Algorithms and Architectures for Parallel Processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V Herausgegeben:Zhu, Tianqing; Li, Jin; Castiglione, Aniello
Algorithms and Architectures for Parallel Processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V Herausgegeben:Zhu, Tianqing; Li, Jin; Castiglione, Aniello
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024. The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024.
The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning.- Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks.- FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy.- DP-CLMI: Differentially Private Contrastive Learning against Membership Inference Attack.- DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service.- Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-assisted Cloud Storage.- Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis.- Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation.- Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios.- Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey.- Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time.- A Comprehensive Review on Deep Learning System Testing.- CIGraph: Accelerating Graph Queries Over Database with Compressed Index.- Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment.- A Power Monitoring Framework of a Post-Quantum Cryptography Web Server.- A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs.- Federated Meta Continual Learning for Efficient and Autonomous Edge Inference.- Progressive Multiscale Attention Network for Diabetic Retinopathy.- FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing.- DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios.- Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features.- Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives.
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning.- Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks.- FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy.- DP-CLMI: Differentially Private Contrastive Learning against Membership Inference Attack.- DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service.- Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-assisted Cloud Storage.- Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis.- Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation.- Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios.- Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey.- Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time.- A Comprehensive Review on Deep Learning System Testing.- CIGraph: Accelerating Graph Queries Over Database with Compressed Index.- Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment.- A Power Monitoring Framework of a Post-Quantum Cryptography Web Server.- A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs.- Federated Meta Continual Learning for Efficient and Autonomous Edge Inference.- Progressive Multiscale Attention Network for Diabetic Retinopathy.- FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing.- DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios.- Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features.- Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826