Data Augmentation, Labelling, and Imperfections : Third MICCAI Workshop, DALI 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 12, 2023, Proceedings / / edited by Yuan Xue, Chen Chen, Chao Chen, Lianrui Zuo, Yihao Liu |
Autore | Xue Yuan |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (178 pages) |
Disciplina | 006 |
Altri autori (Persone) |
ChenChen
ChenChao ZuoLianrui LiuYihao |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Image processing - Digital techniques
Computer vision Artificial intelligence Computers Computer Imaging, Vision, Pattern Recognition and Graphics Artificial Intelligence Computing Milieux |
ISBN | 3-031-58171-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- URL: Combating Label Noise for Lung Nodule Malignancy Grading -- 1 Introduction -- 2 Method -- 2.1 Problem Definition and Overview -- 2.2 SCL Stage -- 2.3 MU Stage -- 3 Experiments and Results -- 3.1 Dataset and Experimental Setup -- 3.2 Comparative Experiments -- 3.3 Ablation Analysis -- 4 Conclusion -- References -- Zero-Shot Learning of Individualized Task Contrast Prediction from Resting-State Functional Connectomes -- 1 Introduction -- 2 Methods -- 3 Experimental Setup -- 3.1 Data -- 3.2 OPIC's Training -- 3.3 Baselines -- 3.4 Metrics -- 4 Results -- 4.1 In-Domain Prediction Quality -- 4.2 Out-of-Domain Prediction Quality -- 4.3 New Task Contrast from a Seen Task Group -- 5 Conclusion -- References -- Microscopy Image Segmentation via Point and Shape Regularized Data Synthesis -- 1 Introduction -- 2 Methods -- 3 Experiments -- 4 Discussion -- References -- A Unified Approach to Learning with Label Noise and Unsupervised Confidence Approximation -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Noisy Labels and Confidence Score Approximation -- 3.2 Unsupervised Confidence Approximation Loss -- 3.3 Unsupervised Confidence Approximation Architecture -- 3.4 Confidence-Selective Prediction -- 3.5 Pixelwise UCA -- 4 Experimental Results -- 5 Conclusion -- References -- Transesophageal Echocardiography Generation Using Anatomical Models -- 1 Introduction -- 2 Methods -- 2.1 Pseudo-Image Generation -- 2.2 Image Synthesis -- 3 Results and Discussion -- 4 Conclusion -- References -- Data Augmentation Based on DiscrimDiff for Histopathology Image Classification -- 1 Introduction -- 2 Method -- 2.1 Synthesizing Histopathology Images Based on Diffusion Model -- 2.2 Post-discrimination Mechanism for Diffusion -- 3 Experiments -- 3.1 Datasets and Implementation -- 3.2 Result and Discussion.
3.3 Visualization of Class-Specific Image Features -- 4 Conclusion -- References -- Clinically Focussed Evaluation of Anomaly Detection and Localisation Methods Using Inpatient CT Head Data -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Anomaly Detection Models -- 5 Clinical Evaluation Methodology -- 6 Results -- 7 Conclusion -- References -- LesionMix: A Lesion-Level Data Augmentation Method for Medical Image Segmentation -- 1 Introduction -- 1.1 Related Works -- 1.2 Contributions -- 2 Method -- 2.1 LesionMix -- 2.2 Lesion Populating -- 2.3 Lesion Inpainting -- 2.4 Lesion Load Distribution -- 2.5 Properties of LesionMix -- 3 Experiments -- 3.1 Data -- 3.2 Implementation Details -- 3.3 Results -- 4 Conclusion -- References -- Knowledge Graph Embeddings for Multi-lingual Structured Representations of Radiology Reports -- 1 Introduction -- 2 Methodology -- 3 Experimental Setup -- 4 Results and Discussion -- 5 Conclusion -- References -- Modular, Label-Efficient Dataset Generation for Instrument Detection for Robotic Scrub Nurses -- 1 Introduction -- 2 Dataset -- 2.1 Data Acquisition -- 2.2 Real Multi-instrument Data for Validation and Testing -- 2.3 Real Single-Instrument Images for Advanced MBOI -- 3 Experiments -- 3.1 Model and Hyperparameters -- 3.2 Synthetic Training Data from MBOI -- 3.3 Advancing Copy-Paste in MBOI -- 3.4 Effciency: Performance vs. Invested Resources -- 4 Results -- 4.1 Naive Insertion vs. Gaussian Blur and Poisson Blending -- 4.2 Impact of the Number of SI Images and Training Set Size -- 4.3 Evaluation of with Other Detectors Under Optimal Conditions -- 5 Conclusion -- References -- Adaptive Semi-supervised Segmentation of Brain Vessels with Ambiguous Labels -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing -- 2.2 Problem Formulation -- 2.3 Supervised Learning -- 2.4 Semi-supervised Learning. 3 Experiments and Results -- 3.1 Datasets -- 3.2 Experimental Setup -- 3.3 Evaluation Metrics -- 3.4 Qualitative Results and Analysis -- 3.5 Quantitative Results and Analysis -- 4 Conclusion -- References -- Proportion Estimation by Masked Learning from Label Proportion -- 1 Introduction -- 2 PD-L1 Tumor Proportion Estimation -- 3 Experiments -- 4 Conclusion -- References -- Active Learning Strategies on a Real-World Thyroid Ultrasound Dataset -- 1 Background -- 1.1 Active Learning -- 1.2 Active Learning Applied to Thyroid Ultrasound -- 2 Materials and Methods -- 2.1 Image Datasets -- 2.2 Rigged Draw Strategy -- 2.3 Supervised and Unsupervised Active Learning Strategies -- 3 Results -- 3.1 Supervised Strategies -- 3.2 Semi-supervised Strategies -- 4 Discussion -- References -- A Realistic Collimated X-Ray Image Simulation Pipeline -- 1 Introduction -- 2 Methods -- 2.1 Randomized Collimator Simulation Pipeline -- 2.2 Experiments -- 3 Results -- 3.1 Framework Validation -- 3.2 Network Evaluation -- 4 Discussion -- References -- Masked Conditional Diffusion Models for Image Analysis with Application to Radiographic Diagnosis of Infant Abuse -- 1 Introduction -- 2 Methods -- 2.1 Diffusion Model -- 2.2 Image Generation via Conditional Diffusion Model -- 3 Experiments -- 4 Results and Discussion -- 5 Conclusions -- References -- Self-supervised Single-Image Deconvolution with Siamese Neural Networks -- 1 Introduction and Related Work -- 2 Methods -- 3 Experiments -- 3.1 2D Dataset -- 3.2 3D Dataset -- 4 Discussion -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910855369103321 |
Xue Yuan | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine Learning for Cyber Security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings |
Autore | Kim Dan Dongseong |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (186 pages) |
Altri autori (Persone) | ChenChao |
Collana | Lecture Notes in Computer Science Series |
ISBN | 981-9724-58-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Keystroke Transcription -- 4.1 Continuous Wavelet Transform -- 4.2 Keystroke Detection and Segmentation -- 4.3 Normalization and Feature Extraction -- 4.4 Keystroke Classification -- 5 Results -- 5.1 Segmentation -- 5.2 Feature Extraction -- 5.3 Classification -- 6 Discussion -- 7 Conclusions -- References -- Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 4 Results and Analysis -- 5 Recommendations -- 6 Conclusion -- References -- PassFile: Graphical Password Authentication Based on File Browsing Records -- 1 Introduction -- 2 Related Work -- 2.1 Graphical Password -- 2.2 Smart Unlock Mechanism -- 3 Our Proposed Scheme -- 4 User Study -- 4.1 Steps and Results -- 4.2 User Feedback -- 5 Discussion on Limitations and Enhancement -- 6 Conclusion -- References -- On the Role of Similarity in Detecting Masquerading Files -- 1 Introduction -- 2 A Taxonomy of Masquerading Files -- 3 Collecting Masquerading Files -- 3.1 Step 1: Building Clustering Model -- 3.2 Step 2: Processing Malware Bazaar -- 3.3 Masquerading Results -- 3.4 The No Signature Case -- 3.5 The Not Verified Case -- 3.6 The Contains a X509 Certificate Case -- 3.7 The Certificate Revoked Case -- 3.8 The Certificate Used for Signing Malware Case -- 3.9 The No Trusted Root Authority Case -- 4 Finding Masquerading Files in Clusters -- 5 Clusters Related to Supply Chain Attacks -- 6 Conclusion and Future Work -- References -- A Password-Based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Complexity Problems.
3.2 OPAQUE -- 4 System Model and Security Requirements -- 4.1 System Model -- 4.2 Security Requirements -- 5 The Proposed Scheme -- 5.1 Registration of Remote Medical Server -- 5.2 Broadcasting of Service Messages -- 5.3 Registration of User -- 5.4 Authentication and Key Agreement -- 6 Security Analyses -- 7 Performance Evaluation -- 7.1 Some Comparison -- 7.2 Computation Performance -- 7.3 Communication Performance -- 8 Conclusion -- References -- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network in Traffic -- 2.2 Reinforcement Learning in Traffic Signal Timing Optimization -- 3 Methods -- 3.1 Framework Overview -- 3.2 Constructing Traffic Light Directed Adjacency Graph -- 3.3 Calculating the Importance of Adjacent Nodes -- 3.4 Modeling Reinforcement Learning Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Datasets -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- A Client-Side Watermarking with Private-Class in Federated Learning -- 1 Introduction -- 2 Related Works -- 2.1 Deep Learning Watermark -- 2.2 Federated Learning Watermark -- 3 Application Scenario and Watermark Requirements -- 3.1 Application Scenario -- 3.2 Watermark Requirements in Federated Learning -- 4 Proposed Method -- 4.1 Watermark Dataset Generation -- 4.2 Watermark Embedding -- 4.3 Watermark Verification -- 5 Experimental Evaluation -- 5.1 Experiment Settings -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Research on Evasion and Detection of Malicious JavaScript Code -- 1 Introduction -- 2 Relative Work -- 2.1 Techniques for Detecting Malicious Code -- 2.2 Taint Analysis Techniques -- 3 Analysis of Features of Malicious JavaScript Code -- 4 Taint Propagation Methods -- 4.1 Forward Taint Propagation. 4.2 Tracking the Initialization Process of Suspicious Objects -- 4.3 Backward Taint Propagation -- 4.4 Propagation Policies -- 4.5 Discussion on Overtainting and Undertainting Issues -- 5 Theoretical Analysis of the Feasibility of Obfuscation Resistance -- 6 Feature Extraction and Vectorization -- 6.1 Feature Extraction -- 6.2 Vectorization -- 7 Experiments -- 7.1 Dataset and Detection Models -- 7.2 Analysis of Pollution in the Samples -- 7.3 Test Results and Analysis -- 7.4 Comparison with VirusTotal Results -- 8 Conclusion -- References -- Tackling Non-IID for Federated Learning with Components Alignment -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 IID Data Construction -- 2.3 Local Models Assimilation -- 3 FCA: Federated Components Alignment -- 3.1 System -- 3.2 Motivation -- 3.3 Method -- 4 Experimental Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Results -- 4.3 Parameter Configuration -- 5 Summary and Future Work -- References -- Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering -- 1 Introduction -- 2 Our Approach -- 2.1 Goals and Requirements -- 2.2 Design Architecture and Clustering Method -- 2.3 Implementation Details -- 3 Evaluation -- 3.1 Dataset and Pre-processing -- 3.2 Number of Features -- 3.3 Evaluation Results -- 4 Related Work and Discussion -- 4.1 State-of-the-Art -- 4.2 Discussion -- 5 Conclusion -- References -- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability -- 1 Introduction -- 2 Method -- 2.1 Patch the Firmware -- 2.2 Inject the Shellcode to Kernel -- 2.3 Bypass KASLR -- 3 Experiment -- 4 Related Work -- 4.1 Attack on Firmware -- 4.2 Bypass KASLR -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996594166403316 |
Kim Dan Dongseong | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Machine Learning for Cyber Security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings / / edited by Dan Dongseong Kim, Chao Chen |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (186 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer engineering Computer networks Computer networks - Security measures Data and Information Security Computer Engineering and Networks Mobile and Network Security |
ISBN | 981-9724-58-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform -- Strengthening Cyber Security Education Designing Robust Assessments for Chat GPT Generated Answers -- Pass File Graphical Password Authentication based on File Browsing Records -- On the Role of Similarity in Detecting Masquerading Files -- A Password-based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN -- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle Road Collaboration -- A client side watermarking with private class in Federated learning -- Research on Evasion and Detection of Malicious JavaScript Code -- Tackling Non IID for Federated Learning with Components Alignment -- Security on top of Security Detecting Malicious Firewall Policy Changes via K Means Clustering -- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability. |
Record Nr. | UNINA-9910851992103321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and system security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings / / Min Yang, Chao Chen, and Yang Liu |
Autore | Yang Min (Writer on network and system security) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (394 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
ISBN | 3-030-92708-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910520083503321 |
Yang Min (Writer on network and system security) | ||
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and system security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings / / Min Yang, Chao Chen, and Yang Liu |
Autore | Yang Min (Writer on network and system security) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (394 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
ISBN | 3-030-92708-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464381303316 |
Yang Min (Writer on network and system security) | ||
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer networks - Security measures |
ISBN | 3-030-65745-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff. |
Record Nr. | UNINA-9910447248603321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer networks - Security measures |
ISBN | 3-030-65745-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff. |
Record Nr. | UNISA-996418300403316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Science of Cyber Security [[electronic resource] ] : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng |
Autore | Yung Moti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (526 pages) |
Disciplina | 025.04 |
Altri autori (Persone) |
ChenChao
MengWeizhi |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Information storage and retrieval systems
Database management Data mining Machine learning Application software Information Storage and Retrieval Database Management Data Mining and Knowledge Discovery Machine Learning Computer and Information Systems Applications |
ISBN | 3-031-45933-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional. |
Record Nr. | UNISA-996565868203316 |
Yung Moti | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Science of Cyber Security : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng |
Autore | Yung Moti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (526 pages) |
Disciplina | 025.04 |
Altri autori (Persone) |
ChenChao
MengWeizhi |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Information storage and retrieval systems
Database management Data mining Machine learning Application software Information Storage and Retrieval Database Management Data Mining and Knowledge Discovery Machine Learning Computer and Information Systems Applications |
ISBN | 3-031-45933-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional. |
Record Nr. | UNINA-9910765480703321 |
Yung Moti | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wide Awake Hand Surgery and Therapy Tips / / by: Lalonde, Donald H. |
Autore | Adams Julie E |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | NEW YORK : , : Thieme Medical Publishers, Incorporated, , 2021 |
Descrizione fisica | 1 online resource (476 pages) |
Disciplina | 617.5/75059 |
Soggetto topico |
Anesthesia, Local - methods
Hand - surgery |
ISBN |
1-68420-231-0
1-68420-332-5 1-63853-503-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910795105803321 |
Adams Julie E | ||
NEW YORK : , : Thieme Medical Publishers, Incorporated, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|