Emerging Information Security and Applications

Emerging Information Security and Applications

5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings

Li, Wenjuan; Lopez, Javier; Chen, Liqun

Springer International Publishing AG

01/2025

262

Mole

9783031804182

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- High-Efficiency Phase-Index Correlation Delay Shift Keying Modulation.

.- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity.

.- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids.

.- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling.

.- Comparative Study of Machine Learning Approaches for Phishing Website Detection.

.- Exploring Interpretability in Backdoor Attacks on Image.

.- Attribute-Based Secret Key Signature Scheme.

.- Digital token transaction tracing method.

.- GPT-based WebAssembly Instruction Analysis for Program Language Processing.

.- Research on Key Technologies of Fair Deep Learning.

.- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning.

.- Cascading failures model with noise interference in supply chain networks.

.- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction.

.- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences.

.- Blockchain-based key management scheme in Internet of Things.

.- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework.

.- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting.

.- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cyber intelligence techniques;Multimedia security;Malware and unwanted software;Vulnerability analysis and reverse engineering;Usable security and privacy;Intrusion detection and prevention;Authentication and access control;Anonymity and privacy;Cryptographic protection;Digital forensics;Cyber physical systems security;Adversarial learning;Security measurement;Security management and policies;Hardware and physical security