02056nam 22005295u 450 991015868320332120211006145328.097833180417983318041793(CKB)3780000000102126(OCoLC)950995361(SZ-BaSKA)220299(MiAaPQ)EBC31866066(Au-PeEL)EBL31866066(EXLCZ)99378000000010212620211006d1983 uy 0engurunu|||||txtrdacontentcrdamediacrrdacarrierSkin Painting Techniques and in vivo Carcinogenesis Bioassays : Workshop, Arlington, Va., November 1981 / editor, F. Homburger1st ed.Basel : S. Karger, 19831 online resource (VI + 314 pages) : 53 figures, 95 tablesIssn Series9783805535564 3805535562 978-3-8055-3556-4_Cover -- 978-3-8055-3556-4_00I -- 978-3-8055-3556-4_001 -- 978-3-8055-3556-4_005 -- 978-3-8055-3556-4_018 -- 978-3-8055-3556-4_043 -- 978-3-8055-3556-4_068 -- 978-3-8055-3556-4_085 -- 978-3-8055-3556-4_110 -- 978-3-8055-3556-4_128 -- 978-3-8055-3556-4_154 -- 978-3-8055-3556-4_169 -- 978-3-8055-3556-4_182 -- 978-3-8055-3556-4_187 -- 978-3-8055-3556-4_202 -- 978-3-8055-3556-4_208 -- 978-3-8055-3556-4_241 -- 978-3-8055-3556-4_259 -- 978-3-8055-3556-4_266 -- 978-3-8055-3556-4_292 -- 978-3-8055-3556-4_301 -- 978-3-8055-3556-4_311.Issn SeriesOncologyDermatologyPathologyPharmacologyVeterinary MedicineOncologyDermatologyPathologyPharmacologyVeterinary MedicineHomburger F1215083UKSKGUKSKGBOOK9910158683203321Skin Painting Techniques and in vivo Carcinogenesis Bioassays2808947UNINA04429nam 22007335 450 991104655650332120251014130418.0981-9531-85-310.1007/978-981-95-3185-1(MiAaPQ)EBC32352811(Au-PeEL)EBL32352811(CKB)41645663600041(DE-He213)978-981-95-3185-1(EXLCZ)994164566360004120251014d2026 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierData Security and Privacy Protection Third International Conference, DSPP 2025, Xi'an, China, October 16–18, 2025, Proceedings, Part II /edited by Xiaofeng Chen, Haibo Hu, Ding Wang1st ed. 2026.Singapore :Springer Nature Singapore :Imprint: Springer,2026.1 online resource (376 pages)Lecture Notes in Computer Science,1611-3349 ;16177981-9531-84-5 -- AI-based Security Applications and Technologies. -- Dual-FER: A Dual-Network Approach to Facial Expression Recognition with Enhanced Generalization. -- Digital Forensics in Ransomware Analysis for Windows-Based Computer Systems. -- Evaluating Deep Learning in Gait Recognition. -- Composite Weather Image Restoration Based on Two-Stage Feature Learning. -- An Efficient Explainability Framework for Graph Neural Networks. -- Cryptographic Protocols Design and Analysis. -- Post-Quantum Privacy-Preserving Smart Meter Data Collection Scheme from Coding. -- High-Throughput Threshold SM2 Signatures with Robustness. -- Attacks on Implementations of Lindell 17 and its Variants. -- RRSC: Revocable Ring Signature Scheme over CRYSTALS-Dilithium for VANETs. -- A Key Derivation Tree-Based Encryption and Verification Scheme for EV Data Auditing. -- Security Weaknesses in ISO 15118-Based CCS2 Charging. -- Model Security and Copyright Protection. -- SemBits: Multi-Bit Semantic Watermarking with Sentence-Level Hashing for LLMs. -- Robust Ownership Verification in Large Language Models via Equivalent Neuron Pair Encoding. -- FreMark: Frequency-Domain Watermark Embedding in Quantized LLMs. -- Bypassing Cross-Domain Restrictions with Unsupervised Visual Translation.This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025. The 36 full papers and 11 short papers presented in these two volumes were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections: Part I:AI and System Security; Blockchain and Related Technologies; Privacy Preserving/Enhancing Technologies; Cryptographic Primitives; Privacy-Aware Federated Learning; AI-based Security Applications and Technologies. Part II: AI-based Security Applications and Technologies; Cryptographic Protocols Design and Analysis; Model Security and Copyright Protection.Lecture Notes in Computer Science,1611-3349 ;16177Data protectionData protectionLaw and legislationCryptographyData encryption (Computer science)Computer securityComputer networksSecurity measuresData and Information SecurityPrivacyCryptologySecurity ServicesPrinciples and Models of SecurityMobile and Network SecurityData protection.Data protectionLaw and legislation.Cryptography.Data encryption (Computer science)Computer security.Computer networksSecurity measures.Data and Information Security.Privacy.Cryptology.Security Services.Principles and Models of Security.Mobile and Network Security.005.8Chen Xiaofeng850517Hu Haibo851635Wang Ding1071455MiAaPQMiAaPQMiAaPQBOOK9911046556503321Data Security and Privacy Protection4466443UNINA