1
Bellekens, Xavier
2024
Table of Contents:
“... Infrastructure Cybersecurity -- Section 6: Cybersecurity Research and Innovation -- Section 7: Cyber Fraud, Privacy and Education -- Section 8: Extended Abstracts....”2024
Full text
2
Jin, Hai
2024
Table of Contents:
“... Development: Capability and Safety Considerations for Applying Large Language Models in Medicine -- Blockchain-enhanced Device to Device Network Identity Verification Based on Zero Knowledge Proof -- A Privacy-preserving Searchable Encryption Scheme for Data...”2024
Full text
3
4
5
Huang, Xinyi
2024
Table of Contents:
“... Intelligence for Music Composition: Principles, Applications, and Privacy Implications -- AI-Driven Sentiment Analysis for Music Composition -- Fault Diagnosis Method for Hydro-Power Plant with Bi-LSTM Knowledge Graph aided by Attention Scheme -- AI and its Security...”2024
Full text
6
Du, Bowen
2024
Table of Contents:
“... Updating -- Blockchain-Based Multi-factor K-anonymity Group Location Privacy Protection Scheme -- Context-Aware Automatic Splitting Method for Structured Complex Crowdsourcing Tasks -- A Method for Security Traffic Patrolling Based on Structural Coordinated...”2024
Full text
7
Fritsch, Lothar
2024
Table of Contents:
“...Privacy and data protection -- Cryptography, protocols, analysis -- Cyber security -- Aspects of trust -- Defenses and forensics -- Machine learning and artificial intelligence in information security....”2024
Full text
8
Hassan, Fazilah
2024
Table of Contents:
“... Scenes Using Fusion Feature Correlation -- Prototype Learning Based Realistic 3D Terrain Generation from User Semantics -- Research on Matrix Factorization Recommendation Algorithm Based on Local Differential Privacy -- Enhancing Face Recognition Accuracy...”2024
Full text
9
Hassan, Fazilah
2024
Table of Contents:
“... -- Scattering Source Determination Using Deep Learning for 2-D Scalar Wave Propagation -- Optimal Control of Double Pendulum Crane Using FOPID and Genetic Algorithm -- SHADOW: Silent-Based Hybrid Approach for Dynamic Pseudonymization and Privacy Preservation...”2024
Full text
10
Gao, Honghao
2024
Table of Contents:
“... Allocation for Hybrid Applications of Blockchain and Mobile Edge Computing -- Blockchain-Based EMR Enhancement: Introducing PMI-Chain for Improved Medical Data Security and Privacy -- BGET: A Blockchain-based Grouping-EigenTrust Reputation Management Approach...”2024
Full text
11
Gao, Honghao
2024
Table of Contents:
“... and Privacy Protection -- Protect applications and data in use in IoT environment using collaborative computing -- Robustness-enhanced assertion generation method based on code mutation and attack defense -- Secure Traffic Data Sharing in UAV-Assisted VANETs -- A...”2024
Full text
12
Conti, Mauro
2024
Table of Contents:
“...Crypto -- Network, web and internet -- Privacy -- Remote -- Attacks -- Blockchain -- Miscellaneous -- Machine learning -- Software and systems security....”2024
Full text
13
Broch Johnsen, Einar
2024
Table of Contents:
“... for Variability, Adaptability, and Determinism -- Analysis -- Integrating Data Privacy Compliance in Active Object Languages -- Context-aware Trace Contracts -- Type-Based Verification of Delegated Control in Hybrid Systems -- Enforced Dependencies for Active Objects....”2024
Full text
14
Ge, Chunpeng
2024
Table of Contents:
“... Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy...”2024
Full text
15
Li, Keqiu
2024
Table of Contents:
“... Migration Algorithm for Edge Services Based on Evolutionary Reinforcement Learning -- A Graph Generation Network with Privacy Preserving Capabilities -- Clustered Federated Learning Framework with Acceleration Based on Data Similarity -- An Anonymous...”2024
Full text
16
Kiefer, Stefan
2024
Table of Contents:
“... -- Coverability in Well-Formed Free-Choice Petri Nets -- Devillers On verifying concurrent programs under weak consistency models: Decidability and Complexity -- A Summary and Personal Perspective on Recent Advances in Privacy Risk Assessment in Digital Pathology...”2024
Full text
17
18
Kobayashi, Naoki
2024
Table of Contents:
“... -- Determinization of Integral Discounted-Sum Automata is Decidable -- Checking History-Determinism is NP-hard for Parity Automata -- Tighter Construction of Tight Büchi Automata -- Synthesis with Privacy Against an Observer....”2024
Full text
19
20
Anter, Ahmed M.
2024
Table of Contents:
“... for complex disease prediction -- Chapter. 10. Printed rGO-based temperature sensor for wireless body area network applications -- Chapter. 11. Recent advanced in healthcare data privacy techniques -- Chapter. 12. The ability of the CFD approach to investigate...”2024
Full text