|
|
|||
|
||||
OverviewThis book constitutes the proceedings of the Fourth International Conference on Ubiquitous Security, UbiSec 2024, held in Changsha, China, during December 29–31, 2024. The 27 full papers and 5 short papers included in this book were carefully reviewed and selected from 73 submissions. These papers were organized in the followingsections: Cyberspace Security, and Cyberspace Privacy. Full Product DetailsAuthor: Guojun Wang , Zheng Yan , Yulei Wu , Kuan-Ching LiPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Volume: 2469 ISBN: 9789819648351ISBN 10: 9819648351 Pages: 444 Publication Date: 16 May 2025 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents.- Cyberspace Security. .- vCan We Use Smart Contracts to Improve Security of IoT. .- A Data-free Backdoor Attack Approach in Self-Supervised Models. .- Closed-loop Safe Correction for Reinforcement Learning Policy. .- Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing. .- Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation. .- A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security. .- Auditing the Auditor: Heuristics for Testing Password Auditing System Security. .- Single sign-on Security: An Empirical Study of Sign in with Apple. .- SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences. .- Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention. .- SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges. .- FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations. .- On the Effectiveness of Invisible Backdoor Attacks in Federated Learning. .- FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol. .- DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation. .- Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying. .- A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT. .- Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures. .- Improving Transferability of Adversarial Examples by SVD Transformation. .- Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving. .- Cyberspace Privacy. .- Integrating Resource Difficulty and Student Ability for Multidimensional Features-based Knowledge Tracing. .- Enhancing Personalized Bundle Recommendation with Serendipity. .- Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks. .- Marriage Matching for Bipartite Graphs under Condensed Local Differential Privacy. .- Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference. .- Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data. .- Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism. .- Short Papers. .- TNSSL: TrojanNet Attack in Self-Supervised Learning. .- A New Generation Wireless Biometric System with Deep Feature Fusion in IoT. .- Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System. .- FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection. .- A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |