libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

cai jun (curatore); zhou zhili (curatore); chen kongyang (curatore) - security and privacy in new computing environments
Zoom

Security and Privacy in New Computing Environments 6th International Conference, SPNCE 2023, Guangzhou, China, November 25–26, 2023, Proceedings

; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
81,98 €
NICEPRICE
77,88 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 01/2025





Trama

This book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023.
The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics.





Sommario

.- IoT, Network Security and Privacy Challenges.

.- HybridFL: Hybrid approach toward privacy-preserving Federated Learning.

.- The Design of a Multi-application micro-operating system platform in the context of big data.

.- Consortium Blockchain Storage Optimization Based on Fountain Codes.

.- An Incentive Mechanism and An Offline Trajectory Publishing Algorithm Considering Sensing Area Coverage Maximization and Participant Privacy Level.

.- Research on Face Recognition System Based on RLWE Homomorphic Encryption.

.- Feedback Feed-forward Iterative Learning Control for Non-affine Nonlinear discrete-time Systems with Varying Trail Lengths.

.- Open-Closed-Loop Iterative Learning Control Based on Differential Evolution Algorithm for Nonlinear System.

.- Overview of Vehicle Edge Computing and Its Security.

.- Multi-party Privacy Preserving Neural Networks.

.- ConFlow: Contrast Network Flow Improving Class Imbalanced Learning in Network Intrusion Detection.

.- Anomaly Detection of Unstable Log Data Based on Contrastive Learning.

.- An integration-enhanced ZNN approach for chaotic combined synchronization with external disturbances.

.- A lightweight anomaly detection method for industrial processes based on event correlation behavior.

.- A Novel Polar Code-Based Key Encapsulation Mechanism with Non-Permutation Equivalent Public Key.

.- Two-stage Multi-lingual Speech Emotion Recognition for Multi-lingual Emotional Speech Synthesis.

.- EncoderMU: Machine Unlearning In Contrastive Learning.

.- NoCrypto: A Web Mining Behavior Detection Method Based on RGB Images.

.- Security and PrivacyffSteganography and Forensics.

.- Image copy-move forgery detection in the social media based on a prior density clustering and the point density.

.- Detection of Speech Spoofing Based on Dense Convolutional Network.

.- Speech Emotion Recognition Based on Recurrent Neural Networks with Conformer for Emotional Speech Synthesis.

.- Route Privacy-Preserving Authentication Scheme based on PUF in VANETs.

.- Stable NICE Model-Based Image Generation for Generative Steganography.

.- Computer-generated Image Forensics Based on Vision Transformer with Forensic Feature Pre-processing Module.

.- VoIP steganalysis using shallow multiscale convolution and transformer.











Altre Informazioni

ISBN:

9783031736988

Condizione: Nuovo
Collana: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XI, 354 p. 124 illus., 99 illus. in color.
Pagine Arabe: 354
Pagine Romane: xi


Dicono di noi