• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Ubiquitous Security: 4th International Conference, UbiSec 2024, Changsha, China, December 29?31, 2024, Revised Selected Papers

    Ubiquitous Security by Wang, Guojun; Yan, Zheng; Wu, Yulei; Li, Kuan-Ching;

    4th International Conference, UbiSec 2024, Changsha, China, December 29?31, 2024, Revised Selected Papers

    Series: Communications in Computer and Information Science; 2469;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 139.09
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        57 687 Ft (54 940 Ft + 5% VAT)
      • Discount 20% (cc. 11 537 Ft off)
      • Discounted price 46 150 Ft (43 952 Ft + 5% VAT)

    57 687 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Long description:

    "

    This book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29?31, 2024.

    The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy.

    "

    More

    Table of Contents:

    .- Cyberspace Security.
    .- vCan We Use Smart Contracts to Improve Security of IoT.
    .- A Data-free Backdoor Attack Approach in Self-Supervised Models.
    .- Closed-loop Safe Correction for Reinforcement Learning Policy.
    .- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing.
    .- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation.
    .- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security.
    .- Auditing the Auditor: Heuristics for Testing Password Auditing System Security.
    .- Single sign-on Security: An Empirical Study of Sign in with Apple.
    .- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences.
    .- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention.
    .- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges.
    .- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations.
    .- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning.
    .- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol.
    .- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation.
    .- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying.
    .- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT.
    .- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures.
    .- Improving Transferability of Adversarial Examples by SVD Transformation.
    .- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving.

    .- Cyberspace Privacy.
    .- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing.
    .- Enhancing Personalized Bundle Recommendation with Serendipity.
    .- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks.
    .- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy.
    .- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference.
    .- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data.
    .- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism.
    .- Short Papers.
    .- TNSSL: TrojanNet Attack in Self-Supervised Learning.
    .- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT.
    .- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System.
    .- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection.
    .- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.

    More
    Recently viewed