the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fas...
ISBN:
(纸本)9789819609130
the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fast Approximate Temporal Butterfly Counting on Bipartite Graphs via Edge Sampling;Financial-ICS: Identifying Peer Firms via LongBERT from 10K Reports;establishing a Decentralized Diamond Quality Management System: Advancing Towards Global Standardization;co-estimation of Data Types and their Positional Distribution;Enhancing Load Forecasting with VAE-GAN-based Data Cleaning for Electric Vehicle Charging Loads;audio-Guided Visual Knowledge Representation;boundary Point Detection Combining Gravity and Outlier Detection Methods;A Meta-learning Approach for Category-Aware Sequential Recommendation on POIs;automatic Post-editing of Speech Recognition System Output Using Large Language Models;comparative Analysis with Multiple Large-Scale Language Models for Automatic Generation of Funny Dialogues;effectiveness of the Programmed Visual Contents Comparison Method for Two Phase Collaborative Learning in computer Programming Education: A Case Study;generating Achievement Relationship Graph Between Actions for Alternative Solution Recommendation;generating News Headline Containing Specific Person Name;Investigating Evidence in Sentence Similarity Using MASK in BERT;acceleration of Synopsis Construction for Bounded Approximate Query Processing;Query Expansion in Food Review Search with Synonymous Phrase Generation by LLM;Question Answer Summary Generation from Unstructured Texts by Using LLMs;Real Estate Information Exploration in VR with LoD Control by Physical Distance;voices of Asynchronous Learning Students: Revealing Learning Characteristics through Vocabulary Analysis of Notes Tagged in Videos;review Search Interface based on Search Result Summarization Using Large Language Model;yes-No Flowchart Generation for Interactive Exploration of Personalized Health Improve
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823480
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-based Cryptographic Protocols for three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for the Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-based zkSNARK in Bitcoin Script;Homomorphic Encryption based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823619
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-based Cryptographic Protocols for three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for the Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-based zkSNARK in Bitcoin Script;Homomorphic Encryption based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
Secure computation of multiparty protocol (MPP) is being widely used to address privacy issues in various technologies, such as cryptocurrencies, blockchain, and many more. the security of MPP is computed in various s...
详细信息
Local differential privacy (LDP) has recently emerged as a popular privacy standard. Withthe growing popularity of LDP, recent works have applied LDP to spatial data, and grid-based decompositions have been a common ...
详细信息
the existence of so-called adversarial examples has become a serious threat to Deep Neural Networks (DNN) and their applications, especially security-sensitive ones. Explanations and defenses mainly focused on inside ...
详细信息
the following topics are dealt with: parallel and distributed computing; software metrics and project management; communication systems and networks; data mining; data warehousing; information management systems; Inte...
the following topics are dealt with: parallel and distributed computing; software metrics and project management; communication systems and networks; data mining; data warehousing; information management systems; Internet; mobile computing; wireless computing; software engineering; information engineering; management information systems; image processing and pattern recognition; computer architecture and software testing; artificial intelligence; intelligent agent technology; Web engineering
this paper describes the impact of Parylene layer on the hydrostatic strength and resonant frequency of large and thin bulk-micromachined diaphragm of 500 nm thick Low Pressure Chemical Vapor Deposition (LPCVD) low-st...
详细信息
the work is devoted to solving the problem of restoring the representation of the source code of a program (and in the future, algorithms, architecture, etc.) in the form of a binary code, which will allow searching f...
详细信息
暂无评论