Beställningsvara. Skickas inom 10-15 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024. The 81 full papers were carefully reviewed and selected from 225 submissions.
Privacy and Cryptography.- Byzantine Robust Federated Learning for Unreliable Environments by Random-Matching Verification and Credibility Table.- PPSA: Polynomial Private Stream Aggregation for Time Series Data Analysis.- SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption.- Stuck in the SAND: When Your Neighbor Becomes Your Enemy.- Optimized Privacy Preserving Clustering with Fully Homomorphic Encryption.- Noya: An Efficient, Flexible and Secure CNN Inference Model based on Homomorphic Encryption.- OCE PTree: An Online Communication Efficient Privacy preserving Decision Tree Evaluation.- An Effective Multiple Private Set Intersection.- BCPIR: More Efficient Keyword PIR via Block Building Codewords.- Embedding optimized Steganography Based on Post-quantum Encryption and BPNN.- AI for cybersecurity and Adversial models.- Enhancing Runtime Application Self Protection with Unsupervised Deep Learning.- Optical Lens Attack on Deep Learning Based Monocular Depth Estimation.- RootES: A Method for Generating Text Adversarial Examples Using Root Embedding Space.- Boosting GAN Performance: Feature Transformation for Heavy Tailed Malware Data Generation.- SPC-GAN-Attack: Attacking Slide Puzzle CAPTCHAs by Human Like Sliding Trajectories Based on Generative Adversarial Network.- Improving Interpretability: Visual Analysis of Deep Learning Based Multi Channel Attacks.- Deep Reinforcement Learning from Drifting Network Environments in Anomaly Detection.- A Comparative Study on Source Code Attribution Using AI: Datasets, Features, and Techniques.- Quantum Computing in Cybersecurity.- Harnessing the Power of Quantum Computing for URL Classification: A Comprehensive Study.- Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks.- A Secure Blockchain Network with Quantum Key Encryption and Authentication.