LEADER 04605nam 22005295 450 001 9910983360003321 005 20250101115231.0 010 $a9783031736995 010 $a3031736990 024 7 $a10.1007/978-3-031-73699-5 035 $a(CKB)37122967600041 035 $a(MiAaPQ)EBC31868108 035 $a(Au-PeEL)EBL31868108 035 $a(DE-He213)978-3-031-73699-5 035 $a(OCoLC)1482815466 035 $a(EXLCZ)9937122967600041 100 $a20250101d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in New Computing Environments $e6th International Conference, SPNCE 2023, Guangzhou, China, November 25?26, 2023, Proceedings /$fedited by Jun Cai, Zhili Zhou, Kongyang Chen 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (361 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v525 311 08$a9783031736988 311 08$a3031736982 327 $a -- IoT, Network Security and Privacy Challenges. -- HybridFL: Hybrid approach toward privacy-preserving Federated Learning. -- The Design of a Multi-application micro-operating system platform in the context of big data. -- Consortium Blockchain Storage Optimization Based on Fountain Codes. -- An Incentive Mechanism and An Offline Trajectory Publishing Algorithm Considering Sensing Area Coverage Maximization and Participant Privacy Level. -- Research on Face Recognition System Based on RLWE Homomorphic Encryption. -- Feedback Feed-forward Iterative Learning Control for Non-affine Nonlinear discrete-time Systems with Varying Trail Lengths. -- Open-Closed-Loop Iterative Learning Control Based on Differential Evolution Algorithm for Nonlinear System. -- Overview of Vehicle Edge Computing and Its Security. -- Multi-party Privacy Preserving Neural Networks. -- ConFlow: Contrast Network Flow Improving Class Imbalanced Learning in Network Intrusion Detection. -- Anomaly Detection of Unstable Log Data Based on Contrastive Learning. -- An integration-enhanced ZNN approach for chaotic combined synchronization with external disturbances. -- A lightweight anomaly detection method for industrial processes based on event correlation behavior. -- A Novel Polar Code-Based Key Encapsulation Mechanism with Non-Permutation Equivalent Public Key. -- Two-stage Multi-lingual Speech Emotion Recognition for Multi-lingual Emotional Speech Synthesis. -- EncoderMU: Machine Unlearning In Contrastive Learning. -- NoCrypto: A Web Mining Behavior Detection Method Based on RGB Images. -- Security and PrivacyffSteganography and Forensics. -- Image copy-move forgery detection in the social media based on a prior density clustering and the point density. -- Detection of Speech Spoofing Based on Dense Convolutional Network. -- Speech Emotion Recognition Based on Recurrent Neural Networks with Conformer for Emotional Speech Synthesis. -- Route Privacy-Preserving Authentication Scheme based on PUF in VANETs. -- Stable NICE Model-Based Image Generation for Generative Steganography. -- Computer-generated Image Forensics Based on Vision Transformer with Forensic Feature Pre-processing Module. -- VoIP steganalysis using shallow multiscale convolution and transformer. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023. The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v525 606 $aComputer networks 606 $aComputer Communication Networks 615 0$aComputer networks. 615 14$aComputer Communication Networks. 676 $a004.6 700 $aCai$b Jun$0709208 701 $aZhou$b Zhili$01786078 701 $aChen$b Kongyang$01786079 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983360003321 996 $aSecurity and Privacy in New Computing Environments$94317487 997 $aUNINA