LEADER 02567nam 2200481 450 001 996547959503316 005 20230524172916.0 010 $a981-19-9968-6 024 7 $a10.1007/978-981-19-9968-0 035 $a(MiAaPQ)EBC7207121 035 $a(Au-PeEL)EBL7207121 035 $a(CKB)26186216500041 035 $a(DE-He213)978-981-19-9968-0 035 $a(PPN)268205345 035 $a(EXLCZ)9926186216500041 100 $a20230524d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSignal and information processing, networking and computers $eproceedings of the 10th International Conference on Signal and Information Processing, Networking and Computers (ICSINC) /$fedited by Yue Wang, [and three others] 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer,$d[2023] 210 4$dİ2023 215 $a1 online resource (1257 pages) 225 1 $aLecture Notes in Electrical Engineering,$x1876-1119 ;$v996 300 $aIncludes index. 311 08$aPrint version: Wang, Yue Signal and Information Processing, Networking and Computers Singapore : Springer,c2023 9789811999673 327 $aA New Multi-Instance Learning Algorithm Integrated with TF-IDF for Entity Relation Extraction in Electronic Medical Records -- A Deep Learning Algorithm Using Feature Engineering to Adjust Attention Mechanisms and Neural Network for Cloud Security Detection -- The design and implementation of a ranging system based on the DSSS -- Application of Grey Approximation Ideal Solution Ranking Methods in optimal selection of satellite initial orbits. 330 $aThis book collects selected papers from the 10th Conference on Signal and Information Processing, Networking and Computers held in Xi?Ning, China held in July, 2022. The book focuses on the current works of information theory, communication system, computer science, aerospace technologies and big data and other related technologies. People from both academia and industry of this field can contribute and find their interests from the book. 410 0$aLecture Notes in Electrical Engineering,$x1876-1119 ;$v996 606 $aInformation networks 615 0$aInformation networks. 676 $a354.81150006 702 $aWang$b Yue 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996547959503316 996 $aSignal and Information Processing, Networking and Computers$92937875 997 $aUNISA LEADER 05082nam 22007575 450 001 996542666903316 005 20230706120727.0 010 $a3-031-37586-6 024 7 $a10.1007/978-3-031-37586-6 035 $a(CKB)27559769000041 035 $a(MiAaPQ)EBC30627433 035 $a(Au-PeEL)EBL30627433 035 $a(DE-He213)978-3-031-37586-6 035 $a(PPN)272249955 035 $a(EXLCZ)9927559769000041 100 $a20230706d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData and Applications Security and Privacy XXXVII$b[electronic resource] $e37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19?21, 2023, Proceedings /$fedited by Vijayalakshmi Atluri, Anna Lisa Ferrara 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (415 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13942 311 $a9783031375859 327 $aPrivacy 1 -- (Local) Differential Privacy has NO Disparate Impact on Fairness -- Building Quadtrees for Spatial Data under Local Differential Privacy -- Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy -- Secure Data Sharing -- New Results on Distributed Secret Sharing Protocols -- Probabilistic Fingerprinting Scheme for Correlated Data -- Optimized stream-cipher-based transciphering by means of functional-bootstrapping -- Applications 1 -- Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends -- Impact of using a privacy model on smart buildings data for CO2 prediction -- Digital Twins for IoT Security Management -- Privacy 2 -- Distribution Invariant Local Differential Privacy For Federated Learning -- On the utility gain of iterative bayesian update for locally differentially private protocols -- Differentially Private Streaming Data Release under Temporal Correlations via Post-processing -- Access Control and Vulnerability Assessment -- Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments -- Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach -- SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity -- Machine Learning -- Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks -- CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery -- An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning -- Mobile Applications -- Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications -- Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin -- A Dynamic Approach to Defuse Logic Bombs in Android Applications -- Applications 2 -- AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit -- Essential Information from Vulnerability Descriptions for CVSS Evaluation -- Hybrid Consensus in Blockchain Protocols for correctness and Progress. 330 $aThis volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19?21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13942 606 $aData protection 606 $aComputers 606 $aArtificial intelligence 606 $aData structures (Computer science) 606 $aInformation theory 606 $aDatabase management 606 $aApplication software 606 $aData and Information Security 606 $aComputing Milieux 606 $aArtificial Intelligence 606 $aData Structures and Information Theory 606 $aDatabase Management System 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputers. 615 0$aArtificial intelligence. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aDatabase management. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aArtificial Intelligence. 615 24$aData Structures and Information Theory. 615 24$aDatabase Management System. 615 24$aComputer and Information Systems Applications. 676 $a005.8 700 $aAtluri$b Vijayalakshmi$01372665 701 $aFerrara$b Anna Lisa$01372666 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996542666903316 996 $aData and Applications Security and Privacy XXXVII$93403551 997 $aUNISA