Balancing privacy and free speech : unwanted attention in the age of social media / / Mark Tunick
| Balancing privacy and free speech : unwanted attention in the age of social media / / Mark Tunick |
| Autore | Tunick Mark |
| Edizione | [1 ed.] |
| Pubbl/distr/stampa | Taylor & Francis, 2015 |
| Descrizione fisica | 1 online resource (xiv, 222 pages) |
| Disciplina |
323.44/8
323.448 |
| Collana | Routledge Research in Information Technology and E-Commerce Law |
| Soggetto topico |
Social media - Law and legislation
Privacy, Right of Freedom of expression |
| ISBN |
9781317650362
1317650360 9781315763132 1315763133 9781317650379 1317650379 |
| Classificazione | LAW036000LAW096000LAW116000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Table of cases -- Acknowledgments -- 1. Introduction -- Unwanted attention -- The democratization of the media -- Permissible and impermissible speech -- Goals: Building a framework for addressing conflicts between privacy and free speech ; Formulating principles of privacy ethics ; Grounding privacy ; Reevaluating case law ; Distinguishing ethical and legal judgments -- The book's layout -- 2. The value of privacy -- Defining privacy -- Why privacy is valuable: Reputation ; Avoiding unjust punishment, and the "right to be forgotten" ; Property ; A lack of privacy is objectively harmful ; Intimacy, relational harms, and the need to compartmentalize ; No harm no foul? ; Trust ; Dignity and respect for persons ; Privacy, toleration, and community -- Summary -- 3. Legitimate privacy interests -- Terminology: legitimate privacy interests and reasonable expectations of privacy -- The plain view principle, modified -- Which means of observation are legitimate? -- the careful and carefree societies -- Qualifying the plain view principle: One may reasonably expect privacy when one's dignity is implicated ; One can have a legitimate privacy interest that information not be spread to circles wider than one willingly exposed oneself to ; Controlling the intended audience of one's message ; Clarifying what counts as "readily accessible through legitimate means" ; Consent -- Conclusion: privacy in public places -- 4. The value of free speech -- Reasons free speech is valuable -- Should interests in free speech be put on a balancing scale?: The E.U. vs the U.S. -- The slippery slope objection to protecting only some speech -- The speech that merits legal protection -- Do legal protections of free speech apply only to professional journalists? -- Deciding what is newsworthy: Substitutability (Finger and Kim Phuc) ; Non-newsworthy details of a newsworthy event (Y.G and L.G.) ; Newsworthy for a select group, non-newsworthy for the general public (Parnigoni) -- Conclusion -- 5. Balancing privacy and free speech: Utilitarianism, its limits, and tolerating the sensitive -- Introduction -- The framework: Interests and rights ; Balancing privacy against free speech (as opposed to public safety) ; The utilitarian approach ; Limits of a utilitarian approach -- Feasibility problems -- The respect and dignity problem -- Toleration and respect for persons -- Weighing reasons and considerations without making a utilitarian calculation -- 6. Cases -- Publicizing private facts: Private facts in private places (Rear Window, Lake v. Wal-Mart) ; Private facts that are newsworthy (Alvarado, Kaysen) ; Private facts in public places (Upskirt videos, Dennison, Turnbull) -- Cases at the border (Riley, Vazquez, and Wood) -- Publicizing public facts: Public facts that are not newsworthy (the baseball fan) ; Publicizing newsworthy public facts (Public meetings and lectures, police conduct, arrests) -- 7. Remedies -- Google Glass with face recognition -- Remedies: New social norms ; Legal remedies and their limits -- Other alternatives -- Technology and architecture -- Market solutions and their limits -- Conclusion. |
| Record Nr. | UNINA-9910545199403321 |
Tunick Mark
|
||
| Taylor & Francis, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Big data : come stanno cambiando il nostro mondo / Marco Delmastro, Antonio Nicita
| Big data : come stanno cambiando il nostro mondo / Marco Delmastro, Antonio Nicita |
| Autore | Delmastro, Marco |
| Pubbl/distr/stampa | Bologna, : Il Mulino, 2019 |
| Descrizione fisica | 147 p. : ill. ; 22 cm |
| Disciplina |
323.448
005.74 |
| Altri autori (Persone) | Nicita, Antonio |
| Collana | Farsi un'idea |
| Soggetto non controllato |
Archivi di dati - Aspetti economici ed etici
Vita privata |
| ISBN | 978-88-15-28329-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | ita |
| Record Nr. | UNINA-9910341456003321 |
Delmastro, Marco
|
||
| Bologna, : Il Mulino, 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Big data : 8th CCF conference, big data 2020, Chongqing, China, October 22-24, 2020, revised selected papers / / Edited by Hong Mei [and eight others]
| Big data : 8th CCF conference, big data 2020, Chongqing, China, October 22-24, 2020, revised selected papers / / Edited by Hong Mei [and eight others] |
| Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (261 pages) : illustrations |
| Disciplina | 323.448 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico | Big data |
| ISBN | 981-16-0705-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464428203316 |
| Gateway East, Singapore : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Big Data : 8th CCF Conference, BigData 2020, Chongqing, China, October 22–24, 2020, Revised Selected Papers / / edited by Hong Mei, Weiguo Zhang, Wenfei Fan, Zili Zhang, Yihua Huang, Jiajun Bu, Yang Gao, Li Wang
| Big Data : 8th CCF Conference, BigData 2020, Chongqing, China, October 22–24, 2020, Revised Selected Papers / / edited by Hong Mei, Weiguo Zhang, Wenfei Fan, Zili Zhang, Yihua Huang, Jiajun Bu, Yang Gao, Li Wang |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (261 pages) : illustrations |
| Disciplina | 323.448 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Artificial intelligence
Computer engineering Computer networks Social sciences - Data processing Education - Data processing Computer science - Mathematics Image processing - Digital techniques Computer vision Artificial Intelligence Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Computers and Education Mathematics of Computing Computer Imaging, Vision, Pattern Recognition and Graphics |
| ISBN | 981-16-0705-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Short Text Classification Model Based on Cross-Layer Connected Gated Recurrent Unit Capsule Network -- Image Compressed Sensing using Neural Architecture Search -- Discovery of Sparse Formula Based on Elastic Network Method and its Application in Identification of Turbulent Boundary Layer Wall Function -- Rotation-Dpeak: Improving Density Peaks Selection for Imbalanced Data -- Introducing MDPSD, a Multimodal Dataset for Psychological Stress Detection -- Small-Scale Data Classification Based Deep Forest -- An Answer Sorting Method Combining Multiple Neural Networks and Attentional Mechanisms -- Optimal Subspace Analysis based on Information-Entropy Increment -- Link Prediction of Attention Flow Network Based on Maximum Entropy Model -- Graph Representation Learning using Attention Network -- Food Pairing Based on Generative Adversarial Networks -- Comparisons of Deep Neural Networks in Multi-Label Classification for Chinese Recipes -- Improving Word Alignment With Contextualized Embedding and Bilingual Dictionary -- Hypernetwork Model Based on Logistic Regression -- Multi Dimensional Evaluation of Middle School Students’ Physical and Mental Quality and Intelligent Recommendation of Exercise Programs Based on Big Data Analysis -- Diversity-Aware Top-N Recommendation: A Deep Reinforcement Learning way. |
| Record Nr. | UNINA-9910483151103321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain and Trustworthy Systems : 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30–31, 2025, Revised Selected Papers, Part II / / edited by Jianguo Chen, Xiaonan Luo, Yuanlong Yu
| Blockchain and Trustworthy Systems : 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30–31, 2025, Revised Selected Papers, Part II / / edited by Jianguo Chen, Xiaonan Luo, Yuanlong Yu |
| Autore | Chen Jianguo |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (777 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
LuoXiaonan
YuYuanlong |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
| ISBN | 981-9534-83-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Deep Learning Architectures & Optimization -- Rethinking Oversmoothing Mitigation in Deep Graph Neural Networks. -- LPipe: Optimizing Memory Utilization in Pipeline Parallelism for Large Language Model Training with Bubble-Filled Activation Swapping. -- A 2.5D Deep Learning Model Based on 3D CNN and 2D Swin Transformer for the Early Diagnosis of Alzheimer's Disease. -- MS-UMamba: A Improved Vision Mamba UNet for Fetal Abdominal Medical Image Segmentation. -- An Efficient Action Recognition Model Based on Improved Deep Learning Algorithm. -- A DeepSeek-based Multimodal Emotion Recognition Algorithm for Elderly-Oriented Cultural Tourism Scenarios. -- Matrix Factorization Recommendation System Optimized by Dynamic Latent Factors and Time Weighting. -- A Stock Price Prediction Method Based on the DWT-FGRU Model. -- An Efficient UAV-view Small Target Detection Algorithm Based on Dynamic Routing Attention and Collaborative Knowledge Distillation. -- Computer Vision & Medical Image Analysis -- VLME: Vision-Language Model Extraction Attack Through Multi-Modal Information Mapping. -- A Multi-Modal and Temporal-Aware Person Re-identification Algorithm for LiDAR-Based Surveillance. -- FAMSeg: Fetal Femur and Cranial Ultrasound Segmentation Using Feature-Aware Attention and Mamba Enhancement. -- Vision Foundation Models in Medical Image Analysis: Advances and Challenges. -- A Survey on Crop Disease Prediction Detection: AI Models Trained on Multispectral and Hyperspectral Images for Early Disease Detection. -- Advancements in Artificial Intelligence Applications for Cardiovascular Disease Research. -- Hybrid Distance-Based K-Means Clustering for Datasets with Numerical, Categorical, and Sequential Attributes. -- Building A Cattle Farming System in Industry 4.0. -- Underwater fish target detection system integrating multi-scale feature enhancement and multi-target tracking algorithms. -- Natural Language Processing & Multimodal Learning -- Transferring External Knowledge to Weakly Supervised Temporal Action Localization. -- A Contrastive Learning-based Multi-scale Attention Model for Text Recognition. -- Low-Resource Project-Specific Code Summarizaiton: On the Importance of Datasets. -- Model Inversion Attack Enhancements: A Study in Optimization. -- Public Data Pricing Models Leveraging Machine Learning. -- An Empirical Study of Test Code Summarization. -- Revisting Data-Driven ECG Classification: Definitions, Datasets and Benchmarks. -- Intelligent Evaluation Model for Graduate Employment Quality Based on Cross Modal Feature Learning. -- A New Timely Dataset for Chinese Rumor Detection: Automatic Generation via SOTA Large Language Models. -- Reinforcement Learning & Edge Computing Systems -- A Multi-view Hypergraph Contrastive Learning Framework for Item Recommendation. -- Trajectory Design for Data Collection under Insufficient UAV Energy: A Staged Actor-Critic Reinforcement Learning Approach. -- A Transformer-based Model with Patch and Gate Attention Meachanisms for Price Prediction in the Stock Market. -- SEG: Seeds-Enhanced Iterative Refinement Graph Neural Network for Entity Alignment. -- FLTG: Byzantine-Robust Federated Learning via Angle-Based Defense and Non-IID-Aware Weighting. -- Research on Air Quality Imputation Model Based on Multi-Scale Attention Convolution Network. -- A Volatile-Aware Client Selection Method for Federated Learning with Discounted Multi-armed Bandit. -- Large-Scale Multiobjective Optimization Based on Gradient Grouping. -- QSC: An Edge Server Placement Strategy Based on Spectral Clustering and Q-Learning. -- Black-box Target Adversarial Examples against Deep Reinforcement Learning. -- EC-MADRL: AI-Enhanced Edge Cooperation Caching Based on Multi-Agent Deep Reinforcement Learning. |
| Record Nr. | UNINA-9911049147603321 |
Chen Jianguo
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain and Trustworthy Systems : 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30–31, 2025, Revised Selected Papers, Part I / / edited by Jianguo Chen, Xiaonan Luo, Yuanlong Yu
| Blockchain and Trustworthy Systems : 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30–31, 2025, Revised Selected Papers, Part I / / edited by Jianguo Chen, Xiaonan Luo, Yuanlong Yu |
| Autore | Chen Jianguo |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (735 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
LuoXiaonan
YuYuanlong |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
| ISBN | 981-9534-77-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Blockchain Security & Attack Mitigation -- BM-PAW: A Profitable Mining Attack in the PoW-based Blockchain System. -- Smart Contract Vulnerability Detection Method Based on Vulnerability Propagation Path. -- Correlation-Sampling Based Graph Learning Method for Blockchain Abnormal Account Detection. -- Detection and Analysis of Bitcoin Mixing Transactions. -- Unveiling Latent Information in Transaction Hashes: Hypergraph Learning for Ethereum Ponzi Scheme Detection. -- Defensive Strategies Against Sandwich Attacks:A Review. -- Systemic Risk Assessment in CEXs and DEXs: An Application of a Tail Dependence-Based MST and CoVaR Approach. -- Consensus Mechanisms & Performance Optimization -- Broker2Balance: Profit Maximization and Equitable Distribution for Sharded Blockchains. -- An Efficient Encoding Storage Framework for Blockchain. -- DR-DPoS: A Fair Delegated Proof-of-Stake Consensus Algorithm Based on Dynamic Reputation Authorization. -- UB-MCSVD: Smart Grid Multi-cloud Storage and Verifiable Deletion Scheme Based on ULS-PBFT Consensus. -- Blockchain Beyond Limits: New Frontiers in Oracles, Scalability and Consensus. -- Definition and Analysis of Defects in Cross-chain Bridge Decentralized Applications. -- Optimizing Blockchain ETL Algorithms: Improvement Strategies Based on RPC Interfaces. -- Few-Shot Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Contrastive Learning. -- Identity Authentication & Data Privacy -- A Blockchain-Based Terminal-UAV-Cloud Collaborative Identity Authentication Scheme. -- BCAAH: A Blockchain-Based Cross-Domain Anonymous Authentication Scheme for Heterogeneous Domains. -- VeryFL: A Verify Federated Learning Framework Embedded with Blockchain. -- Enabling Public Verifiable Keyword Search over Encrypted Cloud Data Using Consortium Blockchain. -- A Secure Electronic Notary Scheme Based on InterPlanetary File System and Blockchain. -- Multi Keyword Dynamic Searchable Encryption Scheme Based on Blockchain. -- A Distributed Identity Authentication Scheme for The Metaverse. -- Homomorphic Encryption-Driven Low-Loss P2P Energy Privacy-Preserving Auction. -- Blockchain Applications & Industry Solutions -- TDTS:A Trusted Data Trading System Framework Based on Blockchain Data Identification and Private Information Retrieval. -- Blockchain-based Cybersecurity Threat Intelligence Sharing Platform by Integrating Incentive Mechanisms. -- Research on a Trusted Blockchain Electronic Evidence System for Agricultural Products. -- Decentralized Multichain Blockchain System for Logistics Management. -- A More Secure Blockchain-Based Crowdfunding Platform. -- Innovative Pathways for Blockchain-Enabled Intellectual Property Pledge Financing: A Case Study of the "Zhiyirong" Platform. -- DNACP: A Method of Copyright Protection for Works of Art. -- Efficient Aggregate Signature Verification for DID-based Digital Asset Trading Platforms. -- Blockchain-based Electronic Medical Record Access Framework. -- Status Quo of Blockchain Technology in Germany: Industry Adoption, Research Initiatives, and Policy Frameworks. -- Cryptocurrency Interdependency and Market Dynamics: A Network-Based Approach to Return Forecasting. -- Analysis of Bitcoin Trading Behavior in Darknet Markets. -- Research on the Scheme of Blockchain and RFID Technology in the Traceability of High-Value Medical Consumables. |
| Record Nr. | UNINA-9911049190703321 |
Chen Jianguo
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain and Trustworthy Systems : 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30–31, 2025, Revised Selected Papers, Part III / / edited by Jianguo Chen, Xiaonan Luo, Yuanlong Yu
| Blockchain and Trustworthy Systems : 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, Zhuhai, China, May 30–31, 2025, Revised Selected Papers, Part III / / edited by Jianguo Chen, Xiaonan Luo, Yuanlong Yu |
| Autore | Chen Jianguo |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (715 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) | Zhen |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
| ISBN | 981-9534-80-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Blockchain & Smart Contract Trustworthiness. -- Slime: An Intelligent Hybrid Recovery Strategy that Minimizes Recovery Overhead. -- ASCRec: Recommending Accurate and Secure Codes for Smart Contract Developers. -- A Smart Contract Vulnerability Detection Method Based on Graph Neural Networks and Zero-Shot Learning. -- Decentralized Data Trading Solutions with Poisoning Attacks Defense. -- USCSafe: Identifying Permission Vulnerabilities in Upgradeable Smart Contracts. -- SAFE: A Blockchain-Based Framework for Secure Health Data Sharing with Symmetric Encryption. -- The Impact of Cryptographic Algorithm Performance on Smart Contracts in WebAssembly. -- A Survey of Sharding Blockchains on Performance and Scalability. -- Investigating Tornado Cash: Empirical Insights into Mixing Service Anonymity. -- Federated Learning & Edge Computing Security. .-A Spam Detection Model With Federated Learning and Large Language Model. -- Secure and Efficient Task Offloading with Resource Allocation in Vehicular Edge Computing. -- Crowdsensing with Federated Trust Management: Adaptive Defense Against Malicious Contributions. -- CDDSF: A Zero-Shot Domain Adaptation Framework for Secure Solidity Code Search. -- Cost-aware Makespan Minimization for Workflow Scheduling in Trustworthy Heterogeneous Clouds. -- A Mutimodal Smart Contract Classification Method Based on Hybrid Convolutional Neural Networks. -- Computility Planning for Sustainable Supercomputing Centers. -- Research on Web Vulnerability Mining System Based on Machine Learning. -- A Survey on Trustworthy Systems in ChatGPT-Like Large-Scale Generative AI Models: Security, Interpretability, Reliability, and Privacy Considerations. -- Industrial & IoT System Reliability -- HMC-Driven Efficient Prediction of SiC Ion Annealing. -- IEDD-Net: Industrial Endoscope Defect Detection Network Based on Improved YOLOv12n. -- Research on Reliable Control Methods for Industrial Robotic Arms. -- Adaptive Damage Detection Algorithm for Food Packaging Based on Deep Learning. -- Service Quality Improvement Strategy in Public Services: An NN-SHAP Analysis Model for Satisfaction Survey. -- Feature-Fusion-Based Adaptive Architectural Crack Detection System. -- Research on Vegetation Generation Technology for 3D Scenes Based on Multi-Physics Field Coupling. -- A 2D Engineering Drawing Element Parsing Method Based on Multi-Modal Frequency-Spatial Feature Pyramid Network. -- Pi 4B-based Visual Navigation System for Low-computing Power Intelligent Vehicles. -- CIHD-Net: A Cross-modal Interactive Hierarchical Dilated Network for RGB-D Salient Object Detection. -- A Semi-fragile Reversible Watermarking for 3D Models Using Quantization Interval Division Modulation. -- An Effective Reliability Prediction Model for Blockchain Services via Hybrid Multi-Layer Graph Attention and Self-attention. -- DCD: A Semantic Segmentation Model for Fetal Ultrasound Four-Chamber View. -- Detecting Inconsistent Privacy Statements between Mobile Vehicle Apps and their Third-party Integrations. -- CSM:Cross-Scan Mamba for Remote Sensing Object Detection. -- Robust Cross-Modal Semantic Communication for Object Detection. -- Research on the Application of Pedagogical Agents in Interdisciplinary Teaching. -- A Dynamic Swarm Reputation-DrivenConsensus Mechanism for TrustworthyEmbodied Intelligent Collaboration. |
| Record Nr. | UNINA-9911049112803321 |
Chen Jianguo
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain and Trustworthy Systems : 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part II / / edited by Jiachi Chen, Bin Wen, Ting Chen
| Blockchain and Trustworthy Systems : 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part II / / edited by Jiachi Chen, Bin Wen, Ting Chen |
| Autore | Chen Jiachi |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (366 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
WenBin
ChenTing |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
| ISBN |
9789819981045
9819981042 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | AI for Blockchain -- A General Smart Contract Vulnerability Detection Framework with Self-Attention Graph Pooling -- The Best of Both Worlds: Integrating Semantic Features with Expert Features for Smart Contract Vulnerability Detection -- A LSTM and GRU-based hybrid model in the Cryptocurrency price prediction -- Smart Contract Code Clone Detection Based on Pre-Training Techniques -- MF-Net: Encrypted Malicious Traffic Detection Based on MultiFlow Temporal Features -- Blockchain Applications -- When Supply Chain Security Meets Blockchain: Applications and Challenges -- ePoW: Energy-efficient Blockchain Consensus Algorithm for Decentralize Federated Learning System in Resource constrained Drone Swarm -- Applications of Consortium Blockchain in Power Grid Security: A Systematic Review -- Blockchain and OR based data sharing solution for Internet of Things -- Rearranging Inv Message in the Bitcoin to Construct Covert Channels -- Long-term Blockchain Transactions Spanning Multiplicity of Smart Contract Methods -- Market Derivative Risks and Regulation of Virtual Currency Trading Using "PaoFen" Platforms -- Research on Regulation Oriented Decentralized Oracle Machine -- Obric: Oblivious Keyword Search in Hyperledger Fabric Platform -- Blockchain Architecture and Optimization -- A distributed, penetrative and all-dimensional supervision architecture for consortium blockchain -- SC-Chain: a multi-modal collaborative storage system for medical resource -- Congestion Control with Receiver-aided Network Status Awareness in RDMA Transmission -- VPBFT: Improved PBFT consensus algorithm based on VRF and PageRank algorithm -- Consensusless Blockchain: A Promising High-Performance Blockchain without Consensus -- Protocols and Consensus -- Ouroboros Taktikos: Regularizing Proof-of-Stake via Dynamic Difficulty -- Petrichor: An Efficient Consensus Protocol Leveraging DAG and Sharding for Asynchronous BFT -- A Kind of Optimization Method for Committee and Reward Mechanism -- MagpieBFT: An Efficient Asynchronous BFT Protocol for Blockchain -- A Hierarchical Blockchain Framework with Selectable Consensus Scope for Data Sharing in Internet of Vehicles -- An Improved PBFT Consensus Algorithm for Supply Chain Finance. . |
| Record Nr. | UNINA-9910766885503321 |
Chen Jiachi
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain and Trustworthy Systems : 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I / / edited by Jiachi Chen, Bin Wen, Ting Chen
| Blockchain and Trustworthy Systems : 5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part I / / edited by Jiachi Chen, Bin Wen, Ting Chen |
| Autore | Chen Jiachi |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (308 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
WenBin
ChenTing |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
| ISBN |
9789819981014
9819981018 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Anomaly detection on blockchain -- Blockchain Scam Detection: State-of-the-art, Challenges, and Future Directions -- ScamRadar: Identifying Blockchain Scams When They are Promoting -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Based on Financial Characteristics to Capture the Source of Funds of the Ponzi Scheme on Ethereum with Graph Traversal Technology -- Edge Intelligence and Metaverse Services -- Dynamic Computation Offloading Leveraging Horizontal Task Offloading and Service Migration in Edge Networks -- Blockchain-Assisted Authentication and Key Agreement Protocol for Cloud-Edge Collaboration -- Towards Efficient and Privacy-preserving Hierarchical Federated Learning for Distributed Edge Network -- Blockchain System Security -- Securing Blockchain Using Propagation Chain Learning -- Privacy Protection Multi-copy Provable Data Possession supporting Data Reliability -- Research On Comprehensive Blockchain Regulation And Antifraud System -- Analysis of Peeling Chain Model in Bitcoin Mixing Service -- A Blockchain-based On-chain and Off-chain Dual-trusted Carbon Emission Trading System with Reputation Mechanism -- Empirical Study and Surveys -- Smart Contract Vulnerability Detection Methods: A Survey -- Who Needs the Most Research Effort? Investigating the Importance of Smart Contract Weaknesses -- A Survey on Blockchain Abnormal Transaction Detection -- A Systematic Literature Review on Smart Contract Vulnerability Detection by Symbolic Execution -- Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges -- Federated Learning for Blockchain -- A Blockchain-enabled Decentralized Federated Learning System with Transparent and Open Incentive and Audit Contracts -- Blockchain-based Federated Learning for IoT Sharing: Incentive Scheme with Reputation Mechanism -- An Optimized Scheme of Federated Learning Based on Differential Privacy. |
| Record Nr. | UNINA-9910767547203321 |
Chen Jiachi
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain, Metaverse and Trustworthy Systems : 6th International Conference, BlockSys 2024, Hangzhou, China, July 12–14, 2024, Revised Selected Papers, Part I / / edited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang
| Blockchain, Metaverse and Trustworthy Systems : 6th International Conference, BlockSys 2024, Hangzhou, China, July 12–14, 2024, Revised Selected Papers, Part I / / edited by Debiao He, Jiajing Wu, Chen Wang, Huawei Huang |
| Autore | He Debiao |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (330 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
WuJiajing
WangChen HuangHuawei |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection - Law and legislation
Artificial intelligence Data structures (Computer science) Information theory Operating systems (Computers) Computers, Special purpose Privacy Artificial Intelligence Data Structures and Information Theory Operating Systems Special Purpose and Application-Based Systems |
| ISBN |
9789819614110
9819614112 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Blockchain and Data Mining. -- Intrusion Anomaly Detection with Multi-Transformer. -- A Federated Learning Method Based on Linear Probing and Fine-Tuning. -- Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection. -- A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism. -- Research on Network Traffic Anomaly Detection Method Based on Deep Learning. -- Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning. -- Data Security and Anomaly Detection. -- Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis. -- Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine. -- Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption. -- Implicit White-Box Implementations of Efficient Double-Block-Length MAC. -- A Survey on Blockchain Scalability. -- Supply Chain Financing Model Embedded with “Full-Process” Blockchain. -- Blockchain Performance Optimization. -- ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree. -- SVD-SESDG: Smart Contract Vulnerability Detection Technology via Symbol Execution and State Variable Dependency Graph. -- Dual-view Aware Smart Contract Vulnerability Detection for Ethereum. -- Blockchain Layered Sharding Algorithm Based on Transaction Characteristics. -- An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution. -- Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph. |
| Record Nr. | UNINA-9910983032403321 |
He Debiao
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||