​
Login / Signup
ICIC (9)
2024
2024
2024
Keyphrases
Publications
2024
Chenting Li
,
Dan Li
,
Yuqian Zhou
A Dual Auditing Scheme of Cross-Chain Data Shared Among the Blockchain Network.
ICIC (9)
(2024)
Chao-Hsien Hsieh
,
Fengya Xu
,
Dehong Kong
,
Qingqing Yang
,
Yue Ma
CSQF-BA: Efficient Container Query Technology for Cloud Security Query Framework with Bat Algorithm.
ICIC (9)
(2024)
ShenHong Cao
,
Kaixi Wang
,
Yanbin Fan
Steganalysis of VoIP Streams via Bidirectional Correlation Extract Network.
ICIC (9)
(2024)
Hanwen Li
,
Shanshan Wang
,
Yadi Han
,
Changlin Liu
,
Zhenxiang Chen
Constructing Adversarial Network Attacks in Realistic Network Environments.
ICIC (9)
(2024)
Zhenkun Guo
,
Yeshen He
,
Yifan Fan
,
Xueliang Wang
,
Meiming Fu
,
Yiying Zhang
A Dual Channel Attention Mechanism-Based Intrusion Detection Model for Advanced Metering Infrastructure.
ICIC (9)
(2024)
Yiying Zhang
,
Yanping Dong
,
Ke Liu
,
Xiankun Zhang
,
Xianfan Sun
,
Siwei Li
Intrusion Detection in Power Cyber-Physical Systems Using Denoising Autoencoder and EQL v2 Loss Function.
ICIC (9)
(2024)
Ruizhong Du
,
Xijie She
,
Mingyue Li
,
Ziyuan Wang
Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions.
ICIC (9)
(2024)
Jian Ge
,
Jianwu Rui
,
Hengtai Ma
,
Bin Li
,
Yeping He
Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph.
ICIC (9)
(2024)
Chenghang Huo
,
Jindong Cui
,
Ru Ma
,
Yunfei Luo
,
Fuzhi Zhang
Spammer Group Detection Approach Based on Deep Reinforcement Learning.
ICIC (9)
(2024)
Liang Wang
,
Hao Chen
,
Lina Zuo
,
Haibo Liu
U-shaped Vertical Split Learning with Local Differential Privacy for Privacy Preserving.
ICIC (9)
(2024)
Songyang Wu
,
Bochen Shen
,
Hao Zheng
,
Wenqi Sun
,
Qi Sun
,
Shuang Wang
FedURL: A BERT-based Federated Malicious URL Detection Framework.
ICIC (9)
(2024)
Jia Jia
,
Linghui Li
,
Pengfei Qiu
,
Binsi Cai
,
Xu Kang
,
Ximing Li
,
Xiaoyong Li
Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation.
ICIC (9)
(2024)
Chang Liu
,
Xiaowei He
,
Bin Wang
,
Xinru Sun
,
Yixuan Luo
,
Yiji Zeng
,
Xinyu Wang
,
Jianhang Wang
,
Haofei Zhao
A Differential Privacy Federated Learning Scheme with Improved Noise Perturbation.
ICIC (9)
(2024)
Kuiye Ding
,
Xin Yang
,
Jintao Chen
,
Chao Liu
,
Songyao Hou
,
Wenyuan Yang
UB-CRAF: A User Behavior-Driven Co-resident Risk Assessment Framework for Dynamically Migrating VMs in Clouds.
ICIC (9)
(2024)
Bin Ma
,
Hongtao Duan
,
Ruihe Ma
,
Chunpeng Wang
,
Xiaolong Li
A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding.
ICIC (9)
(2024)
Jian Chen
,
Ming Jiang
,
Fuyun He
Model Construction and Empirical Research on Cross-Platform Propagation of Disinformation.
ICIC (9)
(2024)
Jian-Xun Mi
,
Xiangjin Zhao
,
Yongtao Chen
,
Xiao Cheng
,
Peng Tian
,
Xiaohong Lv
,
Jiayong Zhong
Non-targeted Adversarial Attacks on Object Detection Models.
ICIC (9)
(2024)
Qing Qian
,
Yi-Lin Kuang
,
Yi Yue
EPTLENet: Replay Attack Detection with Efficient Parameter Transfer Learning Based on ERes2Net.
ICIC (9)
(2024)
Jialiang Wang
,
Liuyang Nie
,
Zhaojun Gu
,
Huan Zhao
Real-Time Detection for GPS Spoofing of Quad-Rotor Helicopter Based on Data Fusion.
ICIC (9)
(2024)
Hao Ma
,
Ting Li
,
Meiming Fu
,
Xueliang Wang
,
Yeshen He
,
Yiying Zhang
An Intrusion Detection Model of Incorporating Deep Residual Shrinking Networks for Power Internet of Things.
ICIC (9)
(2024)
Zhihao Shi
,
Yaozong Xu
,
Maode Ma
,
Yanan Zhang
An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks.
ICIC (9)
(2024)
Gang Yang
,
Bo Wu
,
Weifeng Mou
,
Linna Fan
,
Xuan Shen
,
Jun He
DAS-Gen: Continual Signature Generation for Evolving Malicious Traffic.
ICIC (9)
(2024)
Xin Yang
,
Jintao Chen
,
Kuiye Ding
,
Chao Liu
,
Jiashen Liu
,
Songyao Hou
An Adaptive VM Allocation Approach for Mitigating Co-resident Attack in Cloud Based on Improved NSGA-II.
ICIC (9)
(2024)
Zhongjie Mi
,
Xinghao Jiang
,
Tanfeng Sun
,
Ke Xu
,
Qiang Xu
,
Laijin Meng
Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal Inconsistencies.
ICIC (9)
(2024)
Yanan Zhang
,
Jingru Xing
,
Yaozong Xu
,
Maode Ma
,
Cong Wang
DM-CIFA: Detection and Mitigation of Collusion Interesting Flooding Attacks in NDNs.
ICIC (9)
(2024)
Ziyuan Yang
,
Haipeng Qu
,
Ying Hua
,
Xiaoshuai Zhang
,
Xijun Lin
Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning.
ICIC (9)
(2024)
Shaojie Ji
,
Yan Liu
,
Xiaoyu Guo
,
Mengmeng Jia
The Micro-scale Adversarial Detection Algorithm for Overlapping Communities Based on Genetic Algorithms.
ICIC (9)
(2024)
Yisheng Li
,
Xuekang Peng
,
Zhichao Lian
Multi-texture Fusion Attack: A Robust Adversarial Camouflage in Physical World.
ICIC (9)
(2024)
Hao Huang
,
Wentao Chen
,
Weidong Fang
,
Wei Chen
,
Wai-Hung Ip
,
Kai-Leung Yung
A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid.
ICIC (9)
(2024)
Zeshuai Li
,
Xiaoyan Liang
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning.
ICIC (9)
(2024)
Rui Jing
,
Wei Chen
,
Xiaoxin Wu
,
Zehua Wang
,
Zijian Tian
,
Fan Zhang
When Blockchain Meets Asynchronous Federated Learning.
ICIC (9)
(2024)
Taiqiang Li
,
Zhen Zhang
,
Heng Qian
,
Qiuyue Wang
,
Guanqun Su
,
Lingzhen Meng
A High-Dimensional Data Trust Publishing Method Based on Attention Mechanism and Differential Privacy.
ICIC (9)
(2024)
Xiaochun Wu
,
Jiawang Zhang
,
Qi Yao
,
Wanli Lyu
Reversible Data Hiding Based on Octree Partitioning and Arithmetic Coding in Encrypted Three-Dimensional Mesh Models.
ICIC (9)
(2024)
Haizhou Bao
,
Minhao Chen
,
Yiming Huo
,
Guorong Yu
,
Lei Nie
,
Peng Li
,
Yuxuan Wang
Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and LSTM.
ICIC (9)
(2024)
Botao Zhang
,
Fan Shi
,
Chengxi Xu
,
Pengfei Xue
,
Jiankun Sun
CAKGC: A Clustering Method of Cybercrime Assets Knowledge Graph Based on Feature Fusion.
ICIC (9)
(2024)
Rongna Xie
,
Xiaoyu Chen
,
Xinru Zhang
,
Guang Yang
,
Guozhen Shi
Block Cipher Algorithms Identification Scheme Based on KFDA.
ICIC (9)
(2024)
Li Wen
,
Pengfei Xue
,
Yi Shen
,
Wanmeng Ding
,
Min Zhang
Show Criminals' True Color: Chinese Variant Toxic Text Restoration Based on Pointer-Generator Network.
ICIC (9)
(2024)
Lei Wu
,
Xiaofeng Zhong
,
Jingju Liu
,
Xiang Wang
PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains.
ICIC (9)
(2024)
Zhihua Liu
,
Shenquan Liu
,
Jian Zhang
An Intrusion Detection Method for Industrial Internet Fusing Multi-Scale TCN and Transformer Network.
ICIC (9)
(2024)
Hao Fan
,
Zhaoyang Ma
,
Yong Li
,
Rui Tian
,
Yunli Chen
,
Chenlong Gao
MixPrompt: Enhancing Generalizability and Adversarial Robustness for Vision-Language Models via Prompt Fusion.
ICIC (9)
(2024)
Ziqian Li
,
Yeshen He
,
Yiying Zhang
,
Siwei Li
,
Cong Wang
,
Xiankun Zhang
Attribute-Based Encryption Method for Data Privacy Security Protection.
ICIC (9)
(2024)
volume 14870, 2024
Advanced Intelligent Computing Technology and Applications - 20th International Conference, ICIC 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part IX
ICIC (9)
14870 (2024)