This three-volume set LNCS 15161, 15162 and 15163 constitutes the refereed proceedings of the 30th International Conference, COCOON 2024, held in Shanghai, China, during August 23-25, 2024.The 90 full papers and 6 short papers were carefully reviewed...Daugiau...
This three-volume set LNCS 15161, 15162 and 15163 constitutes the refereed proceedings of the 30th International Conference, COCOON 2024, held in Shanghai, China, during August 23-25, 2024.The 90 full papers and 6 short papers were carefully reviewed...Daugiau...
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xian, China, during October 25-28, 2024.The 34 full papers included in this volume were carefully reviewed and sele...Daugiau...
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xian, China, during October 25-28, 2024.The 34 full papers included in this volume were carefully reviewed and sele...Daugiau...
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xian, China, during October 25-28, 2024.The 34 full papers included in this volume were carefully reviewed and sele...Daugiau...
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xian, China, during October 25-28, 2024.The 34 full papers included in this volume were carefully reviewed and sele...Daugiau...
This book constitutes the refereed proceedings of the 9th China National Conference on Big Data and Social Computing, BDSC 2024, held in Harbin, China, during August 8-10, 2024.The 28 full papers presented in this volume were carefully reviewed and s...Daugiau...
This book constitutes the refereed proceedings of the 9th China National Conference on Big Data and Social Computing, BDSC 2024, held in Harbin, China, during August 8-10, 2024.The 28 full papers presented in this volume were carefully reviewed and s...Daugiau...
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18-20, 2023. The 38 full papers presente...Daugiau...
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18-20, 2023. The 38 full papers presente...Daugiau...
This book constitutes refereed proceedings of the 8th China National Conference on Big Data and Social Computing, BDSC 2023, held in Urumqi, China, from July 15-17, 2023.The 23 full papers and 3 short papers presented in this volume were ca...Daugiau...
This book constitutes refereed proceedings of the 8th China National Conference on Big Data and Social Computing, BDSC 2023, held in Urumqi, China, from July 15-17, 2023.The 23 full papers and 3 short papers presented in this volume were ca...Daugiau...
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed...Daugiau...
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed...Daugiau...
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xian, China, in October 2022.The 23 papers presented in this volume were carefully...Daugiau...
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xian, China, in October 2022.The 23 papers presented in this volume were carefully...Daugiau...
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xian, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104...Daugiau...
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xian, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104...Daugiau...
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the...Daugiau...
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data...Daugiau...
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data...Daugiau...
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers...Daugiau...
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers...Daugiau...
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversar...Daugiau...
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversar...Daugiau...
This book presents research on the challenges and potential of fungal contribution in agriculture for food substantiality. Research on fungi plays an essential role in the improvement of biotechnologies which lead global sustainable food production....Daugiau...
This book presents research on the challenges and potential of fungal contribution in agriculture for food substantiality. Research on fungi plays an essential role in the improvement of biotechnologies which lead global sustainable food production....Daugiau...
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xian, China in October 2020.The 118 full papers and 40 short papers presented were carefully rev...Daugiau...
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xian, China in October 2020.The 118 full papers and 40 short papers presented were carefully rev...Daugiau...
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xian, China in October 2020.The 118 full papers and 40 short papers presented were carefully rev...Daugiau...