Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications [E-Book] : 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings / edited by Tran Khanh Dang, Josef Küng, Tai M. Chung.
Chapters "Towards a Foundation of Web3" and "Secure and Efficient Implementation of Electronic Money" are available Open Access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Saved in:
Full text |
|
Personal Name(s): | Chung, Tai M., editor |
Dang, Tran Khanh, editor / Küng, Josef, editor | |
Edition: |
1st edition 2022. |
Imprint: |
Singapore :
Springer,
2022
|
Physical Description: |
XVI, 765 pages 339 illustrations, 261 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789811980695 |
DOI: |
10.1007/978-981-19-8069-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Communications in Computer and Information Science ;
1688 |
Subject (LOC): |
- Invited Keynotes
- Towards a Foundation of Web3
- In-Memory Computing Architectures for Big data and Machine Learning Applications
- Secure and Efficient Implementation of Electronic Money
- Managing the Quality of Data and Metadata for Biobanks
- Big Data Analytics and Distributed Systems
- Towards A Privacy, Secured and Distributed Clinical Data Warehouse Architecture
- Improving the Storage Utilization of 0-Complete Trees as Index Structures
- Implement the Data Conversion System by using α-Lightweight Coreset for Validation Process
- Content Selection Methods Using User Interest Prediction Based on Similarities of Web Activities
- ImageNet Challenging Classification with the Raspberry Pis: A Federated Learning Algorithm of Local Stochastic Gradient Descent Models
- Covid-19 Detection Based on Lung Lesion Signs in Big Data Processing Environment
- Predicting Loan Repayment Using A Hybrid of Genetic Algorithms, Logistic Regression, and Artificial Neural Networks
- Performance Evaluation of Regular Decomposition and Benchmark Clustering Methods
- Security and Privacy Engineering
- Authentication of Luxury Products - Identifying Key Requirements from a Seller and Consumer Perspective
- Analysis of A New Practical SPN-based Scheme in the Luby-Rackoff Model
- Authorization and Access Control for Different Database Models: Requirements and Current State of the Art
- A Hierarchical Deterministic Wallet using Ed25519 Digital Signature Scheme
- A Secure Framework for Internet of Medical Things Security Based System using Lightweight Cryptography enabled Blockchain
- Signature Algorithms on Non-commutative Algebras over Finite Fields of Characteristic Two
- Design a Smart Lock System Using Fingerprint and Password for Enhancing Security
- Machine Learning and Artificial Intelligence for Security and Privacy
- Towards an Attention-based Threat Detection System for IoT Networks
- Security and Privacy Issues and Solutions in Federated Learning for Digital Healthcare
- pPATE: A Pragmatic Private Aggregation of Teacher Ensembles Framework by Sparse Vector Technique based Differential Privacy, Paillier Cryptosystem and Human-in-the-loop
- Vietnamese Text's Writing Styles Based Authorship Identification Model
- Application of Machine Learning in Malware Detection
- Smart City and Industry 4.0 Applications
- Text Classification Models and Topic Models: An Overall Picture and A Case Study in Vietnamese
- Deep Hybrid Models for Forecasting Stock Midprices from the High-Frequency Limit Order Book
- An Image Denoising Model based on Nonlinear Partial Diferential Equation Using Deep Learning
- Recommendations in E-Commerce Systems based on Deep Matrix Factorization
- AttendanceKit: A set of Role-based Mobile Applications for Automatic Attendance Checking with UHF RFID using Realtime Firebase and Face Recognition
- Poses Classification in a Taekwondo Lesson using Skeleton Data extracted from Videos with Shallow and Deep Learning Architectures
- Social Distancing Violation Detection in Video using ChessBoard and Bird's-eye Perspective
- 3D-FaultSeg-UNet: 3D Fault Segmentation in Seismic Data Using Bi-stream U-Net
- Applying Artificial Intelligence to Plan Flight Paths for Aircraft at Subsonic Speeds
- Capacity Building in Government: Towards Developing A Standard for A Functional Specialist in AI for Public Services
- On the Feasibility of Machine Learning Models for Customer Spending Prediction Problem
- Forecasting the Opening and Closing Price Trends of Stock Using Hybrid Models and Artificial Intelligence Algorithm
- Artificial Intelligence Use in e-Government Services: A Systematic Interdisciplinary Literature Review
- Face Recognition based on Deep Learning and Data Augmentation
- An Approach for Similarity Vietnamese Documents Detection from English Documents
- Combine Clasification Algorithm and Centernet Model to Predict Trafic Density
- Data Analytics and Healthcare Systems
- Comparison of Health Indicators Construction for Concrete Structure Using Acoustic Emission Hit and Kullback-Leibler Divergence
- Lung and Colon Tumor Classification Based on Transfer Learning-Based Techniques
- An Enhanced Diabetes Mellitus Prediction using Feature Selection-Based Type-2 Fuzzy Model
- A Novel Approach of Using Neural Circuit Policies for COVID-19 Classification on CT-images
- Lung Lesions Segmentation and Classification with Deep Neural Networks
- Security and Data Engineering
- Image Denoising using Fully Connected Network with Reinforcement Learning
- Energy Harvesting Aware for Delay-efficient Data Aggregation in Battery-free IoT Sensors
- Deep Models for Mispronounce Prediction for Vietnamese Learners of English
- An Approach to Hummed-tune and Song Sequences Matching
- 84 Birds Classification using Transfer Learning and EfficientNetB2
- A Session-based Recommender System for Learning Resources
- A Drowsiness Detection System Based on Eye Landmarks Using IoT
- A Novel Approach for Vietnamese Speech Recognition Using Conformer
- Enhancing obfuscated malware detection with machine learning techniques
- Detecting Intrusion using Multiple Datasets in Software-Defined Networks
- Detecting Exams Fraud Using Transfer Learning and Fine-tuning for ResNet50
- Shape of Pill Recognition Using Mask R-CNN.