Frontiers in Cyber Security (eBook, PDF)
7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I
Redaktion: Chen, Biwen; Huang, Min; Fu, Xinwen
Alle Infos zum eBook verschenken
Frontiers in Cyber Security (eBook, PDF)
7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I
Redaktion: Chen, Biwen; Huang, Min; Fu, Xinwen
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024.
The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions.
The papers are organized in the following topical sections:
Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation.
Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 40.77MB
- Frontiers in Cyber Security (eBook, PDF)57,95 €
- -29%11Federated Learning Systems (eBook, PDF)121,95 €
- AI Embedded Assurance for Cyber Systems (eBook, PDF)113,95 €
- Computational Intelligence, Communications, and Business Analytics (eBook, PDF)40,95 €
- Yaochu JinFederated Learning (eBook, PDF)121,95 €
- Artificial Intelligence Security and Privacy (eBook, PDF)65,95 €
- Artificial Intelligence Security and Privacy (eBook, PDF)46,95 €
-
-
-
The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions.
The papers are organized in the following topical sections:
Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation.
Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 529
- Erscheinungstermin: 26. Dezember 2024
- Englisch
- ISBN-13: 9789819601516
- Artikelnr.: 72680532
- Verlag: Springer Nature Singapore
- Seitenzahl: 529
- Erscheinungstermin: 26. Dezember 2024
- Englisch
- ISBN-13: 9789819601516
- Artikelnr.: 72680532
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Large Vision-Language Model Security: A Survey.
.- A Robust Linked List Steganography Without Embedding for Digital Images.
.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.
.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.
.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.
.- On the Differential Transparency Order of Boolean Functions.
.- Federated Learning.
.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.
.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.
.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.
.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.
.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.
.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.
.- Privacy-Preserving Services.
.- Secure Cloud Album: Design and Implementation.
.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.
.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.
.- Advertising Diversion App using Clipboard Content Recognition.
.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.
.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.
.- Blockchain and Distributed System.
.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.
.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.
.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.
.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.
.- Public-Key Cryptography.
.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.
.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.
.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.
.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.
.- A Quantum-Resistant Blockchain Based on Hash Function.
.- Multi-Party Computation.
.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.
.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
.- Large Vision-Language Model Security: A Survey.
.- A Robust Linked List Steganography Without Embedding for Digital Images.
.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.
.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.
.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.
.- On the Differential Transparency Order of Boolean Functions.
.- Federated Learning.
.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.
.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.
.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.
.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.
.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.
.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.
.- Privacy-Preserving Services.
.- Secure Cloud Album: Design and Implementation.
.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.
.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.
.- Advertising Diversion App using Clipboard Content Recognition.
.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.
.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.
.- Blockchain and Distributed System.
.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.
.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.
.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.
.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.
.- Public-Key Cryptography.
.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.
.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.
.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.
.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.
.- A Quantum-Resistant Blockchain Based on Hash Function.
.- Multi-Party Computation.
.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.
.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.