2004 Computing Frontier Conference April 14-16, 2004, Ischia, Italy |
Autore | Vassiliadis Stamatis |
Pubbl/distr/stampa | New York NY, : ACM Press, 2004 |
Descrizione fisica | 1 online resource (522 p.;) |
Disciplina | 004 |
Collana | ACM Conferences |
Soggetto topico |
Computer science
Information technology Computer networks Engineering & Applied Sciences Computer Science |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | CF '04 |
Record Nr. | UNINA-9910375844003321 |
Vassiliadis Stamatis
![]() |
||
New York NY, : ACM Press, 2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Computational and Communication Paradigms : Proceedings of ICACCP 2023 |
Autore | Borah Samarjeet |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (536 pages) |
Disciplina | 004 |
Altri autori (Persone) |
GandhiTapan K
PiuriVincenzo |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9942-84-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Soft Computing and Machine Learning -- Performance Analysis of Clustering Using Modified Grey Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- Designing of Advanced Machine Learning-Based Predictive Model for Maternal Mortality -- 1 Introduction -- 2 Literature Review -- 3 Proposed Predictive Model -- 3.1 Overview of the Proposed System -- 3.2 Data Acquisition -- 3.3 Data Preprocessing -- 3.4 Proposed Model -- 3.5 Model Design -- 4 Result and Discussion -- 5 Conclusion -- References -- Multi-criteria-Based Page Ranking Using Metaheuristic Swarm Optimization -- 1 Introduction -- 1.1 Problem Statement -- 2 Related Work -- 2.1 Observations from the Literature -- 3 Proposed PSO-Based Approach -- 3.1 Particle Swarm Optimization (PSO) -- 4 Proposed Approach -- 4.1 Existing Page Ranking Algorithm Comparison -- 5 Result and Discussion -- 6 Conclusion -- References -- ps: [/EMC pdfmark [/objdef Equ /Subtype /Span /ActualText (k) /StPNE pdfmark [/StBMC pdfmarkto.ps: [/EMC pdfmark [/Artifact < -- < -- /Type /Pagination> -- > -- /BDC pdfmark kps: [/EMC pdfmark [/StBMC pdfmark ps: [/EMC pdfmark [/StPop pdfmark [/StBMC pdfmark-NN-SSc: An Effective Similarity Score for ps: [/EMC pdfmark [/objdef Equ /Subtype /Span /ActualText (k) /StPNE pdfmark [/StBMC pdfmarkto.ps: [/EMC pdfmark [/Artifact < -- < -- /Type /Pagination> -- > -- /BDC pdfmark kps: [/EMC pdfmark [/StBMC pdfmark ps: [/EMC pdfmark [/ -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Working Example -- 4 Experimental Results -- 4.1 Performance Analysis Measures -- 4.2 Result Analysis -- 4.3 Discussion -- 5 Conclusion and Future Work -- References -- Password Management System Using Blockchain -- 1 Introduction.
2 Definitions -- 2.1 Blockchain -- 2.2 Transactions -- 2.3 Ethereum -- 2.4 Ether -- 2.5 Ethereum Virtual Machine -- 2.6 Accounts -- 2.7 Storage -- 2.8 Memory -- 2.9 Stack -- 2.10 Message Calls -- 2.11 Smart Contracts -- 2.12 State Variables -- 2.13 Functions -- 3 Related Works -- 4 Problems with Traditional Password Storage Systems -- 5 Solution Strategy -- 5.1 User Operations -- 5.2 Non-functional Requirements -- 6 Implementation -- 6.1 Architecture -- 6.2 Flowcharts -- 6.3 Activity Diagram -- 6.4 Algorithms -- 7 Experimental Results -- 7.1 Software Specifications -- 7.2 The Private Blockchain Network -- 7.3 The Smart Contract -- 7.4 The User Interface -- 8 Conclusion -- 9 Limitations and Future Scope -- References -- Deep Reinforcement Learning Algorithms for D2D Communications: A Comparative Analysis -- 1 Introduction -- 2 Related Work -- 3 System Architecture and Formulation of Problems -- 3.1 Partially Observable Markov Decision Process -- 3.2 Centralized Training Decentralized Execution -- 4 Proposed Algorithm -- 4.1 Deep Q-Network (DQN) -- 4.2 Deep Deterministic Policy Gradient (DDPG) -- 4.3 Quantile Regression Deep Q-Network (QR-DQN) -- 4.4 Channel Model -- 5 Simulation Result and Discussion -- 6 Conclusions -- References -- AI-Enabled IDS for Identifying Malicious Traffics in Cloud Systems -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Framework -- 3.2 Dataset -- 3.3 Pre-processing -- 3.4 Feature Selection -- 3.5 Classification Techniques -- 3.6 Proposed Model -- 3.7 Proposed Algorithm -- 4 Experimental Results -- 4.1 Experimental Environment -- 4.2 Evaluation Metrics -- 4.3 Comparative Study -- 5 Conclusion and Future Work -- References -- NITSDN: Development of SDN Dataset for ML-Based Intrusion Detection System -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Collection. 3.2 Feature Extraction -- 3.3 Network Traffic Classification -- 4 Result and Discussion -- 4.1 Data Generation for Attack Packets -- 4.2 Performance of ML Classifiers for Multi-class Classification -- 5 Conclusion and Future Work -- References -- Association Rule Mining in Distributed Environment: A Survey -- 1 Introduction -- 2 Association Rule Mining (ARM) -- 2.1 Preliminaries -- 3 Association Rule Mining in Distributed Environment -- 4 Literature Survey -- 4.1 Apriori-Based Algorithms Over Distributed Environment -- 4.2 FP-Growth-Based Algorithms Over Distributed Environment -- 5 Discussion -- 6 Conclusion -- References -- Performance Analysis of the AdaGrad Family of Algorithms -- 1 Introduction -- 2 Related Work -- 3 Data Creation and Collection -- 4 Methodology -- 4.1 AdaGrad Family of Algorithms -- 5 Learning Schedule -- 6 Evaluation Metrics -- 7 Results and Discussion -- 8 Conclusion -- References -- Time-Related Natural Language Query Handling to Extract Autism Spectrum Disorder Information from Temporal Database -- 1 Introduction -- 2 Related Works -- 3 Architecture -- 3.1 Algorithm of Proposed System -- 3.2 Database of the Proposed System -- 4 Limitation and Future Work -- 5 Conclusion -- References -- Emotion-Based Music Recommendation -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Convolutional Neural Networks (CCN) -- 3.2 LSTM-Based Neural Networks -- 3.3 K-Nearest Neighbors Network (K-NN) -- 3.4 Multilayer Perceptron Network (MLP) -- 4 Results -- 5 Conclusion -- References -- A Comprehensive Study on Natural Language Processing, It's Techniques and Advancements in Nepali Language -- 1 Introduction -- 2 Approaches in Natural Language Processing -- 2.1 Rule-Based -- 2.2 Neural Network-Based Approach -- 2.3 Traditional Machine Learning -- 3 Grammars in Natural Language Processing -- 3.1 Context-Free Grammar. 3.2 Constituency Grammar -- 3.3 Dependency Grammar (DG) -- 4 Grammar in Nepali Language -- 5 Natural Language Pipeline -- 5.1 Sentence Segmentation -- 5.2 Word Tokenization -- 5.3 Stemming -- 5.4 Lemmatization -- 5.5 Identifying Stop Words -- 5.6 Dependency Parsing -- 5.7 POS Tagging -- 5.8 Named Entity Recognition -- 5.9 Chunking -- 6 Phases of Natural Language Processing -- 6.1 Lexical Analysis -- 6.2 Syntactic Analysis -- 6.3 Semantic Analysis -- 6.4 Discourse Integration -- 6.5 Pragmatic Analysis -- 7 Conclusions -- References -- Quality Evaluation of Enterprise Architecture Frameworks -- 1 Introduction -- 2 Related Work -- 3 Quality Assessment Framework -- 3.1 Proposed Set of Metrics -- 3.2 Framework-Level Quality Measurements -- 4 Theoretical Validation of the Proposed Set of Quality Assessment Metrics -- 5 Illustration of the Proposed Metrics and Quality Factors with a Case Study -- 6 Conclusion and Future Work -- References -- Natural Language Query Processing System to Extract Autism Spectrum Disorder Information from Database -- 1 Introduction -- 2 Related Works -- 3 Architecture -- 3.1 The Proposed System's Steps -- 4 Database -- 5 Limitation -- 6 Future Work -- 7 Conclusion -- References -- Spiking Neural Network in Computer Vision: Techniques, Tools and Trends -- 1 Introduction -- 2 SNN: State-of-the-Art Architectures -- 3 Neural Coding Strategies -- 3.1 Rate Coding -- 3.2 Latency Coding -- 3.3 Temporal Coding -- 4 Learning Methods -- 4.1 Unsupervised Learning -- 4.2 Supervised Learning -- 5 Applications and Comparison Among Different Methods -- 6 Conclusion -- References -- A Quantitative Study on the FaceNet System -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 One-Shot Learning -- 3.2 Multi-task Cascaded Convolution Neural Networks -- 3.3 Feature Vector Encoding -- 3.4 Triplet Loss Function -- 4 Results and Discussion. 5 Conclusion -- References -- Resampling Strategies for Mitigating Class Imbalance of ASD Dataset on the Performance of Machine Learning Classifiers -- 1 Introduction -- 2 Resampling Strategies -- 2.1 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Comparative Analysis of Minimax Algorithm with Alpha-Beta Pruning Optimization for Chess Engine -- 1 Introduction -- 2 Literature Review -- 2.1 Minimax Algorithm -- 2.2 Alpha-Beta Pruning Algorithm -- 2.3 Proposed Methodology -- 3 Performance Evaluation -- 4 Conclusion -- References -- Biomedical Informatics -- A Modified Microwave Based System Design for Early-Stage Breast Cancer Detection -- 1 Introduction -- 2 Dielectric Breast Structure -- 3 System Design -- 4 Image Reconstruction Algorithm -- 5 Results and Discussion -- 6 Conclusion -- References -- Research Review and Literature Perception Towards Medicinal Plants Classification Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Review on Medicinal Plants Classification -- 2.1 Related Works -- 2.2 Chronological Review -- 2.3 Medicinal Plant Dataset Analysis -- 3 Short Review on Deep Learning-Based Medicinal Plants Classification Approaches -- 3.1 Algorithmic Classification -- 3.2 Types of Medicinal Plants Used in Classification Models -- 3.3 Evaluating the Implementation Tools -- 3.4 Performance Metrics Utilized for Medicinal Plant Classification -- 4 Research Gaps and Challenges on Conventional Medicinal Plants Classification -- 5 Conclusion -- References -- Features Fusion-Based Gait Recognition with Covariate Conditions -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 4 Experimental and Results Analysis -- 5 Conclusion -- References -- Computational Modelling of Glucocerebrosidase Signalling Pathways in Parkinson's Disease -- 1 Introduction -- 2 Related Works -- 3 Methods -- 4 Results. 4.1 Cellular Model of GBA Pathway in Parkinson's Condition. |
Record Nr. | UNINA-9910746284903321 |
Borah Samarjeet
![]() |
||
Singapore : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Computing and Intelligent Technologies : Proceedings of ICACIT 2021 |
Autore | Bianchini Monica |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (652 pages) |
Altri autori (Persone) |
PiuriVincenzo
DasSanjoy ShawRabindra Nath |
Collana | Lecture Notes in Networks and Systems Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-2164-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Advanced Computing and Intelligent Technologies |
Record Nr. | UNINA-9910497102803321 |
Bianchini Monica
![]() |
||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Bioinformatics, Multimedia, and Electronics Circuits and Signals [[electronic resource] ] : Proceedings of GUCON 2019 / / edited by Lakhmi C. Jain, Maria Virvou, Vincenzo Piuri, Valentina E. Balas |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xix, 262 pages) : illustrations |
Disciplina | 004 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Electronic circuits
Signal processing Bioinformatics Multimedia systems Electronic Circuits and Systems Signal, Speech and Image Processing Computational and Systems Biology Multimedia Information Systems |
ISBN | 981-15-0339-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910366604503321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
AI and IoT for smart city applications / / edited by Vincenzo Piuri [and three others] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (xiii, 233 pages) |
Disciplina | 006.3 |
Collana | Studies in computational intelligence |
Soggetto topico |
Artificial intelligence
Internet of things Smart cities |
ISBN |
981-16-7498-1
981-16-7497-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart drone controller framework-toward an Internet of drones -- Building of efficient communication system in smart city using wireless sensor network through hybrid optimization technique -- Estimation of range for electric vehicle using fuzzy logic system -- Traffic light control using RFID and deep reinforcement learning -- Driver drowsiness alert system using real-time detection -- Traffic control system for smart city using image processing -- Visual perception for smart city defense administration and intelligent premonition framework based on DNN -- Application of AI/IoT for smart renewable energy management in smart cities -- Eye-gaze based hands free access control system for smart city public interfaces -- Reliability analysis in cyber-physical system using deep learning for smart cities industrial IoT network node -- Multi robot environment exploration using swarm -- AI and blockchain for healthcare data security in smart cities -- Towards the sustainable development of smart cities through cloud computing -- Anomalies detection on attached IoT device at cattle body in smart cities areas using deep learning. |
Record Nr. | UNINA-9910743378603321 |
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computing, Communication and Learning : Second International Conference, CoCoLe 2023, Warangal, India, August 29-31, 2023, Proceedings |
Autore | Panda Sanjaya Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (322 pages) |
Altri autori (Persone) |
RoutRashmi Ranjan
BisiManjubala SadamRavi Chandra LiKuan-Ching PiuriVincenzo |
Collana | Communications in Computer and Information Science Series |
ISBN | 3-031-56998-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910847091703321 |
Panda Sanjaya Kumar
![]() |
||
Cham : , : Springer International Publishing AG, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science and Intelligent Applications [[electronic resource] ] : Proceedings of ICDSIA 2020 / / edited by Ketan Kotecha, Vincenzo Piuri, Hetalkumar N. Shah, Rajan Patel |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (556 pages) |
Disciplina | 005.7 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Engineering—Data processing Data mining Computer security Computational Intelligence Artificial Intelligence Data Engineering Data Mining and Knowledge Discovery Systems and Data Security |
ISBN | 981-15-4474-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hate Speech Detection: A Bird’s Eye View -- Intrusion Detection System Using Semi-supervised Machine Learning -- A Survey on Machine Learning and Deep Learning based Approaches for Sarcasm Identification in Social Media -- A Machine Learning Algorithm to Predict Financial Investment -- Genetic Algorithm based Task Scheduling for Load Balancing in Cloud -- Experimental Analysis of Measuring Neighbourhood Change in the Presence of Wormhole in Mobile Wireless Sensor Networks -- Privy Cloud/Web Server -- Automating Container Deployments Using CI/CD -- Security and Performance Evaluations of QUIC Protocol -- Comparative Survey of Digital Image Steganography Spatial Domain Techniques -- Automatic Evaluation of Analog Circuit Designs. |
Record Nr. | UNINA-9910483850203321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IEEE Alessandro Volta Memorial Workshop on Low-Power Design : proceedings : March 4-5, 1999, Como, Italy |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 1999 |
Disciplina | 621.39/5 |
Soggetto topico |
Low voltage integrated circuits - Design and construction
Electrical & Computer Engineering Engineering & Applied Sciences Electrical Engineering |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996217527303316 |
[Place of publication not identified], : IEEE Computer Society, 1999 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri |
Autore | Meng Weizhi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (628 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
YanZheng
PiuriVincenzo |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer networks Computer systems Application software Computers Security Services Computer Communication Networks Computer System Implementation Computer and Information Systems Applications Computing Milieux Data and Information Security |
ISBN | 981-9970-32-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. |
Record Nr. | UNINA-9910760264603321 |
Meng Weizhi
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri |
Autore | Meng Weizhi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (628 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
YanZheng
PiuriVincenzo |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer networks Computer systems Application software Computers Security Services Computer Communication Networks Computer System Implementation Computer and Information Systems Applications Computing Milieux Data and Information Security |
ISBN | 981-9970-32-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. |
Record Nr. | UNISA-996565871203316 |
Meng Weizhi
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|