Personnaliser

OK

Ubiquitous Security -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Aucun vendeur ne propose ce produit

Soyez informé(e) par e-mail dès l'arrivée de cet article

Créer une alerte prix
Publicité
 
Vous avez choisi le retrait chez le vendeur à
  • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
  • Récupérez le produit directement chez le vendeur
  • Rakuten vous rembourse en cas de problème

Gratuit et sans engagement

Félicitations !

Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

En savoir plus

Retour

Horaires

      Note :


      Avis sur Ubiquitous Security de Format Broché  - Livre Informatique

      Note : 0 0 avis sur Ubiquitous Security de Format Broché  - Livre Informatique

      Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


      Présentation Ubiquitous Security de Format Broché

       - Livre Informatique

      Livre Informatique - 01/05/2025 - Broché - Langue : Anglais

      . .

    • Editeur : Springer Singapore
    • Langue : Anglais
    • Parution : 01/05/2025
    • Format : Moyen, de 350g à 1kg
    • Nombre de pages : 464.0
    • ISBN : 9819648351



    • Résumé :
      This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29&ndash...

      Biographie:

      .- Cyberspace Security.
      .- vCan We Use Smart Contracts to Improve Security of IoT.
      .- A Data-free Backdoor Attack Approach in Self-Supervised Models.
      .- Closed-loop Safe Correction for Reinforcement Learning Policy.
      .- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
      .- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
      .- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
      .- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
      .- Single sign-on Security: An Empirical Study of Sign in with Apple.
      .- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
      .- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
      .- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
      .- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
      .- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
      .- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
      .- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
      .- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
      .- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
      .- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
      .- Improving Transferability of Adversarial Examples by SVD Transformation.
      .- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.

      .- Cyberspace Privacy.
      .- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
      .- Enhancing Personalized Bundle Recommendation with Serendipity.
      .- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
      .- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
      .- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
      .- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
      .- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
      .- Short Papers.
      .- TNSSL: TrojanNet Attack in Self-Supervised Learning.
      .- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
      .- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
      .- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
      .- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.

      ...

      Sommaire:
      31, 2024. The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy....

      Le choixNeuf et occasion
      Minimum5% remboursés
      La sécuritéSatisfait ou remboursé
      Le service clientsÀ votre écoute
      LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
      visavisa
      mastercardmastercard
      klarnaklarna
      paypalpaypal
      floafloa
      americanexpressamericanexpress
      Rakuten Logo
      • Rakuten Kobo
      • Rakuten TV
      • Rakuten Viber
      • Rakuten Viki
      • Plus de services
      • À propos de Rakuten
      Rakuten.com