Backdoor Attacks against Learning-Based Algorithms / / by Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen
| Backdoor Attacks against Learning-Based Algorithms / / by Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen |
| Autore | Li Shaofeng |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (161 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
ZhuHaojin
WuWen ShenXuemin (Sherman) |
| Collana | Wireless Networks |
| Soggetto topico |
Computer networks
Wireless communication systems Mobile communication systems Machine learning Computer Communication Networks Wireless and Mobile Communication Machine Learning |
| ISBN | 3-031-57389-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Literature Review of Backdoor Attacks -- Invisible Backdoor Attacks in Image Classification Based Network Services -- Hidden Backdoor Attacks in NLP Based Network Services -- Backdoor Attacks and Defense in FL -- Summary and Future Directions. |
| Record Nr. | UNINA-9910865259403321 |
Li Shaofeng
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security assessment in vehicular networks / / Suguo Du, Haojin Zhu
| Security assessment in vehicular networks / / Suguo Du, Haojin Zhu |
| Autore | Du Suguo |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York : , : Springer, , 2013 |
| Descrizione fisica | 1 online resource (xi, 49 pages) : illustrations (some color) |
| Disciplina | 58 |
| Collana | SpringerBriefs in Computer Science |
| Soggetto topico |
Vehicular ad hoc networks (Computer networks) - Security measures
Computer science Data protection Data encryption (Computer science) Telecommunication |
| ISBN | 1-4614-9357-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction to Vehicular Networks Security -- Security Assessment via Attack Tree Model -- Attack-Defense Tree Based Security Assessment -- A VANETs Attack-Defense Game -- Modelling of Multiple Phased Attack on VANET Security. |
| Record Nr. | UNINA-9910437587303321 |
Du Suguo
|
||
| New York : , : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security in Smart Home Networks / / by Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
| Security in Smart Home Networks / / by Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen |
| Autore | Meng Yan |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (177 pages) |
| Disciplina |
929.605
643.60285 |
| Collana | Wireless Networks |
| Soggetto topico |
Telecommunication
Computer networks Data protection Computational intelligence Communications Engineering, Networks Computer Communication Networks Data and Information Security Computational Intelligence |
| ISBN | 3-031-24185-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion. |
| Record Nr. | UNINA-9910645892603321 |
Meng Yan
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu
| Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XVII, 858 p. 345 illus.) |
| Disciplina | 621.3821 |
| Collana | Theoretical Computer Science and General Issues |
| Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
| ISBN | 3-319-21837-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based “Handprint” Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks. |
| Record Nr. | UNISA-996215647003316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Wireless Algorithms, Systems, and Applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu
| Wireless Algorithms, Systems, and Applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XVII, 858 p. 345 illus.) |
| Disciplina | 621.3821 |
| Collana | Theoretical Computer Science and General Issues |
| Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
| ISBN | 3-319-21837-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based “Handprint” Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks. |
| Record Nr. | UNINA-9910483971403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||