Update cookies preferences

E-book: Artificial Intelligence Security and Privacy: Second International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings

Edited by , Edited by , Edited by
  • Format - EPUB+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.





The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications.
.- BadHAR: Backdoor Attacks in Federated Human Activity Recognition
Systems.

.- Fully Automated Generation Mechanism of Rootfs for Specified Operating
Systems under Linux.

.- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels.

.- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated
Learning.

.- Intelligent backpack based on ireless mobile technology.

.- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on
BERTopic: A Case Study of Hotel Management.

.- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay
Modulation.

.- Enhancing Adversarial Robustness in Object Detection via Multi-Task
Learning and Class-Aware Adversarial Training.

.- FedHKD: A Hierarchical Federated Learning Approach Integrating  lustering
and Knowledge Distillation for Non-IID Data.

.- Application of Ensemble Learning Based on High-Dimensional Features in
Financial Big Data.

.- Collaborative Framework for Dynamic Knowledge Updating and Transparent
Reasoning with Large Language Models.

.- Zero-Shot Dense Retrieval based on Query Expansion.

.- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation.

.- Generative Image Steganography Based on Latent Space Vector Coding and
Diffusion Model.