowledge distillation. 435-441 - Dongrun Zheng, Jiajia Zhang, Xuan Wang, Xiao Guo, Jing Xiao:
Dual Feature Fusion Trade Execution Framework with DDQN. 442-446 - Furong Duan, Tao Zhu
, Jinqiang Wang, Zhenyu Liu:
A Multiscale Windows Deep Learning Aproach For Sensor-Based Human Activity Recogniton. 447-452 - Malik Ali Judge, Awais Manzoor
, Saif ul Islam, Ishfaq Ahmad:
Intelligent Residential Demand Response Optimization under Real-time Pricing: A Comparison of Heuristics. 456-462 - Jingya Zang, Anguo Dong:
Stylistic Pattern Guided Tip Extraction from Music Reviews. 463-468 - Houjun Liang, Rui Xie, Wanhuai Zhou, Bo Li
, Dianjie Bi, Hao Chang:
Extended Grey Model Based on Particle Swarm Optimization and Its Application in Cotton Yield Prediction. 469-473 - Xiao Wu, Dekang Zhang, Xiaorui Liu:
Primary Study on the Face-recognition Framework with anti-spoofing function. 474-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.