Frontiers in cyber security = 7th In...
International Conference on Frontiers in Cyber Security (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Frontiers in cyber security = 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024 : proceedings.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Frontiers in cyber security/ edited by Biwen Chen, Xinwen Fu, Min Huang.
    其他題名: 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024 : proceedings.
    其他題名: FCS 2024
    其他作者: Chen, Biwen.
    團體作者: International Conference on Frontiers in Cyber Security
    出版者: Singapore :Springer Nature Singapore : : 2024.,
    面頁冊數: xvi, 529 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Machine Learning and Differential Privacy. -- Large Vision-Language Model Security: A Survey. -- A Robust Linked List Steganography Without Embedding for Digital Images. -- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding. -- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy. -- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing. -- On the Differential Transparency Order of Boolean Functions. -- Federated Learning. -- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning. -- Efficient Private Set Intersection for Vertical Federated Learning in IoV. -- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme. -- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments. -- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework. -- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference. -- Privacy-Preserving Services. -- Secure Cloud Album: Design and Implementation. -- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks. -- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server. -- Advertising Diversion App using Clipboard Content Recognition. -- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems. -- Efficient and Practical Privacy-Preserving Face Recognition Protocol. -- Blockchain and Distributed System. -- ShardOpt: Optimal Sharding Strategy with Transaction Prediction. -- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game. -- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach. -- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics. -- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT. -- Public-Key Cryptography. -- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption. -- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City. -- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme. -- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification. -- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security. -- A Quantum-Resistant Blockchain Based on Hash Function. -- Multi-Party Computation. -- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection. -- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem. -- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-0151-6
    ISBN: 9789819601516
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入