|
|
|||
|
||||
OverviewThis four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024. The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on Privacy and Cryptography AI for cybersecurity and Adversial models Quantum Computing in Cybersecurity Network Security Blockchain and Cryptocurrencies Fuzzing and IoT security Malware and Attack Analysis Web Security Authentication Large Language Model for Cybersecurity Security Assessments Full Product DetailsAuthor: Saed Alrabaee , Kim-Kwang Raymond Choo , Ernesto Damiani , Robert H. DengPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Volume: 627 ISBN: 9783031944444ISBN 10: 3031944445 Pages: 416 Publication Date: 05 September 2025 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsPrivacy and Cryptography.- Byzantine Robust Federated Learning for Unreliable Environments by Random-Matching Verification and Credibility Table.- PPSA: Polynomial Private Stream Aggregation for Time Series Data Analysis.- SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption.- Stuck in the SAND: When Your Neighbor Becomes Your Enemy.- Optimized Privacy Preserving Clustering with Fully Homomorphic Encryption.- Noya: An Efficient, Flexible and Secure CNN Inference Model based on Homomorphic Encryption.- OCE PTree: An Online Communication Efficient Privacy preserving Decision Tree Evaluation.- An Effective Multiple Private Set Intersection.- BCPIR: More Efficient Keyword PIR via Block Building Codewords.- Embedding optimized Steganography Based on Post-quantum Encryption and BPNN.- AI for cybersecurity and Adversial models.- Enhancing Runtime Application Self Protection with Unsupervised Deep Learning.- Optical Lens Attack on Deep Learning Based Monocular Depth Estimation.- RootES: A Method for Generating Text Adversarial Examples Using Root Embedding Space.- Boosting GAN Performance: Feature Transformation for Heavy Tailed Malware Data Generation.- SPC-GAN-Attack: Attacking Slide Puzzle CAPTCHAs by Human Like Sliding Trajectories Based on Generative Adversarial Network.- Improving Interpretability: Visual Analysis of Deep Learning Based Multi Channel Attacks.- Deep Reinforcement Learning from Drifting Network Environments in Anomaly Detection.- A Comparative Study on Source Code Attribution Using AI: Datasets, Features, and Techniques.- Quantum Computing in Cybersecurity.- Harnessing the Power of Quantum Computing for URL Classification: A Comprehensive Study.- Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks.- A Secure Blockchain Network with Quantum Key Encryption and Authentication.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||