Emerging Information Security and Applications
Emerging Information Security and Applications
4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings
Meng, Weizhi; Shao, Jun; Katsikas, Sokratis K.
Springer Verlag, Singapore
01/2024
185
Mole
Inglês
9789819996131
15 a 20 dias
Descrição não disponível.
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples.- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-step Method.- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System.- A Systematic Method for Constructing ICT Supply Chain Security Requirements.- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography.- Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge.- Deep Neural Network Model over Encrypted Data.- Privacy Protection Mechanism for Fair Federated Learning.- Chinese Named Entity Recognition within the Electric Power Domain.- Adversarial Sampling Attacks and Defense in DNS Data Exfiltration.- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
computer security;network protocols;data security;cryptology;privacy;authentification;data mining;public key cryptography;access control;computer crime;artificial intelligence
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples.- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-step Method.- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System.- A Systematic Method for Constructing ICT Supply Chain Security Requirements.- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography.- Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge.- Deep Neural Network Model over Encrypted Data.- Privacy Protection Mechanism for Fair Federated Learning.- Chinese Named Entity Recognition within the Electric Power Domain.- Adversarial Sampling Attacks and Defense in DNS Data Exfiltration.- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.