LEADER 00730nam0-2200265 --450 001 9910216656403321 005 20170921114217.0 010 $a88-371-1628-4 100 $a20170921d2007----kmuy0itay5050 ba 101 $aita 102 $aIT 105 $a 001yy 200 1 $aGradiente rotore divergenza$fEnzo Tonti, Elisa Nuzzo 210 $aBologna$cPitagora$dİ2007 215 $aXX, 371 p.$cill.$d24 cm. 676 $a530.14$v21 700 1$aTonti,$bEnzo$02016 701 1$aNuzzo,$bElisa$f<1973->$0740323 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 0$aBK 912 $a9910216656403321 952 0$aM.509$biDIST 2017$fIINTC 959 0$aIINTC 996 $aGradiente rotore divergenza$91467709 997 $aUNINA LEADER 05740nam 22006855 450 001 9911003592103321 005 20250515130308.0 010 $a981-9648-36-X 024 7 $a10.1007/978-981-96-4836-8 035 $a(CKB)38815757200041 035 $a(DE-He213)978-981-96-4836-8 035 $a(MiAaPQ)EBC32123041 035 $a(Au-PeEL)EBL32123041 035 $a(OCoLC)1519976568 035 $a(EXLCZ)9938815757200041 100 $a20250515d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUbiquitous Security $e4th International Conference, UbiSec 2024, Changsha, China, December 29?31, 2024, Revised Selected Papers /$fedited by Guojun Wang, Zheng Yan, Yulei Wu, Kuan-Ching Li 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (XVIII, 444 p. 135 illus., 118 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2469 311 08$a981-9648-35-1 327 $a -- Cyberspace Security. -- vCan We Use Smart Contracts to Improve Security of IoT. -- A Data-free Backdoor Attack Approach in Self-Supervised Models. -- Closed-loop Safe Correction for Reinforcement Learning Policy. -- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. -- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. -- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. -- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. -- Single sign-on Security: An Empirical Study of Sign in with Apple. -- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. -- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. -- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges. -- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. -- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. -- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. -- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. -- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. -- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. -- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. -- Improving Transferability of Adversarial Examples by SVD Transformation. -- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. -- Cyberspace Privacy. -- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. -- Enhancing Personalized Bundle Recommendation with Serendipity. -- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. -- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. -- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. -- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. -- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. -- Short Papers. -- TNSSL: TrojanNet Attack in Self-Supervised Learning. -- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. -- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. -- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. -- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs. 330 $aThis book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29?31, 2024. The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2469 606 $aApplication software 606 $aArtificial intelligence 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aComputer and Information Systems Applications 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aComputer Engineering and Networks 615 0$aApplication software. 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aComputer and Information Systems Applications. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aComputer Engineering and Networks. 676 $a005.3 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYan$b Zheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWu$b Yulei$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Kuan-Ching$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911003592103321 996 $aUbiquitous security$92920180 997 $aUNINA