Muutke küpsiste eelistusi

Frontiers in Cyber Security: 7th International Conference, FCS 2024, Chongqing, China, July 2628, 2024, Proceedings, Part I 2025 ed. [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 529 pages, kõrgus x laius: 235x155 mm, 110 Illustrations, color; 39 Illustrations, black and white; XVI, 529 p. 149 illus., 110 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2315
  • Ilmumisaeg: 27-Dec-2024
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 9819601509
  • ISBN-13: 9789819601509
  • Pehme köide
  • Hind: 85,76 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 100,89 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 529 pages, kõrgus x laius: 235x155 mm, 110 Illustrations, color; 39 Illustrations, black and white; XVI, 529 p. 149 illus., 110 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2315
  • Ilmumisaeg: 27-Dec-2024
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 9819601509
  • ISBN-13: 9789819601509
This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 2628, 2024.





The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions.





The papers are organized in the following topical sections:





Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation.





Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.

.- Machine Learning and Differential Privacy.

.- Large Vision-Language Model Security: A Survey.

.- A Robust Linked List Steganography Without Embedding for Digital Images.

.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.

.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.

.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.

.- On the Differential Transparency Order of Boolean Functions.

.- Federated Learning.

.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.

.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.

.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.

.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.

.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.

.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.

.- Privacy-Preserving Services.

.- Secure Cloud Album: Design and Implementation.

.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.

.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.

.- Advertising Diversion App using Clipboard Content Recognition.

.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.

.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.

.- Blockchain and Distributed System.

.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.

.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.

.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.

.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.

.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.

.- Public-Key Cryptography.

.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.

.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.

.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.

.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.

.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.

.- A Quantum-Resistant Blockchain Based on Hash Function.

.- Multi-Party Computation.

.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.

.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.

.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.