Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Ubiquitous security = 4th Internatio...
~
Wang, Guojun.
Linked to FindBook
Google Book
Amazon
博客來
Ubiquitous security = 4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Ubiquitous security/ edited by Guojun Wang ... [et al.].
Reminder of title:
4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
remainder title:
UBISEC 2024
other author:
Wang, Guojun.
corporate name:
International Conference on Ubiquitous Security
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xviii, 444 p. :ill., digital ;24 cm.
[NT 15003449]:
Cyberspace Security. -- vCan We Use Smart Contracts to Improve Security of IoT. -- A Data-free Backdoor Attack Approach in Self-Supervised Models. -- Closed-loop Safe Correction for Reinforcement Learning Policy. -- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. -- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. -- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. -- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. -- Single sign-on Security: An Empirical Study of Sign in with Apple. -- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. -- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. -- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges. -- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. -- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. -- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. -- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. -- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. -- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. -- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. -- Improving Transferability of Adversarial Examples by SVD Transformation. -- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. -- Cyberspace Privacy. -- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. -- Enhancing Personalized Bundle Recommendation with Serendipity. -- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. -- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. -- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. -- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. -- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. -- Short Papers. -- TNSSL: TrojanNet Attack in Self-Supervised Learning. -- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. -- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. -- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. -- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-96-4836-8
ISBN:
9789819648368
Ubiquitous security = 4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
Ubiquitous security
4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /[electronic resource] :UBISEC 2024edited by Guojun Wang ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xviii, 444 p. :ill., digital ;24 cm. - Communications in computer and information science,24691865-0937 ;. - Communications in computer and information science ;2469..
Cyberspace Security. -- vCan We Use Smart Contracts to Improve Security of IoT. -- A Data-free Backdoor Attack Approach in Self-Supervised Models. -- Closed-loop Safe Correction for Reinforcement Learning Policy. -- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. -- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. -- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. -- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. -- Single sign-on Security: An Empirical Study of Sign in with Apple. -- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. -- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. -- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges. -- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. -- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. -- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. -- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. -- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. -- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. -- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. -- Improving Transferability of Adversarial Examples by SVD Transformation. -- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. -- Cyberspace Privacy. -- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. -- Enhancing Personalized Bundle Recommendation with Serendipity. -- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. -- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. -- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. -- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. -- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. -- Short Papers. -- TNSSL: TrojanNet Attack in Self-Supervised Learning. -- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. -- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. -- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. -- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29-31, 2024. The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.
ISBN: 9789819648368
Standard No.: 10.1007/978-981-96-4836-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / I58 2024
Dewey Class. No.: 005.8
Ubiquitous security = 4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
LDR
:04385nmm a2200349 a 4500
001
2409741
003
DE-He213
005
20250515130308.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819648368
$q
(electronic bk.)
020
$a
9789819648351
$q
(paper)
024
7
$a
10.1007/978-981-96-4836-8
$2
doi
035
$a
978-981-96-4836-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2024
072
7
$a
UB
$2
bicssc
072
7
$a
COM005000
$2
bisacsh
072
7
$a
UX
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
International Conference on Ubiquitous Security
$n
(4th :
$d
2024 :
$c
Changsha Shi, China)
$3
3783127
245
1 0
$a
Ubiquitous security
$h
[electronic resource] :
$b
4th International Conference, UBISEC 2024, Changsha, China, December 29-31, 2024 : revised selected papers /
$c
edited by Guojun Wang ... [et al.].
246
3
$a
UBISEC 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xviii, 444 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
2469
505
0
$a
Cyberspace Security. -- vCan We Use Smart Contracts to Improve Security of IoT. -- A Data-free Backdoor Attack Approach in Self-Supervised Models. -- Closed-loop Safe Correction for Reinforcement Learning Policy. -- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. -- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. -- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. -- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. -- Single sign-on Security: An Empirical Study of Sign in with Apple. -- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. -- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. -- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges. -- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. -- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. -- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. -- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. -- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. -- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. -- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. -- Improving Transferability of Adversarial Examples by SVD Transformation. -- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. -- Cyberspace Privacy. -- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. -- Enhancing Personalized Bundle Recommendation with Serendipity. -- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. -- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. -- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. -- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. -- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. -- Short Papers. -- TNSSL: TrojanNet Attack in Self-Supervised Learning. -- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. -- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. -- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. -- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.
520
$a
This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29-31, 2024. The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
700
1
$a
Wang, Guojun.
$3
1937162
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
2469.
$3
3783128
856
4 0
$u
https://doi.org/10.1007/978-981-96-4836-8
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9515239
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I58 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login