top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Foreign Aid in China [[electronic resource] /] / by Hong Zhou, Jun Zhang, Min Zhang
Foreign Aid in China [[electronic resource] /] / by Hong Zhou, Jun Zhang, Min Zhang
Autore Zhou Hong
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (376 p.)
Disciplina 330
337
338.9
Soggetto topico Economic policy
International economics
Economic Policy
International Economics
ISBN 3-662-44273-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Foreign Assistance: Substance and Practice -- Soviet Aid to China -- Multilateral Foreign Aid to China After 1979 -- Bilateral Aid to China Since 1979 -- Aid in China and NGOs.
Record Nr. UNINA-9910298517203321
Zhou Hong  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fundamentals of 6G Communications and Networking [[electronic resource] /] / edited by Xingqin Lin, Jun Zhang, Yuanwei Liu, Joongheon Kim
Fundamentals of 6G Communications and Networking [[electronic resource] /] / edited by Xingqin Lin, Jun Zhang, Yuanwei Liu, Joongheon Kim
Autore Lin Xingqin
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (754 pages)
Disciplina 621.38456
Altri autori (Persone) ZhangJun
LiuYuanwei
KimJoongheon
Collana Signals and Communication Technology
Soggetto topico Telecommunication
Cooperating objects (Computer systems)
Computer networks
Communications Engineering, Networks
Cyber-Physical Systems
Computer Communication Networks
ISBN 3-031-37920-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Introduction to 6G -- Part I: 6G vision and driving forces -- IMT vision for 2030 and beyond -- Use cases, applications, and services -- Technology trends -- Network capabilities -- Digital inclusion -- Connected sustainable world -- Ubiquitous intelligent connected society -- Part II: Enabling technologies for 6G communications -- Waveforms -- Modulations -- Channel coding -- Multiple access schemes -- Ultra-massive MIMO -- Distributed MIMO -- Terahertz communication -- Joint communication and sensing -- Reconfigurable intelligent surface -- Full duplex -- Ultra-low latency communications -- Visible light communication -- Orbital angular momentum -- AI-native air interface -- Part III: Network evolution towards 6G -- Network disaggregation -- Edge computing -- AI-native network architecture -- Sematic communications & networking -- Deterministic network -- Green networking -- UAV networking -- Integrated terrestrial and non-terrestrial networks -- Convergence of 6G and Wi-Fi networks -- Network security and trustworthiness -- Conclusion.
Record Nr. UNINA-9910770253603321
Lin Xingqin  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Practical Fine Needle Aspiration and Small Tissue Biopsies / / by Fan Lin, Haiyan Liu, Jun Zhang
Handbook of Practical Fine Needle Aspiration and Small Tissue Biopsies / / by Fan Lin, Haiyan Liu, Jun Zhang
Autore Lin Fan
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 496 p. 1422 illus. in color.)
Disciplina 616.07
Soggetto topico Pathology
ISBN 3-319-57386-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction and Application of Fine Needle Aspiration Biopsy -- Salivary Glands and Other Head and Neck Structures -- Thyroid and Parathyroid Glands -- Lymph Nodes -- Breast -- Lung and Mediastinum -- Liver -- Pancreas and Biliary Tract -- Kidney and Adrenal Glands -- Soft Tissue.
Record Nr. UNINA-9910300317603321
Lin Fan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Integrated governance in rural China : case study of Nanjiang County / / Shaolai Zhou, Jun Zhang, Ying Sun
Integrated governance in rural China : case study of Nanjiang County / / Shaolai Zhou, Jun Zhang, Ying Sun
Autore Zhou Shaolai
Pubbl/distr/stampa Gateway East, Singapore : , : Springer : , : China Social Sciences Press, , [2022]
Descrizione fisica 1 online resource (69 pages)
Disciplina 352.0073
Soggetto topico County government - China
ISBN 981-19-3085-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910590052303321
Zhou Shaolai  
Gateway East, Singapore : , : Springer : , : China Social Sciences Press, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Low-overhead Communications in IoT Networks [[electronic resource] ] : Structured Signal Processing Approaches / / by Yuanming Shi, Jialin Dong, Jun Zhang
Low-overhead Communications in IoT Networks [[electronic resource] ] : Structured Signal Processing Approaches / / by Yuanming Shi, Jialin Dong, Jun Zhang
Autore Shi Yuanming
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (164 pages)
Disciplina 621.3822
Soggetto topico Engineering
Computer organization
Machine learning
Engineering, general
Computer Systems Organization and Communication Networks
Machine Learning
ISBN 981-15-3870-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Sparse Linear Model -- Chapter 3. Blind Demixing -- Chapter 4. Sparse Blind Demixing -- Chapter 5. Shuffled Linear Regression -- Chapter 6. Learning Augmented Methods -- Chapter 7. Conclusions and Discussions -- Chapter 8. Appendix. .
Record Nr. UNINA-9910392747503321
Shi Yuanming  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Machine Learning for Cyber Security [[electronic resource] ] : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 398 p. 201 illus., 90 illus. in color.)
Disciplina 006.31
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Artificial intelligence
Computers
Systems and Data Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Computing Milieux
ISBN 3-030-30619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.
Record Nr. UNISA-996466291303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Machine Learning for Cyber Security : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Machine Learning for Cyber Security : Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 398 p. 201 illus., 90 illus. in color.)
Disciplina 006.31
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Artificial intelligence
Computers
Systems and Data Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Computing Milieux
ISBN 3-030-30619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.
Record Nr. UNINA-9910349281503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
ISBN 3-030-65745-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff.
Record Nr. UNINA-9910447248603321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
ISBN 3-030-65745-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff.
Record Nr. UNISA-996418300403316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing
Autore Tan Honghua
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2011
Descrizione fisica 1 online resource (131 pages)
Collana ACM Other conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
ISBN 1-4503-0567-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti ICCC '11 2011 International Conference on Innovative Computing and Cloud Computing, Wuhan, China - August 13 - 14, 2011
Record Nr. UNINA-9910376124503321
Tan Honghua  
[Place of publication not identified], : ACM, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui