LEADER 04191nam 22007215 450 001 9910983324703321 005 20250211143731.0 010 $a9789819611485$b(electronic bk.) 010 $z9789819611478 024 7 $a10.1007/978-981-96-1148-5 035 $a(MiAaPQ)EBC31882468 035 $a(Au-PeEL)EBL31882468 035 $a(CKB)37248672000041 035 $a(DE-He213)978-981-96-1148-5 035 $a(OCoLC)1498722657 035 $a(EXLCZ)9937248672000041 100 $a20250118d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence Security and Privacy $eSecond International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings /$fedited by Fangguo Zhang, Weiwei Lin, Hongyang Yan 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (254 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15399 311 08$aPrint version: Zhang, Fangguo Artificial Intelligence Security and Privacy Singapore : Springer,c2025 9789819611478 327 $a -- BadHAR: Backdoor Attacks in Federated Human Activity Recognition Systems. -- Fully Automated Generation Mechanism of Rootfs for Specified Operating Systems under Linux. -- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels. -- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated Learning. -- Intelligent backpack based on ireless mobile technology. -- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on BERTopic: A Case Study of Hotel Management. -- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation. -- Enhancing Adversarial Robustness in Object Detection via Multi-Task Learning and Class-Aware Adversarial Training. -- FedHKD: A Hierarchical Federated Learning Approach Integrating lustering and Knowledge Distillation for Non-IID Data. -- Application of Ensemble Learning Based on High-Dimensional Features in Financial Big Data. -- Collaborative Framework for Dynamic Knowledge Updating and Transparent Reasoning with Large Language Models. -- Zero-Shot Dense Retrieval based on Query Expansion. -- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation. -- Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024. The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15399 606 $aArtificial intelligence 606 $aSecurity systems 606 $aData protection$xLaw and legislation 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aArtificial Intelligence 606 $aSecurity Science and Technology 606 $aPrivacy 606 $aCryptology 606 $aSecurity Services 615 0$aArtificial intelligence. 615 0$aSecurity systems. 615 0$aData protection$xLaw and legislation. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 14$aArtificial Intelligence. 615 24$aSecurity Science and Technology. 615 24$aPrivacy. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a006.3 700 $aZhang$b Fangguo$01754857 701 $aLin$b Weiwei$0997154 701 $aYan$b Hongyang$01783537 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910983324703321 996 $aArtificial Intelligence Security and Privacy$94311416 997 $aUNINA