All Stories

  1. The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies
  2. ForgeFinder: Perceptive Multimodal Deepfake Detection via Multi-grained Forgery Localization
  3. Unique privacy and security risks arise in large language models; explore causes and defenses
  4. Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers
  5. Radio Frequency Fingerprint Recognition Based on Kalman Filtering and Random Matrix Theory
  6. Cost-Efficient and Privacy-Preserving Synthesis of Complex Sensitive Data
  7. ROSIN: Robust Semantic Image Hiding Network
  8. A Review of Deepfake and Its Detection: From Generative Adversarial Networks to Diffusion Models
  9. Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing
  10. DBFIA: Diffusion-Based Face Image Anonymization
  11. Outliers are Real: Detecting VLM-Generated Images via One-Class Classification
  12. Privacy in Location-Based Data Mining
  13. QUEEN: Query Unlearning Against Model Extraction
  14. Who is Being Impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-Specific Features
  15. RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models
  16. Hidden Threats in Federated Unlearning: Camouflaged Poisoning Attacks and Their Unlearning Consequences
  17. A Survey on MLLMs in Education: Application and Future Directions
  18. MeST-Former: Motion-enhanced Spatiotemporal Transformer for generalizable Deepfake detection
  19. When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks
  20. Detection of Diffusion Model-Generated Faces by Assessing Smoothness and Noise Tolerance
  21. Identity-Consistent Video De-identification via Diffusion Autoencoders
  22. Research on Automatic Path Planning of Wind Turbines Inspection Based on Combined UAV
  23. Random Matrix Theory Based Radio Frequency Fingerprinting Identification of WiFi Signal
  24. Proactive image manipulation detection via deep semi-fragile watermark
  25. PPFed: A Privacy-Preserving and Personalized Federated Learning Framework
  26. Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection
  27. MultiFair: Model Fairness With Multiple Sensitive Attributes
  28. Distilling Fair Representations From Fair Teachers
  29. Fine-tuning a Biased Model for Improving Fairness
  30. MMOOC: A Multimodal Misinformation Dataset for Out-of-Context News Analysis
  31. Face De-identification: Safeguarding Identities in the Digital Era
  32. Achieving Privacy-Preserving Multi-View Consistency with Advanced 3D-Aware Face De-identification
  33. RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network
  34. Divide and Conquer: a Two-Step Method for High Quality Face De-identification with Model Explainability
  35. Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning
  36. Federated Learning Technology in Serial Topology for IoT Networks
  37. Regional Scanning Strategy of UAV Cluster Platform for Mobile Emergency Broadcasting
  38. Wireless Resources Cooperation of Assembled Small UAVs for Data Collections of IoT
  39. CIFair: Constructing continuous domains of invariant features for image fair classifications
  40. Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models
  41. Adversarial Machine Learning
  42. Proactive Deepfake Defence via Identity Watermarking
  43. TI2Net: Temporal Identity Inconsistency Network for Deepfake Detection
  44. Label-Only Model Inversion Attacks: Attack With the Least Information
  45. Face image de‐identification by feature space adversarial perturbation
  46. IdentityMask: Deep Motion Flow Guided Reversible Face Video De-Identification
  47. Efficient and Privacy-Preserving Blockchain-Based Multifactor Device Authentication Protocol for Cross-Domain IIoT
  48. IdentityDP: Differential private identification protection for face images
  49. Hiding Among Your Neighbors: Face Image Privacy Protection with Differential Private k-anonymity
  50. Privacy attacks and solutions for machine learning and deep learning
  51. Visual privacy attacks and defenses in deep learning: a survey
  52. One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy
  53. Deep Motion Flow Aided Face Video De-identification
  54. A Hybrid Spatiotemporal Attack in Continuous LBS Queries
  55. Personalized and Invertible Face De-identification by Disentangled Identity Information Manipulation
  56. Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model
  57. A Privacy-Aware PUFs-Based Multiserver Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain
  58. Cooperative Caching Services on High-Speed Train by Reverse Auction
  59. Privacy Preserving Location Data Publishing: A Machine Learning Approach
  60. Private‐encoder: Enforcing privacy in latent space for human face images
  61. UAV Resource Cooperation Based on Reinforcement Learning
  62. Privacy in Location-Based Data Mining
  63. GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things
  64. A Hybrid Model for Natural Face De-Identiation with Adjustable Privacy
  65. On Channel Classification by Using DTMB Signal
  66. Video Cooperative Caching in High-Speed Train by using Differential Evolution Algorithm
  67. Hiding Private Information in Images From AI
  68. Distributed Caching Mechanism for Popular Services Distribution in Converged Overlay Networks
  69. Throughput Analysis of Buffer-Aided Decode-and-Forward Wireless Relaying with RF Energy Harvesting
  70. Discrete Laplacian Operator and Its Applications in Signal Processing
  71. Deep Feature Guided Image Retargeting
  72. Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions
  73. Cache-Based Popular Services Pushing on High-Speed Train by Using Converged Broadcasting and Cellular Networks
  74. A Novel Random Access Mechanism based on Real-time Access Intensity Detection
  75. On Hit Rate Improving and Energy Consumption Minimizing in Cache-Based Convergent Overlay Network on High-speed Train
  76. Protecting Multimedia Privacy from Both Humans and AI
  77. Machine Learning Aided Anonymization of Spatiotemporal Trajectory Datasets
  78. Transition-Entropy: A Novel Metric for Privacy Preservation in Location-Based Services
  79. Channel Estimation over Doubly Selective Channels Based on Basis Expansion Model and Compressive Sensing
  80. Malicious Attack Propagation and Source Identification
  81. Adversaries or allies? Privacy and deep learning in big data era
  82. Using Adversarial Noises to Protect Privacy in Deep Learning Era
  83. Identifying Propagation Source in Time-Varying Networks
  84. Preliminary of Identifying Propagation Sources
  85. Preliminary of Modeling Malicious Attack Propagation
  86. Restrain Malicious Attack Propagation
  87. Malware Propagations in Wireless Ad Hoc Networks
  88. Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things
  89. On Popular Services Pushing and Distributed Caching in Converged Overlay Networks
  90. On Services Unequal Error Protecting and Pushing by Using Terrestrial Broadcasting Network
  91. QoE-Based Big Data Analysis with Deep Learning in Pervasive Edge Environment
  92. Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities
  93. Equilibriums in the Mobile-Virtual-Network-Operator-Oriented Data Offloading
  94. QoE-Driven Big Data Architecture for Smart City
  95. Differential Private POI Queries via Johnson-Lindenstrauss Transform
  96. Location Privacy and Its Applications: A Systematic Study
  97. Location Privacy in Mobile Applications
  98. Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture
  99. A Multiobjective Evolution Algorithm Based Rule Certainty Updating Strategy in Big Data Environment
  100. Movement-Based Incentive for Crowdsourcing
  101. QoS-Driven Efficient Client Association in High-Density Software-Defined WLAN
  102. On services pushing and caching in high-speed train by using converged broadcasting and cellular networks
  103. A reliable task assignment strategy for spatial crowdsourcing in big data environment
  104. FogRoute: DTN-based Data Dissemination Model in Fog Computing
  105. Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper)
  106. Using epidemic betweenness to measure the influence of users in complex networks
  107. Caching algorithms for broadcasting and multicasting in disruption tolerant networks
  108. Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks
  109. Fog Computing and Its Applications in 5G
  110. K-Source: Multiple source selection for traffic offloading in mobile social networks
  111. A capacity improving and energy saving scheduling scheme in push-based converged wireless broadcasting and cellular networks
  112. Movement-based incentive for cellular traffic offloading through D2D communications
  113. Cournot equilibrium in the mobile virtual network operator oriented oligopoly offloading market
  114. Multi-path routing for video streaming in multi-radio multi-channel wireless mesh networks
  115. Practical Asynchronous Neighbor Discovery in Ad Hoc Networks With Directional Antennas
  116. Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models
  117. Engineering Link Utilization in Cellular Offloading Oriented VANETs
  118. Spatial Coordinated Medium Sharing: Optimal Access Control Management in Drive-Thru Internet
  119. A QoE centric distributed caching approach for vehicular video streaming in cellular networks
  120. Mobility Increases the Risk of Malware Propagations in Wireless Networks
  121. Efficient caching scheme for data access in disruption tolerant networks
  122. Providing Vehicular Infotainment Service Using VHF/UHF TV Bands via Spatial Spectrum Reuse
  123. Database-assisted dynamic spectrum access with QoS guarantees: A double-phase auction approach
  124. Engineering Link Utilization in Cellular Offloading Oriented VANETs
  125. ChainCluster: Engineering a Cooperative Content Distribution Framework for Highway Vehicular Communications
  126. A QoE supportive distributed caching management for vehicular video streaming in cellular networks
  127. A QoS supported spectrum allocation scheme for database-assisted secondary access networks
  128. Interest-based content delivery in wireless mesh networks with hybrid antenna mode
  129. Packet-level clustering for memory-assisted compression of network packets
  130. DSMA: Optimal multirate anypath routing in wireless networks with directional antennas
  131. An improved congestion control algorithm based on social awareness in Delay Tolerant Networks
  132. When vehicles meet TV white space: A QoS guaranteed dynamic spectrum access approach for VANET
  133. A Low-Complexity Compressive Sensing Algorithm for PAPR Reduction
  134. LDPC-RS Product Codes for Digital Terrestrial Broadcasting Transmission System
  135. A Cooperative Matching Approach for Resource Management in Dynamic Spectrum Access Networks
  136. DAS: A dynamic assignment scheduling algorithm for stream computing in distributed applications
  137. Neighbor discovery algorithms in directional antenna based synchronous and asynchronous wireless ad hoc networks
  138. Pure asynchronous neighbor discovery algorithms in ad hoc networks using directional antennas
  139. Throughput evaluation for cooperative drive-thru Internet using microscopic mobility model
  140. Adaptive Scan-based Asynchronous Neighbor Discovery in wireless networks using directional antennas
  141. Rate-compatible LDPC-RS product codes based on raptor-like LDPC codes
  142. Exploring controllable deterministic bits for LDPC iterative decoding in WiMAX networks
  143. Low-complexity PAPR reduction algorithm in OFDM systems by designing data subcarriers
  144. Neighbor discovery algorithms in wireless networks using directional antennas
  145. On the performance of LDPC-RS product codes for mobile DTV
  146. A Novel Dynamic Spectrum Management and Sharing Approach for the Secondary Networks
  147. Training Sample Acquisition Strategy Based Digital Pre-distortion
  148. Fast Spectrum Sharing for Cognitive Radio Networks: A Joint Time-Spectrum Perspective
  149. Neighbor Discovery with Directional Antennas in Mobile Ad-Hoc Networks
  150. A QoS constrained cognitive routing algorithm for ad hoc networks based on directional antenna
  151. A self-awareness routing scheme with power control for underlay spectrum sharing networks
  152. Improved shortening algorithm for irregular QC-LDPC codes using known bits
  153. Improve the Performance of LDPC Coded QAM by Selective Bit Mapping in Terrestrial Broadcasting System
  154. Iterative rake structural decision feedback equalization in linear single frequency network of Chinese High Speed Railway Television system
  155. Multi-rate LDPC codes for DTV transmission by known-bits padding
  156. Selective bit mapping for Chinese DTMB LDPC coded QAM modulation scheme
  157. Helicopter-Based Digital Electronic News Gathering (H-DENG) System: Case Study and System Solution
  158. A Modified Belief Propagation Algorithm Based on Attenuation of the Extrinsic LLR
  159. Designing LDPC Codes with Gated Noise Model for Terrestrial Mobile DTV Channels
  160. Mobile Location Finding Using ATSC Mobile/Handheld Digital TV RF Watermark Signals
  161. An iterative decoding technique and architecture for RS concatenated TCM coding systems
  162. Single Frequency Network System Coverage and Trial Testing of High Speed Railway Television System
  163. A Simplified Method to Get the Optimal Coefficients of Lagrange-Constrained Polynomial Interpolators
  164. On digital TV broadcasting coverage scheme in carriages of Chinese High Speed Railway
  165. Transmitter identification of ATSC DTV under mobile environment
  166. Low complexity channel estimation method for TDS-OFDM based Chinese DTTB system
  167. Services and trial test of CMMB system
  168. On Channel Estimation Method Using Time Domain Sequences in OFDM Systems
  169. Frequency domain feed-forward filter combined DFE structure in single carrier systems over time-varying channels
  170. A Novel Method of Frequency-Offset Estimation Using Time Domain PN Sequences in OFDM Systems
  171. The television broadcasting network of Chinese High Speed Railway
  172. Multithreaded Optimizing Technique for Dynamic Binary Translator CrossBit