Ubiquitous Security (eBook, PDF)
4th International Conference, UbiSec 2024, Changsha, China, December 29-31, 2024, Revised Selected Papers
Redaktion: Wang, Guojun; Li, Kuan-Ching; Wu, Yulei; Yan, Zheng
96,95 €
96,95 €
inkl. MwSt.
Sofort per Download lieferbar
48 °P sammeln
96,95 €
Als Download kaufen
96,95 €
inkl. MwSt.
Sofort per Download lieferbar
48 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
96,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
48 °P sammeln
Ubiquitous Security (eBook, PDF)
4th International Conference, UbiSec 2024, Changsha, China, December 29-31, 2024, Revised Selected Papers
Redaktion: Wang, Guojun; Li, Kuan-Ching; Wu, Yulei; Yan, Zheng
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29-31, 2024.
The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 52.63MB
Andere Kunden interessierten sich auch für
Ubiquitous Security (eBook, PDF)72,95 €
Ubiquitous Security (eBook, PDF)72,95 €
Ubiquitous Security (eBook, PDF)64,95 €
Artificial Intelligence and Security (eBook, PDF)104,95 €
Artificial Intelligence and Security (eBook, PDF)72,95 €
Artificial Intelligence and Security (eBook, PDF)40,95 €
Advances in Artificial Intelligence and Security (eBook, PDF)96,95 €-
-
-
This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29-31, 2024.
The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.
The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 444
- Erscheinungstermin: 15. Mai 2025
- Englisch
- ISBN-13: 9789819648368
- Artikelnr.: 74230303
- Verlag: Springer Nature Singapore
- Seitenzahl: 444
- Erscheinungstermin: 15. Mai 2025
- Englisch
- ISBN-13: 9789819648368
- Artikelnr.: 74230303
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Cyberspace Security.
.- vCan We Use Smart Contracts to Improve Security of IoT.
.- A Data-free Backdoor Attack Approach in Self-Supervised Models.
.- Closed-loop Safe Correction for Reinforcement Learning Policy.
.- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
.- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
.- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
.- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
.- Single sign-on Security: An Empirical Study of Sign in with Apple.
.- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
.- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
.- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
.- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
.- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
.- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
.- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
.- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
.- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
.- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
.- Improving Transferability of Adversarial Examples by SVD Transformation.
.- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.
.- Cyberspace Privacy.
.- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
.- Enhancing Personalized Bundle Recommendation with Serendipity.
.- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
.- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
.- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
.- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
.- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
.- Short Papers.
.- TNSSL: TrojanNet Attack in Self-Supervised Learning.
.- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
.- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
.- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
.- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
.- vCan We Use Smart Contracts to Improve Security of IoT.
.- A Data-free Backdoor Attack Approach in Self-Supervised Models.
.- Closed-loop Safe Correction for Reinforcement Learning Policy.
.- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
.- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
.- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
.- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
.- Single sign-on Security: An Empirical Study of Sign in with Apple.
.- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
.- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
.- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
.- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
.- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
.- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
.- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
.- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
.- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
.- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
.- Improving Transferability of Adversarial Examples by SVD Transformation.
.- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.
.- Cyberspace Privacy.
.- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
.- Enhancing Personalized Bundle Recommendation with Serendipity.
.- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
.- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
.- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
.- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
.- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
.- Short Papers.
.- TNSSL: TrojanNet Attack in Self-Supervised Learning.
.- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
.- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
.- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
.- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
.- Cyberspace Security.
.- vCan We Use Smart Contracts to Improve Security of IoT.
.- A Data-free Backdoor Attack Approach in Self-Supervised Models.
.- Closed-loop Safe Correction for Reinforcement Learning Policy.
.- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
.- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
.- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
.- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
.- Single sign-on Security: An Empirical Study of Sign in with Apple.
.- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
.- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
.- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
.- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
.- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
.- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
.- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
.- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
.- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
.- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
.- Improving Transferability of Adversarial Examples by SVD Transformation.
.- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.
.- Cyberspace Privacy.
.- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
.- Enhancing Personalized Bundle Recommendation with Serendipity.
.- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
.- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
.- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
.- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
.- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
.- Short Papers.
.- TNSSL: TrojanNet Attack in Self-Supervised Learning.
.- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
.- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
.- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
.- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
.- vCan We Use Smart Contracts to Improve Security of IoT.
.- A Data-free Backdoor Attack Approach in Self-Supervised Models.
.- Closed-loop Safe Correction for Reinforcement Learning Policy.
.- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
.- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
.- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
.- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
.- Single sign-on Security: An Empirical Study of Sign in with Apple.
.- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
.- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
.- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
.- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
.- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
.- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
.- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
.- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
.- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
.- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
.- Improving Transferability of Adversarial Examples by SVD Transformation.
.- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.
.- Cyberspace Privacy.
.- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
.- Enhancing Personalized Bundle Recommendation with Serendipity.
.- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
.- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
.- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
.- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
.- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
.- Short Papers.
.- TNSSL: TrojanNet Attack in Self-Supervised Learning.
.- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
.- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
.- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
.- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.







