Browse Subject Headings
Frontiers in Cyber Security : 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I
Frontiers in Cyber Security : 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I
Click to enlarge
ISBN No.: 9789819601509
Pages: xx, 498
Year: 202412
Format: Trade Paper
Price: $ 134.41
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (Forthcoming)

- Machine Learning and Differential Privacy.- Large Vision-Language Model Security: A Survey.- A Robust Linked List Steganography Without Embedding for Digital Images.- Locate-then-Reveal: Enhancing the Playload Capacity of Multi-Image Hiding.- LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy.- Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing.- On the Differential Transparency Order of Boolean Functions.- Federated Learning.


- Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning.- Efficient Private Set Intersection for Vertical Federated Learning in IoV.- EVFLS:An Effective and Verifiable Federated Learning Aggregation Scheme.- Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments.- Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework.- Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference.- Privacy-Preserving Services.- Secure Cloud Album: Design and Implementation.


- Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks.- A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server.- Advertising Diversion App using Clipboard Content Recognition.- Secure Task Assignment based on Tentative Planned Path in Crowdsensing Systems.- Efficient and Practical Privacy-Preserving Face Recognition Protocol.- Blockchain and Distributed System.- ShardOpt: Optimal Sharding Strategy with Transaction Prediction.- Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game.


- Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach.- Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics.- Blockchian-Based Access Control and Data Sharing with IPFS in IIOT.- Public-Key Cryptography.- A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption.- Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City.- Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme.- Multi-Ciphertext Equality Batch Test Supporting Inequality Verification.


- Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security.- A Quantum-Resistant Blockchain Based on Hash Function.- Multi-Party Computation.- PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection.- Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem.- Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings