Description
Table of Contents
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples.- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-step Method.- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System.- A Systematic Method for Constructing ICT Supply Chain Security Requirements.- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography.- Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge.- Deep Neural Network Model over Encrypted Data.- Privacy Protection Mechanism for Fair Federated Learning.- Chinese Named Entity Recognition within the Electric Power Domain.- Adversarial Sampling Attacks and Defense in DNS Data Exfiltration.- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN.
-
- 洋書電子書籍
- 持続可能なイノベーション:ガバナンスと…
-
- 洋書電子書籍
- 小児・青年癌サバイバー:集学的アプロー…
-
- 洋書電子書籍
- Understanding Crimi…
-
- 洋書電子書籍
- Differential Leucoc…



