IFS-P5.6
Gradient Inversion Attacks on Acoustic Signals: Revealing Security Risks in Audio Recognition Systems
Pretom Roy Ovi, Aryya Gangopadhyay, University of Maryland Baltimore County, United States of America
Session:
IFS-P5: Applied Cryptography Poster
Track:
Information Forensics and Security
Location:
Poster Zone 4A
Poster Board PZ-4A.6
Poster Board PZ-4A.6
Presentation Time:
Thu, 18 Apr, 13:10 - 15:10 (UTC +9)
Session Chair:
Zeki Erkin, Delft University of Technology
Session IFS-P5
IFS-P5.1: ENHANCED SCREEN SHOOTING RESILIENT DOCUMENT WATERMARKING
Heng Wang, Hongxia Wang, Xinyi Huang, Zhenhao Shi, Sichuan University, China
IFS-P5.2: Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography
Zihan Chen, Tianrui Liu, Jun-jie Huang, Wentao Zhao, Xing Bi, National University of Defense Technology, China; Meng Wang, Hefei University of Technology, China
IFS-P5.3: SECURELY AND EFFICIENTLY OUTSOURCING NEURAL NETWORK INFERENCE VIA PARALLEL MSB EXTRACTION
Xin Liu, Ning Xi, Ke Cheng, Jiaxuan Fu, Xinghui Zhu, Yulong Shen, Jianfeng Ma, Xidian University, China
IFS-P5.4: JPEG ENCRYPTION WITH DC PREDICTION AND RUN-BASED RS PAIRS PERMUTATION
Yanyixiao Wang, Peiya Li, Jinan University, China
IFS-P5.5: CLPSD: DETECTING ETHEREUM PHISHING SCAMS BASED ON CURRICULUM LEARNING
Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li, Inner Mongolia University, China
IFS-P5.6: Gradient Inversion Attacks on Acoustic Signals: Revealing Security Risks in Audio Recognition Systems
Pretom Roy Ovi, Aryya Gangopadhyay, University of Maryland Baltimore County, United States of America
IFS-P5.7: IMAGE STEGANOGRAPHY WITH DEEP ORTHOGONAL FUSION OF MULTI-SCALE CHANNEL ATTENTION
Yinyin Peng, Donghui Hu, Gang Pei, Yaofei Wang, Hefei University of Technology, China
IFS-P5.8: ON THE PRIVACY OF FEDERATED CLUSTERING: A CRYPTOGRAPHIC VIEW
Qiongxiu Li, Tsinghua University, China; Lixia Luo, Huawei Inc., China
IFS-P5.9: MLMTD: A MULTI-LAYER MALICIOUS TRAFFIC DETECTION MODEL BASED ON MULTI-BRANCH OCTAVE CONVOLUTION AND ATTENTION MECHANISM
Ziang Li, Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, China; Chengxiang Si, National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC), China; Zhenyu Cheng, Shuyuan Zhao, Yong Ding, Institute of Information Engineering, Chinese Academy of Sciences, China
IFS-P5.10: ENHANCING STEGANOGRAPHY OF GENERATIVE IMAGE BASED ON IMAGE RETOUCHING
Yue Gao, Jinshuai Yang, Cheng Chen, Kaiyi Pang, Yongfeng Huang, Tsinghua University, China
IFS-P5.11: CPMSVD: Cross-Project Multiclass Software Vulnerability Detection via Fused Deep Feature and Domain Adaptation
Gewangzi Du, Liwei Chen, Tongshuai Wu, Chenguang Zhu, Gang Shi, Chinese Academy of Sciences, China
IFS-P5.12: A FORMAT COMPLIANT ENCRYPTION METHOD FOR 3D OBJECTS ALLOWING HIERARCHICAL DECRYPTION
Bianca Jansen van Rensburg, William Puech, LIRMM, Univ. Montpellier / CNRS, France; Jean-Pierre Pedeboy, Strategies Company, France
Contacts