Atnaujinkite slapukų nuostatas

El. knyga: Artificial Intelligence Security and Privacy: Second International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings

Edited by , Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 15399
  • Išleidimo metai: 17-Jan-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819611485
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 15399
  • Išleidimo metai: 17-Jan-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819611485

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.





The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications.
.- BadHAR: Backdoor Attacks in Federated Human Activity Recognition
Systems.

.- Fully Automated Generation Mechanism of Rootfs for Specified Operating
Systems under Linux.

.- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels.

.- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated
Learning.

.- Intelligent backpack based on ireless mobile technology.

.- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on
BERTopic: A Case Study of Hotel Management.

.- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay
Modulation.

.- Enhancing Adversarial Robustness in Object Detection via Multi-Task
Learning and Class-Aware Adversarial Training.

.- FedHKD: A Hierarchical Federated Learning Approach Integrating  lustering
and Knowledge Distillation for Non-IID Data.

.- Application of Ensemble Learning Based on High-Dimensional Features in
Financial Big Data.

.- Collaborative Framework for Dynamic Knowledge Updating and Transparent
Reasoning with Large Language Models.

.- Zero-Shot Dense Retrieval based on Query Expansion.

.- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation.

.- Generative Image Steganography Based on Latent Space Vector Coding and
Diffusion Model.