All Stories

  1. A Joint Trajectory Obfuscation and Pseudonym Swapping Mechanism Avoiding Extra Privacy Cost
  2. The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies
  3. ForgeFinder: Perceptive Multimodal Deepfake Detection via Multi-grained Forgery Localization
  4. Do Domain-Specific LLMs Keep Secrets? An Empirical Study of Privacy Risks and Membership Inference Attacks
  5. Unique privacy and security risks arise in large language models; explore causes and defenses
  6. Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers
  7. Radio Frequency Fingerprint Recognition Based on Kalman Filtering and Random Matrix Theory
  8. Cost-Efficient and Privacy-Preserving Synthesis of Complex Sensitive Data
  9. ROSIN: Robust Semantic Image Hiding Network
  10. A Review of Deepfake and Its Detection: From Generative Adversarial Networks to Diffusion Models
  11. Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing
  12. DBFIA: Diffusion-Based Face Image Anonymization
  13. Outliers are Real: Detecting VLM-Generated Images via One-Class Classification
  14. Privacy in Location-Based Data Mining
  15. QUEEN: Query Unlearning Against Model Extraction
  16. Who is Being Impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-Specific Features
  17. RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models
  18. Hidden Threats in Federated Unlearning: Camouflaged Poisoning Attacks and Their Unlearning Consequences
  19. Face De-Identification: State-of-the-Art Methods and Comparative Studies
  20. A Survey on MLLMs in Education: Application and Future Directions
  21. MeST-Former: Motion-enhanced Spatiotemporal Transformer for generalizable Deepfake detection
  22. When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks
  23. Detection of Diffusion Model-Generated Faces by Assessing Smoothness and Noise Tolerance
  24. Identity-Consistent Video De-identification via Diffusion Autoencoders
  25. Research on Automatic Path Planning of Wind Turbines Inspection Based on Combined UAV
  26. Random Matrix Theory Based Radio Frequency Fingerprinting Identification of WiFi Signal
  27. Proactive image manipulation detection via deep semi-fragile watermark
  28. PPFed: A Privacy-Preserving and Personalized Federated Learning Framework
  29. Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection
  30. MultiFair: Model Fairness With Multiple Sensitive Attributes
  31. Distilling Fair Representations From Fair Teachers
  32. Fine-tuning a Biased Model for Improving Fairness
  33. MMOOC: A Multimodal Misinformation Dataset for Out-of-Context News Analysis
  34. Face De-identification: Safeguarding Identities in the Digital Era
  35. Achieving Privacy-Preserving Multi-View Consistency with Advanced 3D-Aware Face De-identification
  36. RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network
  37. Divide and Conquer: a Two-Step Method for High Quality Face De-identification with Model Explainability
  38. Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning
  39. Federated Learning Technology in Serial Topology for IoT Networks
  40. Regional Scanning Strategy of UAV Cluster Platform for Mobile Emergency Broadcasting
  41. Wireless Resources Cooperation of Assembled Small UAVs for Data Collections of IoT
  42. CIFair: Constructing continuous domains of invariant features for image fair classifications
  43. Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models
  44. Adversarial Machine Learning
  45. Proactive Deepfake Defence via Identity Watermarking
  46. TI2Net: Temporal Identity Inconsistency Network for Deepfake Detection
  47. Label-Only Model Inversion Attacks: Attack With the Least Information
  48. Face image de‐identification by feature space adversarial perturbation
  49. IdentityMask: Deep Motion Flow Guided Reversible Face Video De-Identification
  50. Efficient and Privacy-Preserving Blockchain-Based Multifactor Device Authentication Protocol for Cross-Domain IIoT
  51. IdentityDP: Differential private identification protection for face images
  52. Hiding Among Your Neighbors: Face Image Privacy Protection with Differential Private k-anonymity
  53. Privacy attacks and solutions for machine learning and deep learning
  54. Visual privacy attacks and defenses in deep learning: a survey
  55. One Parameter Defense—Defending Against Data Inference Attacks via Differential Privacy
  56. Deep Motion Flow Aided Face Video De-identification
  57. A Hybrid Spatiotemporal Attack in Continuous LBS Queries
  58. Personalized and Invertible Face De-identification by Disentangled Identity Information Manipulation
  59. Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model
  60. A Privacy-Aware PUFs-Based Multiserver Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain
  61. Cooperative Caching Services on High-Speed Train by Reverse Auction
  62. Privacy Preserving Location Data Publishing: A Machine Learning Approach
  63. Private‐encoder: Enforcing privacy in latent space for human face images
  64. UAV Resource Cooperation Based on Reinforcement Learning
  65. Privacy in Location-Based Data Mining
  66. GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things
  67. A Hybrid Model for Natural Face De-Identiation with Adjustable Privacy
  68. On Channel Classification by Using DTMB Signal
  69. Video Cooperative Caching in High-Speed Train by using Differential Evolution Algorithm
  70. Hiding Private Information in Images From AI
  71. Distributed Caching Mechanism for Popular Services Distribution in Converged Overlay Networks
  72. Throughput Analysis of Buffer-Aided Decode-and-Forward Wireless Relaying with RF Energy Harvesting
  73. Discrete Laplacian Operator and Its Applications in Signal Processing
  74. Deep Feature Guided Image Retargeting
  75. Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions
  76. Cache-Based Popular Services Pushing on High-Speed Train by Using Converged Broadcasting and Cellular Networks
  77. A Novel Random Access Mechanism based on Real-time Access Intensity Detection
  78. On Hit Rate Improving and Energy Consumption Minimizing in Cache-Based Convergent Overlay Network on High-speed Train
  79. Protecting Multimedia Privacy from Both Humans and AI
  80. Machine Learning Aided Anonymization of Spatiotemporal Trajectory Datasets
  81. Transition-Entropy: A Novel Metric for Privacy Preservation in Location-Based Services
  82. Channel Estimation over Doubly Selective Channels Based on Basis Expansion Model and Compressive Sensing
  83. Malicious Attack Propagation and Source Identification
  84. Adversaries or allies? Privacy and deep learning in big data era
  85. Using Adversarial Noises to Protect Privacy in Deep Learning Era
  86. Identifying Propagation Source in Time-Varying Networks
  87. Preliminary of Identifying Propagation Sources
  88. Preliminary of Modeling Malicious Attack Propagation
  89. Restrain Malicious Attack Propagation
  90. Malware Propagations in Wireless Ad Hoc Networks
  91. Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things
  92. On Popular Services Pushing and Distributed Caching in Converged Overlay Networks
  93. On Services Unequal Error Protecting and Pushing by Using Terrestrial Broadcasting Network
  94. QoE-Based Big Data Analysis with Deep Learning in Pervasive Edge Environment
  95. Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities
  96. Equilibriums in the Mobile-Virtual-Network-Operator-Oriented Data Offloading
  97. QoE-Driven Big Data Architecture for Smart City
  98. Differential Private POI Queries via Johnson-Lindenstrauss Transform
  99. Location Privacy and Its Applications: A Systematic Study
  100. Location Privacy in Mobile Applications
  101. Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture
  102. A Multiobjective Evolution Algorithm Based Rule Certainty Updating Strategy in Big Data Environment
  103. Movement-Based Incentive for Crowdsourcing
  104. QoS-Driven Efficient Client Association in High-Density Software-Defined WLAN
  105. On services pushing and caching in high-speed train by using converged broadcasting and cellular networks
  106. A reliable task assignment strategy for spatial crowdsourcing in big data environment
  107. FogRoute: DTN-based Data Dissemination Model in Fog Computing
  108. Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper)
  109. Using epidemic betweenness to measure the influence of users in complex networks
  110. Caching algorithms for broadcasting and multicasting in disruption tolerant networks
  111. Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks
  112. Fog Computing and Its Applications in 5G
  113. K-Source: Multiple source selection for traffic offloading in mobile social networks
  114. A capacity improving and energy saving scheduling scheme in push-based converged wireless broadcasting and cellular networks
  115. Movement-based incentive for cellular traffic offloading through D2D communications
  116. Cournot equilibrium in the mobile virtual network operator oriented oligopoly offloading market
  117. Multi-path routing for video streaming in multi-radio multi-channel wireless mesh networks
  118. Practical Asynchronous Neighbor Discovery in Ad Hoc Networks With Directional Antennas
  119. Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models
  120. Engineering Link Utilization in Cellular Offloading Oriented VANETs
  121. Spatial Coordinated Medium Sharing: Optimal Access Control Management in Drive-Thru Internet
  122. A QoE centric distributed caching approach for vehicular video streaming in cellular networks
  123. Mobility Increases the Risk of Malware Propagations in Wireless Networks
  124. Efficient caching scheme for data access in disruption tolerant networks
  125. Providing Vehicular Infotainment Service Using VHF/UHF TV Bands via Spatial Spectrum Reuse
  126. Database-assisted dynamic spectrum access with QoS guarantees: A double-phase auction approach
  127. Engineering Link Utilization in Cellular Offloading Oriented VANETs
  128. ChainCluster: Engineering a Cooperative Content Distribution Framework for Highway Vehicular Communications
  129. A QoE supportive distributed caching management for vehicular video streaming in cellular networks
  130. A QoS supported spectrum allocation scheme for database-assisted secondary access networks
  131. Interest-based content delivery in wireless mesh networks with hybrid antenna mode
  132. Packet-level clustering for memory-assisted compression of network packets
  133. DSMA: Optimal multirate anypath routing in wireless networks with directional antennas
  134. An improved congestion control algorithm based on social awareness in Delay Tolerant Networks
  135. When vehicles meet TV white space: A QoS guaranteed dynamic spectrum access approach for VANET
  136. A Low-Complexity Compressive Sensing Algorithm for PAPR Reduction
  137. LDPC-RS Product Codes for Digital Terrestrial Broadcasting Transmission System
  138. A Cooperative Matching Approach for Resource Management in Dynamic Spectrum Access Networks
  139. DAS: A dynamic assignment scheduling algorithm for stream computing in distributed applications
  140. Neighbor discovery algorithms in directional antenna based synchronous and asynchronous wireless ad hoc networks
  141. Pure asynchronous neighbor discovery algorithms in ad hoc networks using directional antennas
  142. Throughput evaluation for cooperative drive-thru Internet using microscopic mobility model
  143. Adaptive Scan-based Asynchronous Neighbor Discovery in wireless networks using directional antennas
  144. Rate-compatible LDPC-RS product codes based on raptor-like LDPC codes
  145. Exploring controllable deterministic bits for LDPC iterative decoding in WiMAX networks
  146. Low-complexity PAPR reduction algorithm in OFDM systems by designing data subcarriers
  147. Neighbor discovery algorithms in wireless networks using directional antennas
  148. On the performance of LDPC-RS product codes for mobile DTV
  149. A Novel Dynamic Spectrum Management and Sharing Approach for the Secondary Networks
  150. Training Sample Acquisition Strategy Based Digital Pre-distortion
  151. Fast Spectrum Sharing for Cognitive Radio Networks: A Joint Time-Spectrum Perspective
  152. Neighbor Discovery with Directional Antennas in Mobile Ad-Hoc Networks
  153. A QoS constrained cognitive routing algorithm for ad hoc networks based on directional antenna
  154. A self-awareness routing scheme with power control for underlay spectrum sharing networks
  155. Improved shortening algorithm for irregular QC-LDPC codes using known bits
  156. Improve the Performance of LDPC Coded QAM by Selective Bit Mapping in Terrestrial Broadcasting System
  157. Iterative rake structural decision feedback equalization in linear single frequency network of Chinese High Speed Railway Television system
  158. Multi-rate LDPC codes for DTV transmission by known-bits padding
  159. Selective bit mapping for Chinese DTMB LDPC coded QAM modulation scheme
  160. Helicopter-Based Digital Electronic News Gathering (H-DENG) System: Case Study and System Solution
  161. A Modified Belief Propagation Algorithm Based on Attenuation of the Extrinsic LLR
  162. Designing LDPC Codes with Gated Noise Model for Terrestrial Mobile DTV Channels
  163. Mobile Location Finding Using ATSC Mobile/Handheld Digital TV RF Watermark Signals
  164. An iterative decoding technique and architecture for RS concatenated TCM coding systems
  165. Single Frequency Network System Coverage and Trial Testing of High Speed Railway Television System
  166. A Simplified Method to Get the Optimal Coefficients of Lagrange-Constrained Polynomial Interpolators
  167. On digital TV broadcasting coverage scheme in carriages of Chinese High Speed Railway
  168. Transmitter identification of ATSC DTV under mobile environment
  169. Low complexity channel estimation method for TDS-OFDM based Chinese DTTB system
  170. Services and trial test of CMMB system
  171. On Channel Estimation Method Using Time Domain Sequences in OFDM Systems
  172. Frequency domain feed-forward filter combined DFE structure in single carrier systems over time-varying channels
  173. A Novel Method of Frequency-Offset Estimation Using Time Domain PN Sequences in OFDM Systems
  174. The television broadcasting network of Chinese High Speed Railway
  175. Multithreaded Optimizing Technique for Dynamic Binary Translator CrossBit