000 | 06298nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-981-96-0151-6 | ||
003 | DE-He213 | ||
005 | 20250516160206.0 | ||
007 | cr nn 008mamaa | ||
008 | 241226s2024 si | s |||| 0|eng d | ||
020 |
_a9789819601516 _9978-981-96-0151-6 |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aFrontiers in Cyber Security _h[electronic resource] : _b7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I / _cedited by Biwen Chen, Xinwen Fu, Min Huang. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXVI, 529 p. 149 illus., 110 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v2315 |
|
505 | 0 | _a -- Machine Learning and Differential Privacy. -- Large Vision-Language Model Security: A Survey. -- A Robust Linked List Steganography Without Embedding for Digital Images. -- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding. -- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy. -- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing. -- On the Differential Transparency Order of Boolean Functions. -- Federated Learning. -- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning. -- Efficient Private Set Intersection for Vertical Federated Learning in IoV. -- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme. -- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments. -- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework. -- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference. -- Privacy-Preserving Services. -- Secure Cloud Album: Design and Implementation. -- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks. -- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server. -- Advertising Diversion App using Clipboard Content Recognition. -- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems. -- Efficient and Practical Privacy-Preserving Face Recognition Protocol. -- Blockchain and Distributed System. -- ShardOpt: Optimal Sharding Strategy with Transaction Prediction. -- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game. -- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach. -- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics. -- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT. -- Public-Key Cryptography. -- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption. -- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City. -- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme. -- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification. -- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security. -- A Quantum-Resistant Blockchain Based on Hash Function. -- Multi-Party Computation. -- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection. -- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem. -- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT. | |
520 | _aThis two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024. The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions. The papers are organized in the following topical sections: Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation. Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aChen, Biwen. _eeditor. _0(orcid)0000-0002-7314-8271 _1https://orcid.org/0000-0002-7314-8271 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aFu, Xinwen. _eeditor. _0(orcid)0000-0003-2391-7789 _1https://orcid.org/0000-0003-2391-7789 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHuang, Min. _eeditor. _0(orcid)0000-0003-2744-0455 _1https://orcid.org/0000-0003-2744-0455 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819601509 |
776 | 0 | 8 |
_iPrinted edition: _z9789819601523 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v2315 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-96-0151-6 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c277049 _d277048 |