1 option
2022 4th International Conference on Data Intelligence and Security (ICDIS 2022) : Proceedings / Institute of Electrical and Electronics Engineers.
- Format:
- Book
- Author/Creator:
- Institute of Electrical and Electronics Engineers, author, issuing body.
- Language:
- English
- Subjects (All):
- Big data--Congresses.
- Big data.
- Artificial intelligence--Congresses.
- Artificial intelligence.
- Physical Description:
- 1 online resource (479 pages) : illustrations
- Place of Publication:
- Piscataway, NJ : IEEE, [2022]
- Contents:
- Efficient Mixed-Protocol Secure Four-Party Computation with Private RobustnessIntersection Based on Functional Encryption
- Token Open Security Model for Updatable Encryption
- Feature Selection of Intrusion Detection Method Based on Improved GWO
- Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVM
- Improving Network Intrusion Detection Using Autoencoder Feature Residuals
- Attacking Malware Detection using Adversarial Machine Learning
- HLT: A Hierarchical Vulnerability Detection Model Based on Transformer
- Detecting Vulnerabilities in Ethereum Smart Contracts with Deep Learning
- Data Leakage Attack via Backdoor Misclassification Triggers of Deep Learning Models
- FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples
- A Robust Watermarking Method For Image Processing Models
- Performance Comparison of Cryptosystems in Context to Internet of Things
- Black-Box Adversarial Attacks on Deep Neural Networks: A Survey
- A BSO-Based Feature Selection Algorithm Under Privacy Protection
- A Negative Survey Based Method for Preserving Topology Privacy in Social Networks
- Reconstructing Negative Survey with Least Squares Criterion
- Accuracy Prediction of Negative Surveys
- NegDL: Privacy-Preserving Deep Learning Based on Negative Database
- PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption
- Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature
- Achieving Efficient and Privacy-Preserving Arbitrary Geographic Range Query for Cloud
- Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption
- Empirical Study on Frequency Adversarial Perturbation for Medical Image Privacy Protection
- PPSL: Privacy-Preserving Text Classification for Split Learning
- Data Security Search Based on Semi-Supervised Sensitive Classifier
- Reconfigurable Intelligent Surfaces: A Physical Layer Security Perspective
- Wireless Smart Electric Meter Operation under Data Security Attacks
- Epsilon-Differentially Private and Fully Secure Logistic Regression on Vertically Split Data
- Decoupling Consensus and Storage in Consortium Blockchains by Erasure Codes
- A Secure and Large-Scale Multiparty Conditional Payment Scheme Based on Blockchain
- Improved Xception with Dual Attention Mechanism and Feature Fusion for Face Forgery Detection
- Evaluation of Different ML and Text Processing Techniques for Hate Speech Detection
- Moving Target Defense Strategy Selection Method Based on Long-Term Traffic Prediction
- Watermarking Pre-Trained Encoders in Contrastive Learning
- MCTrack: Multi-Head Contrastive Network for Visual Tracking
- MultiShadow: Shadow Synthesis for Multiple Virtual Objects
- IReF: Improved Residual Feature For Video Frame Deletion Forensics
- Vision and Knowledge Bimodal Fine-Grained Recognition Based on Hierarchical Structured Knowledge Extraction
- Context Feature Guided Network for Image Super-Resolution
- Calibrated Relighting Network for Image Light Transfer
- Visual Semantic SLAM Based on Examination of Moving Consistency in Dynamic Scenes
- Open-Set Pets Facial Recognition Using Deep Learning and Statistical Learning
- Recurrence Quantification Analysis for PPG/ECG-Based Subject Authentication
- RGCFace: Regularized Global Center Loss for Deep Facial Expression Recognition
- A Light Model for Corrosion Segmentation with Multi-Scale Information and CRF
- Dynamic Graph Pattern Matching in Medical Knowledge Graphs
- Temporal Knowledge Graph Reasoning Based on Graph Convolution Network
- Cultural Resource Recommender System With Knowledge Graph Convolutional Network
- Cluster Affiliation Model for Local Community Detection
- Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning
- Fast Classification of Indoor Functional Areas Based on a Pre-Trained Lightweight Network
- Behavioral Sequence Classification with Constraints
- Weighted Contiguous Sequential Pattern Mining
- Fuzzy Utility Mining on Temporal Data
- Membership Inference Countermeasure with A Partially Synthetic Data Approach
- EFDO: Solving Extensive-Form Games Based On Double Oracle
- NFSP-PER: An Efficient Sampling NFSP-Based Method with Prioritized Experience Replay
- CFDMA: A Novel Click Fraud Detection Method in Mobile Advertising
- Robust Initialization for Stereo Visual-Inertial SLAM with Polar-Based Gravity Estimation
- A Review on Serious Games for Disaster Relief
- DE with A New Population Initialization Method for the Dynamic Multidimensional Knapsack Problems
- Underwater Object Detection with Swin Transformer
- Information Entropy of Uncertainty Control: An Uncertainty Management Method in Imperfect Information Games
- LwDeepStack: A Lightweight DeepStack Based on Knowledge Distillation
- Dual Feature Fusion Trade Execution Framework with DDQN
- A Multiscale Windows Deep Learning Approach For Sensor-Based Human Activity Recogniton
- Passwordless VPN using FIDO2 Security Keys
- Intelligent Residential Demand Response Optimization under Real-Time Pricing: A Comparison of Heuristics
- Stylistic Pattern Guided Tip Extraction from Music Reviews
- Extended Grey Model Based on Particle Swarm Optimization and Its Application in Cotton Yield Prediction
- Primary Study on the Face-recognition Framework with anti-spoofing function
- Author Index.
- Notes:
- Description based on publisher supplied metadata and other sources.
- Includes index.
- ISBN:
- 1665459689
- 9781665459686
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.