Ubiquitous Security : 4th International Conference, UbiSec 2024, Changsha, China, December 29-31, 2024, Revised Selected Papers (Communications in Computer and Information Science)

個数:

Ubiquitous Security : 4th International Conference, UbiSec 2024, Changsha, China, December 29-31, 2024, Revised Selected Papers (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 439 p.
  • 言語 ENG
  • 商品コード 9789819648351

Full Description

This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29-31, 2024.

The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.

Contents

.- Cyberspace Security.
.- vCan We Use Smart Contracts to Improve Security of IoT.
.- A Data-free Backdoor Attack Approach in Self-Supervised Models.
.- Closed-loop Safe Correction for Reinforcement Learning Policy.
.- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
.- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
.- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
.- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
.- Single sign-on Security: An Empirical Study of Sign in with Apple.
.- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
.- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
.- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
.- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
.- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
.- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
.- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
.- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
.- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
.- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
.- Improving Transferability of Adversarial Examples by SVD Transformation.
.- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.

.- Cyberspace Privacy.
.- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
.- Enhancing Personalized Bundle Recommendation with Serendipity.
.- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
.- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
.- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
.- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
.- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
.- Short Papers.
.- TNSSL: TrojanNet Attack in Self-Supervised Learning.
.- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
.- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
.- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
.- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.

最近チェックした商品