Emerging Information Security and Applications
portes grátis
Emerging Information Security and Applications
5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings
Li, Wenjuan; Lopez, Javier; Chen, Liqun
Springer International Publishing AG
01/2025
262
Mole
9783031804182
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
.- High-Efficiency Phase-Index Correlation Delay Shift Keying Modulation.
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cyber intelligence techniques;Multimedia security;Malware and unwanted software;Vulnerability analysis and reverse engineering;Usable security and privacy;Intrusion detection and prevention;Authentication and access control;Anonymity and privacy;Cryptographic protection;Digital forensics;Cyber physical systems security;Adversarial learning;Security measurement;Security management and policies;Hardware and physical security
.- High-Efficiency Phase-Index Correlation Delay Shift Keying Modulation.
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cyber intelligence techniques;Multimedia security;Malware and unwanted software;Vulnerability analysis and reverse engineering;Usable security and privacy;Intrusion detection and prevention;Authentication and access control;Anonymity and privacy;Cryptographic protection;Digital forensics;Cyber physical systems security;Adversarial learning;Security measurement;Security management and policies;Hardware and physical security