LEADER 01260nam 2200361 n 450 001 996392418503316 005 20221108104552.0 035 $a(CKB)1000000000668954 035 $a(EEBO)2240897728 035 $a(UnM)99845495 035 $a(EXLCZ)991000000000668954 100 $a19910930d1585 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aTwo fruitfull and godly sermons$b[electronic resource] $epreached at Dorchester in Dorsetshyre, the one touching the building of Gods temple, the other what the temple is 210 $aImprinted at London $cBy Iohn Charle-wood, dwelling in Barbican, at the signe of the halfe eagle and the key$d1585 215 $a[3]-62 p 300 $aInitials. 300 $aSignatures: A-D⁸ (first and last leaves blank). 300 $aImperfect: print show-through. 300 $aReproduction of original in: Folger Shakespeare Library. 330 $aeebo-0014 606 $aSermons, English$y17th century 615 0$aSermons, English 700 $aChub$b William$01008679 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996392418503316 996 $aTwo fruitfull and godly sermons$92347161 997 $aUNISA LEADER 01161nam 2200397 450 001 9910794401803321 005 20230814234742.0 010 $a92-0-145219-5 035 $a(CKB)4100000011794024 035 $a(MiAaPQ)EBC5398997 035 $a(EXLCZ)994100000011794024 100 $a20210405d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGeological classification of uranium deposits and description of selected examples /$fIAEA 210 1$aVienna, Austria :$cIAEA,$d[2018] 210 4$d2018 215 $a1 online resource (430 pages) $cillustrations 311 $a92-0-101618-2 606 $aOre deposits 606 $aPetrology 606 $aUranium ores$xGeology 615 0$aOre deposits. 615 0$aPetrology. 615 0$aUranium ores$xGeology. 676 $a553.4932 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910794401803321 996 $aGeological classification of uranium deposits and description of selected examples$93684956 997 $aUNINA LEADER 04189nam 22007215 450 001 996641271303316 005 20250211143731.0 010 $a9789819611485$b(electronic bk.) 010 $z9789819611478 024 7 $a10.1007/978-981-96-1148-5 035 $a(MiAaPQ)EBC31882468 035 $a(Au-PeEL)EBL31882468 035 $a(CKB)37248672000041 035 $a(DE-He213)978-981-96-1148-5 035 $a(OCoLC)1498722657 035 $a(EXLCZ)9937248672000041 100 $a20250118d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence Security and Privacy $eSecond International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings /$fedited by Fangguo Zhang, Weiwei Lin, Hongyang Yan 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (254 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15399 311 08$aPrint version: Zhang, Fangguo Artificial Intelligence Security and Privacy Singapore : Springer,c2025 9789819611478 327 $a -- BadHAR: Backdoor Attacks in Federated Human Activity Recognition Systems. -- Fully Automated Generation Mechanism of Rootfs for Specified Operating Systems under Linux. -- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels. -- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated Learning. -- Intelligent backpack based on ireless mobile technology. -- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on BERTopic: A Case Study of Hotel Management. -- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation. -- Enhancing Adversarial Robustness in Object Detection via Multi-Task Learning and Class-Aware Adversarial Training. -- FedHKD: A Hierarchical Federated Learning Approach Integrating lustering and Knowledge Distillation for Non-IID Data. -- Application of Ensemble Learning Based on High-Dimensional Features in Financial Big Data. -- Collaborative Framework for Dynamic Knowledge Updating and Transparent Reasoning with Large Language Models. -- Zero-Shot Dense Retrieval based on Query Expansion. -- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation. -- Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024. The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15399 606 $aArtificial intelligence 606 $aSecurity systems 606 $aData protection$xLaw and legislation 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aArtificial Intelligence 606 $aSecurity Science and Technology 606 $aPrivacy 606 $aCryptology 606 $aSecurity Services 615 0$aArtificial intelligence. 615 0$aSecurity systems. 615 0$aData protection$xLaw and legislation. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 14$aArtificial Intelligence. 615 24$aSecurity Science and Technology. 615 24$aPrivacy. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a006.3 700 $aZhang$b Fangguo$01754857 701 $aLin$b Weiwei$0997154 701 $aYan$b Hongyang$01783537 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996641271303316 996 $aArtificial Intelligence Security and Privacy$94311416 997 $aUNISA