LEADER 03657nam 22006255 450 001 9910887811703321 005 20250807143258.0 010 $a9789819739738 010 $a981973973X 024 7 $a10.1007/978-981-97-3973-8 035 $a(MiAaPQ)EBC31681655 035 $a(Au-PeEL)EBL31681655 035 $a(CKB)35980432000041 035 $a(Exl-AI)31681655 035 $a(DE-He213)978-981-97-3973-8 035 $a(EXLCZ)9935980432000041 100 $a20240918d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAI Applications in Cyber Security and Communication Networks $eProceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023) /$fedited by Chaminda Hewage, Liqaa Nawaf, Nishtha Kesswani 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (546 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1032 311 08$a9789819739721 311 08$a9819739721 327 $aPreface -- Contents -- Editors and Contributors -- An RFP Dataset for Real, Fake, and Partially Fake Audio Detection -- 1 Introduction -- 2 The RFP Dataset -- 2.1 Real Audio Collection -- 2.2 Text-to-Speech Audio Generation -- 2.3 Voice Conversion (VC) Audio Generation -- 2.4 Audio with Noise Generation -- 2.5 Partial Fake (PF) Audio Generation -- 3 Dataset Composition -- 3.1 RFP Original Version -- 3.2 RFP Normalised Version -- 4 Experiments -- 4.1 ASVspoof 2021 Baseline -- 4.2 TSSDNet -- 4.3 RawGAT-ST -- 4.4 AASIST -- 5 Experiments Result -- 6 Conclusions and Future Developments -- References -- Evaluating Data Distribution Strategies in Federated Learning: A Trade-Off Analysis Between Privacy and Performance for IoT Security -- 1 Introduction -- 2 Related Works -- 3 IoT Device Security Using Federated Learning -- 3.1 Edge-IIoTset -- 3.2 CICIoT2023 -- 4 Experimentation and Results -- 4.1 Centralised Machine Learning$7Generated by AI. 330 $aThis book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK, during 11?12 December 2023. This book presents recent innovations in the field of cyber-security and privacy in communication networks in addition to cutting edge research in the field of next-generation communication networks. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1032 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aData protection 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 676 $a005.8 700 $aHewage$b Chaminda$01373670 701 $aNawaf$b Liqaa$01770974 701 $aKesswani$b Nishtha$01358149 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910887811703321 996 $aAI Applications in Cyber Security and Communication Networks$94254735 997 $aUNINA