top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Augmentation, Labelling, and Imperfections : Third MICCAI Workshop, DALI 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 12, 2023, Proceedings / / edited by Yuan Xue, Chen Chen, Chao Chen, Lianrui Zuo, Yihao Liu
Data Augmentation, Labelling, and Imperfections : Third MICCAI Workshop, DALI 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 12, 2023, Proceedings / / edited by Yuan Xue, Chen Chen, Chao Chen, Lianrui Zuo, Yihao Liu
Autore Xue Yuan
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (178 pages)
Disciplina 006
Altri autori (Persone) ChenChen
ChenChao
ZuoLianrui
LiuYihao
Collana Lecture Notes in Computer Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computers
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computing Milieux
ISBN 3-031-58171-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- URL: Combating Label Noise for Lung Nodule Malignancy Grading -- 1 Introduction -- 2 Method -- 2.1 Problem Definition and Overview -- 2.2 SCL Stage -- 2.3 MU Stage -- 3 Experiments and Results -- 3.1 Dataset and Experimental Setup -- 3.2 Comparative Experiments -- 3.3 Ablation Analysis -- 4 Conclusion -- References -- Zero-Shot Learning of Individualized Task Contrast Prediction from Resting-State Functional Connectomes -- 1 Introduction -- 2 Methods -- 3 Experimental Setup -- 3.1 Data -- 3.2 OPIC's Training -- 3.3 Baselines -- 3.4 Metrics -- 4 Results -- 4.1 In-Domain Prediction Quality -- 4.2 Out-of-Domain Prediction Quality -- 4.3 New Task Contrast from a Seen Task Group -- 5 Conclusion -- References -- Microscopy Image Segmentation via Point and Shape Regularized Data Synthesis -- 1 Introduction -- 2 Methods -- 3 Experiments -- 4 Discussion -- References -- A Unified Approach to Learning with Label Noise and Unsupervised Confidence Approximation -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Noisy Labels and Confidence Score Approximation -- 3.2 Unsupervised Confidence Approximation Loss -- 3.3 Unsupervised Confidence Approximation Architecture -- 3.4 Confidence-Selective Prediction -- 3.5 Pixelwise UCA -- 4 Experimental Results -- 5 Conclusion -- References -- Transesophageal Echocardiography Generation Using Anatomical Models -- 1 Introduction -- 2 Methods -- 2.1 Pseudo-Image Generation -- 2.2 Image Synthesis -- 3 Results and Discussion -- 4 Conclusion -- References -- Data Augmentation Based on DiscrimDiff for Histopathology Image Classification -- 1 Introduction -- 2 Method -- 2.1 Synthesizing Histopathology Images Based on Diffusion Model -- 2.2 Post-discrimination Mechanism for Diffusion -- 3 Experiments -- 3.1 Datasets and Implementation -- 3.2 Result and Discussion.
3.3 Visualization of Class-Specific Image Features -- 4 Conclusion -- References -- Clinically Focussed Evaluation of Anomaly Detection and Localisation Methods Using Inpatient CT Head Data -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Anomaly Detection Models -- 5 Clinical Evaluation Methodology -- 6 Results -- 7 Conclusion -- References -- LesionMix: A Lesion-Level Data Augmentation Method for Medical Image Segmentation -- 1 Introduction -- 1.1 Related Works -- 1.2 Contributions -- 2 Method -- 2.1 LesionMix -- 2.2 Lesion Populating -- 2.3 Lesion Inpainting -- 2.4 Lesion Load Distribution -- 2.5 Properties of LesionMix -- 3 Experiments -- 3.1 Data -- 3.2 Implementation Details -- 3.3 Results -- 4 Conclusion -- References -- Knowledge Graph Embeddings for Multi-lingual Structured Representations of Radiology Reports -- 1 Introduction -- 2 Methodology -- 3 Experimental Setup -- 4 Results and Discussion -- 5 Conclusion -- References -- Modular, Label-Efficient Dataset Generation for Instrument Detection for Robotic Scrub Nurses -- 1 Introduction -- 2 Dataset -- 2.1 Data Acquisition -- 2.2 Real Multi-instrument Data for Validation and Testing -- 2.3 Real Single-Instrument Images for Advanced MBOI -- 3 Experiments -- 3.1 Model and Hyperparameters -- 3.2 Synthetic Training Data from MBOI -- 3.3 Advancing Copy-Paste in MBOI -- 3.4 Effciency: Performance vs. Invested Resources -- 4 Results -- 4.1 Naive Insertion vs. Gaussian Blur and Poisson Blending -- 4.2 Impact of the Number of SI Images and Training Set Size -- 4.3 Evaluation of with Other Detectors Under Optimal Conditions -- 5 Conclusion -- References -- Adaptive Semi-supervised Segmentation of Brain Vessels with Ambiguous Labels -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing -- 2.2 Problem Formulation -- 2.3 Supervised Learning -- 2.4 Semi-supervised Learning.
3 Experiments and Results -- 3.1 Datasets -- 3.2 Experimental Setup -- 3.3 Evaluation Metrics -- 3.4 Qualitative Results and Analysis -- 3.5 Quantitative Results and Analysis -- 4 Conclusion -- References -- Proportion Estimation by Masked Learning from Label Proportion -- 1 Introduction -- 2 PD-L1 Tumor Proportion Estimation -- 3 Experiments -- 4 Conclusion -- References -- Active Learning Strategies on a Real-World Thyroid Ultrasound Dataset -- 1 Background -- 1.1 Active Learning -- 1.2 Active Learning Applied to Thyroid Ultrasound -- 2 Materials and Methods -- 2.1 Image Datasets -- 2.2 Rigged Draw Strategy -- 2.3 Supervised and Unsupervised Active Learning Strategies -- 3 Results -- 3.1 Supervised Strategies -- 3.2 Semi-supervised Strategies -- 4 Discussion -- References -- A Realistic Collimated X-Ray Image Simulation Pipeline -- 1 Introduction -- 2 Methods -- 2.1 Randomized Collimator Simulation Pipeline -- 2.2 Experiments -- 3 Results -- 3.1 Framework Validation -- 3.2 Network Evaluation -- 4 Discussion -- References -- Masked Conditional Diffusion Models for Image Analysis with Application to Radiographic Diagnosis of Infant Abuse -- 1 Introduction -- 2 Methods -- 2.1 Diffusion Model -- 2.2 Image Generation via Conditional Diffusion Model -- 3 Experiments -- 4 Results and Discussion -- 5 Conclusions -- References -- Self-supervised Single-Image Deconvolution with Siamese Neural Networks -- 1 Introduction and Related Work -- 2 Methods -- 3 Experiments -- 3.1 2D Dataset -- 3.2 3D Dataset -- 4 Discussion -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910855369103321
Xue Yuan  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning for Cyber Security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings
Machine Learning for Cyber Security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings
Autore Kim Dan Dongseong
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (186 pages)
Altri autori (Persone) ChenChao
Collana Lecture Notes in Computer Science Series
ISBN 981-9724-58-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Keystroke Transcription -- 4.1 Continuous Wavelet Transform -- 4.2 Keystroke Detection and Segmentation -- 4.3 Normalization and Feature Extraction -- 4.4 Keystroke Classification -- 5 Results -- 5.1 Segmentation -- 5.2 Feature Extraction -- 5.3 Classification -- 6 Discussion -- 7 Conclusions -- References -- Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 4 Results and Analysis -- 5 Recommendations -- 6 Conclusion -- References -- PassFile: Graphical Password Authentication Based on File Browsing Records -- 1 Introduction -- 2 Related Work -- 2.1 Graphical Password -- 2.2 Smart Unlock Mechanism -- 3 Our Proposed Scheme -- 4 User Study -- 4.1 Steps and Results -- 4.2 User Feedback -- 5 Discussion on Limitations and Enhancement -- 6 Conclusion -- References -- On the Role of Similarity in Detecting Masquerading Files -- 1 Introduction -- 2 A Taxonomy of Masquerading Files -- 3 Collecting Masquerading Files -- 3.1 Step 1: Building Clustering Model -- 3.2 Step 2: Processing Malware Bazaar -- 3.3 Masquerading Results -- 3.4 The No Signature Case -- 3.5 The Not Verified Case -- 3.6 The Contains a X509 Certificate Case -- 3.7 The Certificate Revoked Case -- 3.8 The Certificate Used for Signing Malware Case -- 3.9 The No Trusted Root Authority Case -- 4 Finding Masquerading Files in Clusters -- 5 Clusters Related to Supply Chain Attacks -- 6 Conclusion and Future Work -- References -- A Password-Based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Complexity Problems.
3.2 OPAQUE -- 4 System Model and Security Requirements -- 4.1 System Model -- 4.2 Security Requirements -- 5 The Proposed Scheme -- 5.1 Registration of Remote Medical Server -- 5.2 Broadcasting of Service Messages -- 5.3 Registration of User -- 5.4 Authentication and Key Agreement -- 6 Security Analyses -- 7 Performance Evaluation -- 7.1 Some Comparison -- 7.2 Computation Performance -- 7.3 Communication Performance -- 8 Conclusion -- References -- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network in Traffic -- 2.2 Reinforcement Learning in Traffic Signal Timing Optimization -- 3 Methods -- 3.1 Framework Overview -- 3.2 Constructing Traffic Light Directed Adjacency Graph -- 3.3 Calculating the Importance of Adjacent Nodes -- 3.4 Modeling Reinforcement Learning Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Datasets -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- A Client-Side Watermarking with Private-Class in Federated Learning -- 1 Introduction -- 2 Related Works -- 2.1 Deep Learning Watermark -- 2.2 Federated Learning Watermark -- 3 Application Scenario and Watermark Requirements -- 3.1 Application Scenario -- 3.2 Watermark Requirements in Federated Learning -- 4 Proposed Method -- 4.1 Watermark Dataset Generation -- 4.2 Watermark Embedding -- 4.3 Watermark Verification -- 5 Experimental Evaluation -- 5.1 Experiment Settings -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Research on Evasion and Detection of Malicious JavaScript Code -- 1 Introduction -- 2 Relative Work -- 2.1 Techniques for Detecting Malicious Code -- 2.2 Taint Analysis Techniques -- 3 Analysis of Features of Malicious JavaScript Code -- 4 Taint Propagation Methods -- 4.1 Forward Taint Propagation.
4.2 Tracking the Initialization Process of Suspicious Objects -- 4.3 Backward Taint Propagation -- 4.4 Propagation Policies -- 4.5 Discussion on Overtainting and Undertainting Issues -- 5 Theoretical Analysis of the Feasibility of Obfuscation Resistance -- 6 Feature Extraction and Vectorization -- 6.1 Feature Extraction -- 6.2 Vectorization -- 7 Experiments -- 7.1 Dataset and Detection Models -- 7.2 Analysis of Pollution in the Samples -- 7.3 Test Results and Analysis -- 7.4 Comparison with VirusTotal Results -- 8 Conclusion -- References -- Tackling Non-IID for Federated Learning with Components Alignment -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 IID Data Construction -- 2.3 Local Models Assimilation -- 3 FCA: Federated Components Alignment -- 3.1 System -- 3.2 Motivation -- 3.3 Method -- 4 Experimental Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Results -- 4.3 Parameter Configuration -- 5 Summary and Future Work -- References -- Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering -- 1 Introduction -- 2 Our Approach -- 2.1 Goals and Requirements -- 2.2 Design Architecture and Clustering Method -- 2.3 Implementation Details -- 3 Evaluation -- 3.1 Dataset and Pre-processing -- 3.2 Number of Features -- 3.3 Evaluation Results -- 4 Related Work and Discussion -- 4.1 State-of-the-Art -- 4.2 Discussion -- 5 Conclusion -- References -- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability -- 1 Introduction -- 2 Method -- 2.1 Patch the Firmware -- 2.2 Inject the Shellcode to Kernel -- 2.3 Bypass KASLR -- 3 Experiment -- 4 Related Work -- 4.1 Attack on Firmware -- 4.2 Bypass KASLR -- 5 Conclusion -- References -- Author Index.
Record Nr. UNISA-996594166403316
Kim Dan Dongseong  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Machine Learning for Cyber Security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings / / edited by Dan Dongseong Kim, Chao Chen
Machine Learning for Cyber Security : 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings / / edited by Dan Dongseong Kim, Chao Chen
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (186 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Computer networks - Security measures
Data and Information Security
Computer Engineering and Networks
Mobile and Network Security
ISBN 981-9724-58-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform -- Strengthening Cyber Security Education Designing Robust Assessments for Chat GPT Generated Answers -- Pass File Graphical Password Authentication based on File Browsing Records -- On the Role of Similarity in Detecting Masquerading Files -- A Password-based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN -- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle Road Collaboration -- A client side watermarking with private class in Federated learning -- Research on Evasion and Detection of Malicious JavaScript Code -- Tackling Non IID for Federated Learning with Components Alignment -- Security on top of Security Detecting Malicious Firewall Policy Changes via K Means Clustering -- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability.
Record Nr. UNINA-9910851992103321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and system security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings / / Min Yang, Chao Chen, and Yang Liu
Network and system security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings / / Min Yang, Chao Chen, and Yang Liu
Autore Yang Min (Writer on network and system security)
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (394 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Internet - Security measures
ISBN 3-030-92708-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910520083503321
Yang Min (Writer on network and system security)  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and system security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings / / Min Yang, Chao Chen, and Yang Liu
Network and system security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings / / Min Yang, Chao Chen, and Yang Liu
Autore Yang Min (Writer on network and system security)
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (394 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Internet - Security measures
ISBN 3-030-92708-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464381303316
Yang Min (Writer on network and system security)  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
ISBN 3-030-65745-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff.
Record Nr. UNINA-9910447248603321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Network and system security : 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, proceedings / / Miroslaw Kutylowski, Jun Zhang, Chao Chen (Eds.)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
ISBN 3-030-65745-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties -- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff.
Record Nr. UNISA-996418300403316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Science of Cyber Security [[electronic resource] ] : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng
Science of Cyber Security [[electronic resource] ] : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng
Autore Yung Moti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (526 pages)
Disciplina 025.04
Altri autori (Persone) ChenChao
MengWeizhi
Collana Lecture Notes in Computer Science
Soggetto topico Information storage and retrieval systems
Database management
Data mining
Machine learning
Application software
Information Storage and Retrieval
Database Management
Data Mining and Knowledge Discovery
Machine Learning
Computer and Information Systems Applications
ISBN 3-031-45933-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional.
Record Nr. UNISA-996565868203316
Yung Moti  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Science of Cyber Security : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng
Science of Cyber Security : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng
Autore Yung Moti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (526 pages)
Disciplina 025.04
Altri autori (Persone) ChenChao
MengWeizhi
Collana Lecture Notes in Computer Science
Soggetto topico Information storage and retrieval systems
Database management
Data mining
Machine learning
Application software
Information Storage and Retrieval
Database Management
Data Mining and Knowledge Discovery
Machine Learning
Computer and Information Systems Applications
ISBN 3-031-45933-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional.
Record Nr. UNINA-9910765480703321
Yung Moti  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wide Awake Hand Surgery and Therapy Tips / / by: Lalonde, Donald H.
Wide Awake Hand Surgery and Therapy Tips / / by: Lalonde, Donald H.
Autore Adams Julie E
Edizione [2nd ed.]
Pubbl/distr/stampa NEW YORK : , : Thieme Medical Publishers, Incorporated, , 2021
Descrizione fisica 1 online resource (476 pages)
Disciplina 617.5/75059
Soggetto topico Anesthesia, Local - methods
Hand - surgery
ISBN 1-68420-231-0
1-68420-332-5
1-63853-503-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910795105803321
Adams Julie E  
NEW YORK : , : Thieme Medical Publishers, Incorporated, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui