Frontiers in Cyber Security

Frontiers in Cyber Security

7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I

Fu, Xinwen; Huang, Min; Chen, Biwen

Springer Nature Switzerland AG

01/2025

523

Mole

9789819601509

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Machine Learning and Differential Privacy.



.- Large Vision-Language Model Security: A Survey.



.- A Robust Linked List Steganography Without Embedding for Digital Images.



.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.



.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.



.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.



.- On the Differential Transparency Order of Boolean Functions.



.- Federated Learning.



.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.



.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.



.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.



.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.



.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.



.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.



.- Privacy-Preserving Services.



.- Secure Cloud Album: Design and Implementation.



.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.



.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.



.- Advertising Diversion App using Clipboard Content Recognition.



.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.



.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.



.- Blockchain and Distributed System.



.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.



.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.



.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.



.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.



.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.



.- Public-Key Cryptography.



.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.



.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.



.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.



.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.



.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.



.- A Quantum-Resistant Blockchain Based on Hash Function.



.- Multi-Party Computation.



.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.



.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.



.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Machine Learning;Differential Privacy;Federated Learning;Privacy-preserving Services;Blockchain;Distributed System;Public Key Cryptography;Multi-party Computation;Smart Grid;Authentication