当前位置:   article > 正文

网安顶刊IEEE Transactions on Dependable and Secure Computing

ieee transactions on dependable and secure computing

写在最前面

为了给自己找论文方向,看了看安全的顶刊最近都发了哪些论文

不过后面找到了另一篇博客,感觉更有用hh
指路:
CSDN博主「riusksk」https://blog.csdn.net/riusksk/article/details/131278262
ChatGPT在计算机领域的翻译质量还是欠缺一些,翻译出来的中文有的不够自然,经常完全按照英文的表达方式来,导致中文特别长,很绕。GPT4的翻译效果相对ChatGPT效果要好,会长句变短句,表达顺序更符合中文逻辑,更自然。因此,本文主要用GPT4翻译,Claude对所有议题摘要进行长文总结。

之后直接看那位博主的整理啦

IEEE Transactions on Dependable and Secure Computing

在这里插入图片描述

Table of Contents(March-April 2023)Volume 20, Issue 2

战胜针对迁移学习的错误分类攻击
Defeating Misclassification Attacks Against Transfer Learningpp. 886-901
by Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang

用API Knowledgepp减缓基于学习的恶意软件检测器的老化
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledgepp. 902-916
by Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang

捕获无效输入操作以进行内存损坏诊断
Capturing Invalid Input Manipulations for Memory Corruption Diagnosispp. 917-930
by Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming

去中心化匿名支付中的法规遵从性和强制执行
Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Paymentpp. 931-943
by Liang Xue, Dongxiao Liu, Jianbing Ni, Xiaodong Lin, Xuemin Sherman Shen

安全隐私保护的智能车辆导航系统
A Security and Privacy Preserved Intelligent Vehicle Navigation Systempp. 944-959
by Barnana Baruah, Subhasish Dhal

个性化局部差分隐私保护回归模型
Protecting Regression Models With Personalized Local Differential Privacypp. 960-974
by Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li

你不能总是得到你想要的:android上用户控制的隐私。975-987
You Can’t Always Get What You Want: Towards User-Controlled Privacy on Androidpp. 975-987
by Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo

联邦学习聚合服务:一种高效、安全、更具弹性的实现
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realizationpp. 988-1001
by Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang

VOLERE:基于个人语音挑战的抗泄漏用户认证协议
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challengespp. 1002-1016
by Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng

I Know Your Social Network Accounts:一种新颖的设备身份关联攻击架构
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Associationpp. 1017-1030
by Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang

屏蔽:屏蔽运行有漏洞软件的有限资源物联网设备内的跨区域通信
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stackpp. 1031-1047
by Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza

一种可解释的自动编码器:基于决策树的自动编码器及其在异常检测中的应用
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detectionpp. 1048-1059
by Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey

CryptoMaze:链下支付的隐私保护拆分
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Paymentspp. 1060-1073
by Subhra Mazumdar, Sushmita Ruj

STRisk:评估黑客入侵风险的社会技术方法
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Riskpp. 1074-1087
by Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim

轻量级:用于嵌入式集成电子系统的轻量级认证
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systemspp. 1088-1103
by Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo

SparkAC:用于安全数据共享和分析的Spark细粒度访问控制
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analyticspp. 1104-1123
by Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng

裸金属嵌入式设备内存破坏漏洞的发现与识别
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devicespp. 1124-1138
by Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes, Bruno Crispo

网络入侵检测系统的对抗样本检测,1139-1153
MANDA: On Adversarial Example Detection for Network Intrusion Detection Systempp. 1139-1153
by Ning Wang, Yimin Chen, Yang Xiao, Yang Hu, Wenjing Lou, Y. Thomas Hou

抵御网络攻击的成本高效冗余规划
Redundancy Planning for Cost Efficient Resilience to Cyber Attackspp. 1154-1168
by Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu

在线小额信贷欺诈代理检测:一个大规模的实证研究
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Studypp. 1169-1185
by Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah

通过语用理解和可视化进行网络信息检索
Cyber Information Retrieval Through Pragmatics Understanding and Visualizationpp. 1186-1199
by Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang

16年的网络钓鱼用户研究:我们学到了什么?
Sixteen Years of Phishing User Studies: What Have We Learned?pp.1200 - 1212
by Shahryar Baki, Rakesh M. Verma

基于社交活动网络增强Sybil检测:随机游走方法
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approachpp. 1213-1227
by Xiaoying Zhang, Hong Xie, Pei Yi, John C.S. Lui

PressPIN:通过结构传播Soundspp. 1228-1242在移动设备上启用安全的PIN身份验证
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Soundspp. 1228-1242
by Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang

基于多方计算的大规模恶意安全高效全基因组关联研究
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computationpp. 1243-1257
by Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma

Stick:为社交网络平台量身定制的端到端加密协议
Stick: An End-to-End Encryption Protocol Tailored for Social Network Platformspp. 1258-1269
by Omar Basem, Abrar Ullah, Hani Ragab Hassen

情境敏感网络漏洞的最优分类和缓解方法研究
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilitiespp. 1270-1285
by Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah, Xinming Ou

HIBEChain:面向大规模IoTpp的基于分层身份的区块链系统。
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoTpp.1286 - 1301
by Zhiguo Wan, Wei Liu, Hui Cui

用于加密货币网络异常检测的轻量级标识符无关引擎
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detectionpp. 1302-1318
by Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang

面向高效隐私保护的单云用户自定义Skyline查询
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloudpp. 1319-1334
by Songnian

Table of Contents(Sept.-Oct. 2023)Volume 20, Issue 5

改进的分布式秘密共享协议
Improved Protocols for Distributed Secret Sharingpp. 3558-3571
by Roberto De Prisco, Alfredo De Santis, Francesco Palmieri

Go-Sharing:一种基于区块链的跨社交网络照片分享隐私保护框架
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharingpp. 3572-3587
by Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng

基于密度聚类的密码猜测规则生成
Mangling Rules Generation With Density-Based Clustering for Password Guessingpp. 3588-3600
by Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu, Hanguang Luo

VOSA:面向隐私保护联邦学习的可验证不经意安全聚合
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learningpp. 3601-3616
by Yong Wang, Aiqing Zhang, Shu Wu, Shui Yu

Smaug:一个tee辅助的安全SQLite嵌入式系统
Smaug: A TEE-Assisted Secured SQLite for Embedded Systemspp. 3617-3635
by Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma

ZeroProKeS:一种面向大规模低成本应用的安全零配置密钥建立协议
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applicationspp. 3636-3652
by Shahnewaz Karim Sakib, George T Amariucai, Yong Guan

你的标签正在出卖你:垂直联邦学习中的关系泄漏pp. 3653-3668
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learningpp. 3653-3668
by Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang

基于矩阵的加密图像可逆信息隐藏秘密共享算法
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Imagespp. 3669-3686
by Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang

为硬件安全探索手写签名图像特征ypp. 3687-3698
Exploring Handwritten Signature Image Features for Hardware Securitypp. 3687-3698
by Mahendra Rathor, Anirban Sengupta, Rahul Chaurasia, Aditya Anshul

逃离共识:即时修订的区块链协议在无权限设置pp. 3699-3715
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Settingpp. 3699-3715
by Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang

隐式锤:通过隐式访问跨权限边界的Rowhammer
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accessespp. 3716-3733
by Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou

Snoopy:面向大规模监控epp的有限查询网页指纹框架。
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillancepp.3734 - 3752
by Gargi Mitra, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan, V. Kamakoti

减轻针对钓鱼检测器3753-3769的对抗灰盒攻击
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectorspp. 3753-3769
by Giovanni Apruzzese, V. S. Subrahmanian

面向加密数据的高效隐私保护空间关键词相似性查询
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Datapp. 3770-3786
by Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao

基于深度生成模型的可复制隐写
Cover Reproducible Steganography via Deep Generative Modelspp. 3787-3798
by Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu

通过Logits分布对深度学习模型的成员推断攻击
Membership Inference Attacks Against Deep Learning Models via Logits Distributionpp. 3799-3808
by Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li

MRSA: 5G HetNetspp中高效安全切换认证的掩码随机阵列协议。
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNetspp.3809 - 3827
by Yibing Liu, Lijun Huo, Jun Wu, Mohsen Guizani

基于向量置换和移位排序的可撤销指纹模板构造。
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Orderingpp.3828 - 3844
by Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang

通过硬件木马感染的同步泄露无线芯片
Leaking Wireless ICs via Hardware Trojan-Infected Synchronizationpp. 3845-3859
by Alán Rodrigo Díaz-Rizo, Hassan Aboushady, Haralampos-G.Stratigopoulos

增强隐私的证书透明度3860-3872
Certificate Transparency With Enhanced Privacypp. 3860-3872
by Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur

基于认证矩阵提交的高效可验证无界大小数据库3873-3889
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitmentpp. 3873-3889
by Haining Yang, Dengguo Feng, Jing Qin

互联网规模的指纹识别在网络空间重用和重命名物联网设备
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspacepp. 3890-3909
by Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun

差分私有分布频率估计
Differentially Private Distributed Frequency Estimationpp. 3910-3926
by Mengmeng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Tianqing Zhu, Jun Zhao

差分隐私化频率分布中同质性攻击的泄露风险
Disclosure Risk From Homogeneity Attack in Differentially Privately Sanitized Frequency Distributionpp. 3927-3939
by Fang Liu, Xingyuan Zhao

一种面向智能电网的隐私保护状态估计方案3940-3956
A Privacy-Preserving State Estimation Scheme for Smart Gridspp. 3940-3956
by Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota

使用数据起源和度量学习的高级持续性威胁检测
Advanced Persistent Threat Detection Using Data Provenance and Metric Learningpp. 3957-3969
by Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee

说话人识别中音频对抗样本的理解和缓解研究
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognitionpp. 3970-3987
by Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

基于安全电子医疗系统3988-4001敏感数据集的决策树评估
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systemspp. 3988-4001
by Mingwu Zhang, Yu Chen, Willy Susilo

边缘异常点的发现:基于异常值暴露的跨竖井联邦学习的DDoS检测pp. 4002-4015
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detectionpp. 4002-4015
by Vahid Pourahmadi, Hyame Assem Alameddine, Mohammad Ali Salahuddin, Raouf Boutaba

基于恒Q谱草图和GA-SVMpp的音频复制粘贴篡改检测。
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVMpp.4016 - 4031
4016-4031
by Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang, Xin Yao

Sm中混合的安全访问控制方法(ABAC和RBAC)
Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Sm
by Safwa Ameer, James Benson, Ravi Sandhu

ESMAC:基于TEE的多级数据处理高效安全的多用户访问控制
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processingpp. 4052-4069
by Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan

ADCaDeM:一种基于差分流形的攻击损伤计算新方法4070-4084
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifoldspp. 4070-4084
by Zhen Liu, ChangZhen Hu, Chun Shan, Zheng Yan

通用且敏感的网络时间隐蔽信道异常检测方法
Generic and Sensitive Anomaly Detection of Network Covert Timing Channelspp. 4085-4100
by Haozhi Li, Tian Song, Yating Yang

亚线性圆复杂度的差分不经意两方模式匹配ypp. 4101-4117
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexitypp. 4101-4117
by Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu

生成隐写的秘密到图像可逆变换
Secret-to-Image Reversible Transformation for Generative Steganographypp. 4118-4134
by Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi

我仍然知道你去年夏天做了什么:通过流量分析推断敏感用户在消息传递应用程序上的活动
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysispp. 4135-4153
by Ardavan Bozorgi, Alireza Bahramali, Fateme Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley

使用Quorum证书增强区块链挖掘透明度
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificatepp. 4154-4168
by Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng

量化攻击树分析的高效通用算法
Efficient and Generic Algorithms for Quantitative Attack Tree Analysispp. 4169-4187
by Milan Lopuhaä-Zwakenberg, Carlos E. Budde, Mariëlle Stoelinga

MARNet:针对协作多智能体强化学习的后门攻击
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learningpp. 4188-4198
by Yanjiao Chen, Zhicong Zheng, Xueluan Gong

基于分层分组变长编码的云安全可逆数据隐藏算法
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Securitypp. 4199-4213
by Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang

Cure-GNN:抗对抗攻击的鲁棒曲率增强图神经网络4214-4229
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attackspp. 4214-4229
by Yang Xiao, Zhuolin Xing, Alex X. Liu, Lei Bai, Qingqi Pei, Lina Yao

建立安全联邦学习互信的多洗牌器框架pp. 4230-4244
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learningpp. 4230-4244
by Zan Zhou, Changqiao Xu, Mingze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu

云环境下实现高效的隐私保护神经网络训练与预测
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environmentspp. 4245-4257
by Chuan Zhang, Chenfei Hu, Tong Wu, Liehuang Zhu, Ximeng Liu

PolyCosGraph:一种隐私保护的可撤销脑电生物识别系统
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric Systempp. 4258-4272
by Min Wang, Song Wang, Jiankun Hu

面向多域协同防御的网络威胁情报共享
Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entitiespp. 4273-4290
by Soumya Purohit, Roshan Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, Prasad Calyam

FIDO得到验证:通用认证框架协议4291-4310的形式化分析
FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocolpp. 4291-4310
by Haonan Feng, Jingjing Guan, Hui Li, Xuesong Pan, Ziming Zhao

SofitMix:一个安全的链下支持比特币兼容的混合协议
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocolpp. 4311-4324
by Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao

基于区块链的资源受限物联网设备公平云审计
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devicespp. 4325-4342
by Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng

PEBA:增强用户隐私保护及安全浏览服务覆盖
PEBA: Enhancing User Privacy and Coverage of Safe Browsing Servicespp. 4343-4358
by Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang

SlimBox:轻量级加密流量包检测
SlimBox: Lightweight Packet Inspection over Encrypted Trafficpp. 4359-4371
by Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang

一种面向区块链扩展的分布式隐私感知高通量交易调度方法
A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchainpp. 4372-4386
by Xiaoyu Qiu, Wuhui Chen, Bingxin Tang, Junyuan Liang, Hong-Ning Dai, Zibin Zheng

PRkNN:面向加密数据的高效隐私保护反向kNN查询
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Datapp. 4387-4402
by Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu

一种智能系统的混合威胁模型
A Hybrid Threat Model for Smart Systemspp. 4403-4417
by Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu

Hercules:提高隐私保护联邦学习的性能
Hercules: Boosting the Performance of Privacy-Preserving Federated Learningpp. 4418-4433
by Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng

计数型布隆过滤器在黑盒攻击下的隐私保护研究
On the Privacy of Counting Bloom Filters Under a Black-Box Attackerpp. 4434-4440
by Sergio Galán, Pedro Reviriego, Stefan Walzer, Alfonso Sánchez-Macian, Shanshan Liu, Fabrizio Lombardi

基于格的多级秘密共享方案的安全性研究
On the Security of a Lattice-Based Multi-Stage Secret Sharing Schemepp. 4441-4442
by Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/小蓝xlanll/article/detail/303923
推荐阅读
  

闽ICP备14008679号