| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911003592103321 |
|
|
Titolo |
Ubiquitous Security : 4th International Conference, UbiSec 2024, Changsha, China, December 29–31, 2024, Revised Selected Papers / / edited by Guojun Wang, Zheng Yan, Yulei Wu, Kuan-Ching Li |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVIII, 444 p. 135 illus., 118 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 2469 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Application software |
Artificial intelligence |
Data protection |
Computer engineering |
Computer networks |
Computer and Information Systems Applications |
Artificial Intelligence |
Data and Information Security |
Computer Engineering and Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Cyberspace Security. -- vCan We Use Smart Contracts to Improve Security of IoT. -- A Data-free Backdoor Attack Approach in Self-Supervised Models. -- Closed-loop Safe Correction for Reinforcement Learning Policy. -- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. -- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. -- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. -- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. -- Single sign-on Security: An Empirical Study of Sign in with Apple. -- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. -- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. -- SADT: |
|
|
|
|
|
|
|
|
|
|
|
Sandwich Attack Detection for Transactions on Decentralized Exchanges. -- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. -- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. -- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. -- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. -- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. -- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. -- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. -- Improving Transferability of Adversarial Examples by SVD Transformation. -- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. -- Cyberspace Privacy. -- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. -- Enhancing Personalized Bundle Recommendation with Serendipity. -- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. -- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. -- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. -- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. -- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. -- Short Papers. -- TNSSL: TrojanNet Attack in Self-Supervised Learning. -- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. -- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. -- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. -- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29–31, 2024. The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy. |
|
|
|
|
|
|
|
| |