Frontiers in Cyber Security
portes grátis
Frontiers in Cyber Security
7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I
Fu, Xinwen; Huang, Min; Chen, Biwen
Springer Nature Switzerland AG
01/2025
523
Mole
9789819601509
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
.- Machine Learning and Differential Privacy.
.- Large Vision-Language Model Security: A Survey.
.- A Robust Linked List Steganography Without Embedding for Digital Images.
.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.
.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.
.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.
.- On the Differential Transparency Order of Boolean Functions.
.- Federated Learning.
.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.
.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.
.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.
.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.
.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.
.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.
.- Privacy-Preserving Services.
.- Secure Cloud Album: Design and Implementation.
.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.
.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.
.- Advertising Diversion App using Clipboard Content Recognition.
.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.
.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.
.- Blockchain and Distributed System.
.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.
.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.
.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.
.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.
.- Public-Key Cryptography.
.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.
.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.
.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.
.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.
.- A Quantum-Resistant Blockchain Based on Hash Function.
.- Multi-Party Computation.
.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.
.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
.- Large Vision-Language Model Security: A Survey.
.- A Robust Linked List Steganography Without Embedding for Digital Images.
.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.
.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.
.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.
.- On the Differential Transparency Order of Boolean Functions.
.- Federated Learning.
.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.
.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.
.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.
.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.
.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.
.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.
.- Privacy-Preserving Services.
.- Secure Cloud Album: Design and Implementation.
.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.
.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.
.- Advertising Diversion App using Clipboard Content Recognition.
.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.
.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.
.- Blockchain and Distributed System.
.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.
.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.
.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.
.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.
.- Public-Key Cryptography.
.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.
.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.
.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.
.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.
.- A Quantum-Resistant Blockchain Based on Hash Function.
.- Multi-Party Computation.
.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.
.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Machine Learning;Differential Privacy;Federated Learning;Privacy-preserving Services;Blockchain;Distributed System;Public Key Cryptography;Multi-party Computation;Smart Grid;Authentication
.- Machine Learning and Differential Privacy.
.- Large Vision-Language Model Security: A Survey.
.- A Robust Linked List Steganography Without Embedding for Digital Images.
.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.
.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.
.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.
.- On the Differential Transparency Order of Boolean Functions.
.- Federated Learning.
.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.
.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.
.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.
.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.
.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.
.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.
.- Privacy-Preserving Services.
.- Secure Cloud Album: Design and Implementation.
.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.
.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.
.- Advertising Diversion App using Clipboard Content Recognition.
.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.
.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.
.- Blockchain and Distributed System.
.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.
.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.
.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.
.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.
.- Public-Key Cryptography.
.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.
.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.
.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.
.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.
.- A Quantum-Resistant Blockchain Based on Hash Function.
.- Multi-Party Computation.
.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.
.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
.- Large Vision-Language Model Security: A Survey.
.- A Robust Linked List Steganography Without Embedding for Digital Images.
.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.
.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.
.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.
.- On the Differential Transparency Order of Boolean Functions.
.- Federated Learning.
.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.
.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.
.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.
.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.
.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.
.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.
.- Privacy-Preserving Services.
.- Secure Cloud Album: Design and Implementation.
.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.
.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.
.- Advertising Diversion App using Clipboard Content Recognition.
.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.
.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.
.- Blockchain and Distributed System.
.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.
.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.
.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.
.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.
.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.
.- Public-Key Cryptography.
.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.
.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.
.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.
.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.
.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.
.- A Quantum-Resistant Blockchain Based on Hash Function.
.- Multi-Party Computation.
.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.
.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.
.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.