Emerging Information Security and Applications
Emerging Information Security and Applications
5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings
Li, Wenjuan; Chen, Liqun; Lopez, Javier
Springer International Publishing AG
01/2025
270
Mole
9783031804182
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.
.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.
.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.
.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.
.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.
.- Exploring Interpretability in Backdoor Attacks on Image.
.- Attribute-Based Secret Key Signature Scheme.
.- Digital token transaction tracing method.
.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.
.- Research on Key Technologies of Fair Deep Learning.
.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.
.- Cascading failures model with noise interference in supply chain networks.
.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.
.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.
.- Blockchain-based key management scheme in Internet of Things.
.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.
.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.
.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.