Ubiquitous security = 4th Internatio...
Wang, Guojun.

FindBook      Google Book      Amazon      博客來     
  • Ubiquitous security = 4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Ubiquitous security/ edited by Guojun Wang ... [et al.].
    其他題名: 4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
    其他題名: UBISEC 2024
    其他作者: Wang, Guojun.
    團體作者: International Conference on Ubiquitous Security
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xviii, 444 p. :ill., digital ;24 cm.
    內容註: Cyberspace Security. -- vCan We Use Smart Contracts to Improve Security of IoT. -- A Data-free Backdoor Attack Approach in Self-Supervised Models. -- Closed-loop Safe Correction for Reinforcement Learning Policy. -- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. -- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. -- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. -- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. -- Single sign-on Security: An Empirical Study of Sign in with Apple. -- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. -- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. -- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges. -- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. -- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. -- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. -- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. -- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. -- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. -- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. -- Improving Transferability of Adversarial Examples by SVD Transformation. -- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. -- Cyberspace Privacy. -- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. -- Enhancing Personalized Bundle Recommendation with Serendipity. -- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. -- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. -- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. -- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. -- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. -- Short Papers. -- TNSSL: TrojanNet Attack in Self-Supervised Learning. -- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. -- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. -- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. -- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-4836-8
    ISBN: 9789819648368
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9515239 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 I58 2024 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入