000
|
|
nam5i |
001
|
|
2210080935679 |
003
|
|
DE-He213 |
005
|
|
20250321105620 |
007
|
|
cr nn 008mamaa |
008
|
|
250118s2025 si | s |||| 0|eng d |
020
|
|
▼a9789819611485▼9978-981-96-1148-5 |
024
|
|
▼a10.1007/978-981-96-1148-5▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQ334-342 |
050
|
|
▼aTA347.A78 |
072
|
|
▼aUYQ▼2bicssc |
072
|
|
▼aCOM004000▼2bisacsh |
072
|
|
▼aUYQ▼2thema |
082
|
|
▼a006.3▼223 |
245
|
00 |
▼aArtificial Intelligence Security and Privacy▼h[electronic resource] :▼bSecond International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings /▼cedited by Fangguo Zhang, Weiwei Lin, Hongyang Yan. |
250
|
|
▼a1st ed. 2025. |
264
|
|
▼aSingapore :▼bSpringer Nature Singapore :▼bImprint: Springer,▼c2025. |
300
|
|
▼aX, 182 p. 51 illus., 40 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v15399 |
505
|
|
▼a -- BadHAR: Backdoor Attacks in Federated Human Activity Recognition Systems. -- Fully Automated Generation Mechanism of Rootfs for Specified Operating Systems under Linux. -- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels. -- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated Learning. -- Intelligent backpack based on ireless mobile technology. -- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on BERTopic: A Case Study of Hotel Management. -- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation. -- Enhancing Adversarial Robustness in Object Detection via Multi-Task Learning and Class-Aware Adversarial Training. -- FedHKD: A Hierarchical Federated Learning Approach Integrating lustering and Knowledge Distillation for Non-IID Data. -- Application of Ensemble Learning Based on High-Dimensional Features in Financial Big Data. -- Collaborative Framework for Dynamic Knowledge Updating and Transparent Reasoning with Large Language Models. -- Zero-Shot Dense Retrieval based on Query Expansion. -- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation. -- Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model. |
520
|
|
▼aThis book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024. The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications. |
650
|
|
▼aArtificial intelligence. |
650
|
|
▼aSecurity systems. |
650
|
|
▼aData protection▼xLaw and legislation. |
650
|
|
▼aCryptography. |
650
|
|
▼aData encryption (Computer science). |
650
|
|
▼aData protection. |
650
|
|
▼aArtificial Intelligence. |
650
|
|
▼aSecurity Science and Technology. |
650
|
|
▼aPrivacy. |
650
|
|
▼aCryptology. |
650
|
|
▼aSecurity Services. |
700
|
|
▼aZhang, Fangguo.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aLin, Weiwei.▼eeditor.▼0(orcid)0000-0001-6876-1795▼1https://orcid.org/0000-0001-6876-1795▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aYan, Hongyang.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9789819611478 |
776
|
|
▼iPrinted edition:▼z9789819611492 |
830
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v15399 |
856
|
|
▼uhttps://doi.org/10.1007/978-981-96-1148-5 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
912
|
|
▼aZDB-2-LNC |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |