Frontiers in Cyber Security : 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I (Communications in Computer and Information Science) (2025)

個数:

Frontiers in Cyber Security : 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I (Communications in Computer and Information Science) (2025)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 523 p.
  • 言語 ENG
  • 商品コード 9789819601509

Full Description

This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024.

The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions.

The papers are organized in the following topical sections:

Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation.

Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.

Contents

.- Machine Learning and Differential Privacy.

.- Large Vision-Language Model Security: A Survey.

.- A Robust Linked List Steganography Without Embedding for Digital Images.

.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.

.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.

.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.

.- On the Differential Transparency Order of Boolean Functions.

.- Federated Learning.

.- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.

.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.

.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.

.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.

.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.

.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.

.- Privacy-Preserving Services.

.- Secure Cloud Album: Design and Implementation.

.- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.

.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.

.- Advertising Diversion App using Clipboard Content Recognition.

.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.

.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.

.- Blockchain and Distributed System.

.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.

.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.

.- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.

.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.

.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.

.- Public-Key Cryptography.

.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.

.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.

.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.

.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.

.- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.

.- A Quantum-Resistant Blockchain Based on Hash Function.

.- Multi-Party Computation.

.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.

.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.

.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.

最近チェックした商品