LEADER 07781nam 22004573 450 001 9910831008903321 005 20240205084506.0 010 $a3-031-52265-6 035 $a(MiAaPQ)EBC31095754 035 $a(Au-PeEL)EBL31095754 035 $a(MiAaPQ)EBC31132663 035 $a(Au-PeEL)EBL31132663 035 $a(EXLCZ)9930181906100041 100 $a20240205d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBig Data Technologies and Applications $e13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings 205 $a1st ed. 210 1$aCham :$cSpringer International Publishing AG,$d2024. 210 4$d©2024. 215 $a1 online resource (198 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ;$vv.555 311 08$aPrint version: Tan, Zhiyuan Big Data Technologies and Applications Cham : Springer International Publishing AG,c2024 9783031522642 327 $aIntro -- Preface -- Organization -- Contents -- Main Track - Regular Papers -- CTL-I: Infrared Few-Shot Learning via Omnidirectional Compatible Class-Incremental -- 1 Introduction -- 2 Related Work -- 2.1 Few Shot Learning -- 2.2 Class Incremental Learning in Infrared Images -- 3 Proposed Method -- 3.1 Preliminary -- 3.2 Model of CTL-I -- 3.3 Virtual Prototypes Assignment with Loss -- 3.4 Compatibility Update -- 4 Experiments -- 4.1 Implementation Details -- 4.2 Benchmark Comparison -- 4.3 Further Analysis -- 5 Conclusion -- References -- Can Federated Models Be Rectified Through Learning Negative Gradients? -- 1 Introduction -- 2 Related Work -- 2.1 Model Poisoning and Defending Mechanisms -- 2.2 Detection of Poisoned Models -- 2.3 Formulation of Machine Unlearning -- 2.4 Unlearning Federated Learning -- 2.5 Challenges to Federated Unlearning -- 3 Methodology -- 3.1 Experimental Data -- 3.2 Network Implementation -- 4 Experimental Results and Discussion -- 4.1 Federated Main Model -- 4.2 Retraining of Federated Main Model -- 5 Conclusion -- References -- BigText-QA: Question Answering over a Large-Scale Hybrid Knowledge Graph -- 1 Introduction -- 2 Background and Related Work -- 3 BigText Knowledge Graph -- 4 BigText Question Answering -- 4.1 Question-Answering Pipeline -- 4.2 Weighting Schemes -- 4.3 Similarities and Thresholds -- 5 Experiments -- 6 Result and Discussion -- 7 Conclusion -- References -- STLGCN: Spatial-Temporal Graph Convolutional Network for Long Term Traffic Forecasting -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolution -- 2.2 Graph Generation -- 2.3 Traffic Forecasting -- 3 Methods -- 3.1 Preliminary -- 3.2 Framework -- 3.3 Graph Generation Block -- 3.4 Spatial-Temporal Blocks -- 4 Experiments -- 4.1 Datasets -- 4.2 Baseline Algorithms -- 4.3 Experiment Settings -- 4.4 Experimental Results -- 5 Conclusions. 327 $aReferences -- Image Forgery Detection Using Cryptography and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Summary -- 3.2 Image Processing -- 3.3 Hash Generation -- 4 Experimental Design -- 4.1 Deep Learning Experiment -- 5 Results and Discussion -- 5.1 Deep Learning Without Hashing -- 5.2 Deep Learning with Cryptography -- 5.3 Results Evaluation -- 6 Conclusion -- References -- Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminary -- 2.1 Bilinear Groups -- 2.2 Access Structures -- 2.3 Linear Secret Sharing Schemes -- 3 System Model -- 3.1 Security Model -- 4 Our Construction -- 5 Our Construction with CRFs -- 6 Secure Analysis -- 6.1 Proof of RH-CPABE -- 6.2 Proof of RH-CPABE-CRF -- 7 Performance -- 8 Conclusion -- References -- IoT Attacks Countermeasures: Systematic Review and Future Research Direction -- 1 Introduction -- 1.1 Background and Statistics -- 1.2 Computing Survey -- 2 IoT Attack Countermeasures Background -- 2.1 Advantages of IoT Attack Countermeasures -- 2.2 Disadvantages of IoT Attack Countermeasures -- 3 Comparative Systematic Analysis of the Study -- 3.1 Classified by Publication Type -- 3.2 Classified by Publication Year -- 4 IoT Architecture and Its Security Challenges -- 4.1 Perception Layer (PL) -- 4.2 Middle-Ware Layer (ML) -- 4.3 Application Layer (AL) -- 4.4 Network Layer (NL) -- 4.5 Security Challenges and Threat Model -- 5 Countermeasures and Threat Models for Security Attacks in IoT -- 5.1 Novel IoT Attack Countermeasures -- 6 Future Direction, Summary and Conclusion -- 6.1 Conclusion -- References -- A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence -- 1 Introduction -- 2 Literature Search and Bibliometric Network. 327 $a2.1 Literature Search -- 2.2 Bibliometric Analysis -- 2.3 Blockchain and Digital Forensic Bibliometric Network -- 3 Systematic Review -- 3.1 Digital Evidence -- 3.2 Chain of Custody -- 3.3 Storage Architectures -- 3.4 Blockchain Technology: Key Principles and Characteristics -- 3.5 Blockchain's Intersection with Digital Forensics -- 3.6 Blockchain in Chain of Custody for Digital Evidence -- 3.7 Existing Frameworks and Methodology -- 3.8 Open-Ended Issues -- 4 Conclusion -- References -- Main Track-Short Paper and PhD Track -- Forest Fire Prediction Using Multi-Source Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Methodology -- 5 Experimentation and Results -- 6 Conclusion -- References -- Research on Preprocessing Process for Improved Image Generation Based on Contrast Enhancement -- 1 Introduction -- 2 Proposed Preprocessing Process -- 2.1 Extract Optimal Values -- 2.2 Generation an Image -- 2.3 Verifying the Quality of the Generated Image -- 3 Conclusion -- References -- An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case -- 1 Introduction -- 1.1 Challenges of Current Evidence Management Processes -- 2 Relevant Technologies -- 2.1 Blockchain and Its Feasibility for Evidence Storage -- 2.2 Evidence Storage Architectures -- 2.3 IPFS -- 2.4 Encryption Methods (Evidence Security and Access Control) -- 3 System Overview -- 3.1 System Requirements -- 3.2 System Design and Case Study -- 4 Conclusions -- References -- SECSOC Workshop -- A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Our Contribution -- 2 Background Overview of Blockchain Technology -- 2.1 Ethereum -- 2.2 Smart Contract -- 3 Non-Fungible Token (NFT) -- 3.1 Protecting Digital Collectibles. 327 $a3.2 Boosting Gaming Industry -- 3.3 Tokenised Stock -- 3.4 Protocols -- 3.5 Standards -- 3.6 Desired Properties -- 4 NFT Challenges -- 4.1 Usability Challenges -- 4.2 Slow Confirmation -- 4.3 High Gas-Prices -- 4.4 Data Inaccessibility -- 4.5 Anonymity and Privacy -- 4.6 Governance Consideration -- 4.7 Intellectual Property (IP) Right -- 5 Security Analysis -- 5.1 Cybersecurity -- 5.2 Spoofing -- 5.3 Tampering -- 5.4 Smart Contracts Security -- 5.5 Repudiation -- 5.6 DoS -- 6 Conclusion -- References -- Author Index. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series 700 $aTan$b Zhiyuan$01631559 701 $aWu$b Yulei$01619491 701 $aXu$b Min$0879309 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910831008903321 996 $aBig Data Technologies and Applications$93970399 997 $aUNINA