Foreign Aid in China [[electronic resource] /] / by Hong Zhou, Jun Zhang, Min Zhang |
Autore | Zhou Hong |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (376 p.) |
Disciplina |
330
337 338.9 |
Soggetto topico |
Economic policy
International economics Economic Policy International Economics |
ISBN | 3-662-44273-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Foreign Assistance: Substance and Practice -- Soviet Aid to China -- Multilateral Foreign Aid to China After 1979 -- Bilateral Aid to China Since 1979 -- Aid in China and NGOs. |
Record Nr. | UNINA-9910298517203321 |
Zhou Hong
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Fundamentals of 6G Communications and Networking [[electronic resource] /] / edited by Xingqin Lin, Jun Zhang, Yuanwei Liu, Joongheon Kim |
Autore | Lin Xingqin |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (754 pages) |
Disciplina | 621.38456 |
Altri autori (Persone) |
ZhangJun
LiuYuanwei KimJoongheon |
Collana | Signals and Communication Technology |
Soggetto topico |
Telecommunication
Cooperating objects (Computer systems) Computer networks Communications Engineering, Networks Cyber-Physical Systems Computer Communication Networks |
ISBN | 3-031-37920-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Introduction to 6G -- Part I: 6G vision and driving forces -- IMT vision for 2030 and beyond -- Use cases, applications, and services -- Technology trends -- Network capabilities -- Digital inclusion -- Connected sustainable world -- Ubiquitous intelligent connected society -- Part II: Enabling technologies for 6G communications -- Waveforms -- Modulations -- Channel coding -- Multiple access schemes -- Ultra-massive MIMO -- Distributed MIMO -- Terahertz communication -- Joint communication and sensing -- Reconfigurable intelligent surface -- Full duplex -- Ultra-low latency communications -- Visible light communication -- Orbital angular momentum -- AI-native air interface -- Part III: Network evolution towards 6G -- Network disaggregation -- Edge computing -- AI-native network architecture -- Sematic communications & networking -- Deterministic network -- Green networking -- UAV networking -- Integrated terrestrial and non-terrestrial networks -- Convergence of 6G and Wi-Fi networks -- Network security and trustworthiness -- Conclusion. |
Record Nr. | UNINA-9910770253603321 |
Lin Xingqin
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook of Practical Fine Needle Aspiration and Small Tissue Biopsies / / by Fan Lin, Haiyan Liu, Jun Zhang |
Autore | Lin Fan |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 496 p. 1422 illus. in color.) |
Disciplina | 616.07 |
Soggetto topico | Pathology |
ISBN | 3-319-57386-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction and Application of Fine Needle Aspiration Biopsy -- Salivary Glands and Other Head and Neck Structures -- Thyroid and Parathyroid Glands -- Lymph Nodes -- Breast -- Lung and Mediastinum -- Liver -- Pancreas and Biliary Tract -- Kidney and Adrenal Glands -- Soft Tissue. |
Record Nr. | UNINA-9910300317603321 |
Lin Fan
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Integrated governance in rural China : case study of Nanjiang County / / Shaolai Zhou, Jun Zhang, Ying Sun |
Autore | Zhou Shaolai |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer : , : China Social Sciences Press, , [2022] |
Descrizione fisica | 1 online resource (69 pages) |
Disciplina | 352.0073 |
Soggetto topico | County government - China |
ISBN | 981-19-3085-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910590052303321 |
Zhou Shaolai
![]() |
||
Gateway East, Singapore : , : Springer : , : China Social Sciences Press, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Low-overhead Communications in IoT Networks [[electronic resource] ] : Structured Signal Processing Approaches / / by Yuanming Shi, Jialin Dong, Jun Zhang |
Autore | Shi Yuanming |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (164 pages) |
Disciplina | 621.3822 |
Soggetto topico |
Engineering
Computer organization Machine learning Engineering, general Computer Systems Organization and Communication Networks Machine Learning |
ISBN | 981-15-3870-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Chapter 2. Sparse Linear Model -- Chapter 3. Blind Demixing -- Chapter 4. Sparse Blind Demixing -- Chapter 5. Shuffled Linear Regression -- Chapter 6. Learning Augmented Methods -- Chapter 7. Conclusions and Discussions -- Chapter 8. Appendix. . |
Record Nr. | UNINA-9910392747503321 |
Shi Yuanming
![]() |
||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 398 p. 201 illus., 90 illus. in color.) |
Disciplina | 006.31 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Artificial intelligence Computers Systems and Data Security Computer Systems Organization and Communication Networks Artificial Intelligence Computing Milieux |
ISBN | 3-030-30619-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness. |
Record Nr. | UNISA-996466291303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Machine Learning for Cyber Security : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 398 p. 201 illus., 90 illus. in color.) |
Disciplina | 006.31 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Artificial intelligence Computers Systems and Data Security Computer Systems Organization and Communication Networks Artificial Intelligence Computing Milieux |
ISBN | 3-030-30619-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness. |
Record Nr. | UNINA-9910349281503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer networks - Security measures |
ISBN | 3-030-65745-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff. |
Record Nr. | UNINA-9910447248603321 |
Cham, Switzerland : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer networks - Security measures |
ISBN | 3-030-65745-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff. |
Record Nr. | UNISA-996418300403316 |
Cham, Switzerland : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing |
Autore | Tan Honghua |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2011 |
Descrizione fisica | 1 online resource (131 pages) |
Collana | ACM Other conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
ISBN | 1-4503-0567-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ICCC '11 2011 International Conference on Innovative Computing and Cloud Computing, Wuhan, China - August 13 - 14, 2011 |
Record Nr. | UNINA-9910376124503321 |
Tan Honghua
![]() |
||
[Place of publication not identified], : ACM, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|