Artificial Intelligence Security and Privacy (Record no. 87453)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06237nam a22006375i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-99-9785-5 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171220.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240203s2024 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789819997855 |
-- | 978-981-99-9785-5 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.3 |
245 10 - TITLE STATEMENT | |
Title | Artificial Intelligence Security and Privacy |
Sub Title | First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XV, 595 p. 167 illus., 147 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Fine-grained Searchable Encryption Scheme -- Fine-grained Authorized Secure Deduplication with Dynamic Policy -- Deep Multi-Image Hiding with Random Key -- Member Inference Attacks in Federated Contrastive Learning -- A network traffic anomaly detection method based on shapelet and KNN -- DFaP: Data Filtering and Purification Against Backdoor Attacks -- A Survey of Privacy Preserving Subgraph Matching Method -- The Analysis of Schnorr Multi-Signatures and the Application to AI -- Active Defense against Image Steganography -- Strict Differentially Private Support Vector Machines with Dimensionality Reduction -- Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight -- Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions -- From Passive Defense to Proactive Defence: Strategies and Technologies -- Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision -- Multimodal fatigue detectionin drivers via physiological and visual signals -- Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense -- FedCMK: An Efficient Privacy-Preserving Federated Learning Framework -- An embedded cost learning framework based on cumulative gradient -- An Assurance Case Practice of AI-enabled Systems on Maritime Inspection -- Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification -- A Verifiable Dynamic Multi-Secret Sharing Obfuscation Scheme Applied to Data LakeHouse -- DZIP: A Data Deduplication-Compatible Enhanced Version of Gzip -- Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security -- Adversarial Attacks against Object Detection in Remote Sensing Images -- Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm -- Post-quantum Dropout-resilient Aggregation for Federated Learning via Lattice-basedPRF -- Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication -- IoT-Inspired Education 4.0 Framework for Higher Education and Industry Needs -- Multi-agent Reinforcement Learning Based User-Centric Demand Response with Non-Intrusive Load Monitoring -- Decision Poisson: From universal gravitation to offline reinforcement learning -- SSL-ABD:An Adversarial Defense MethodAgainst Backdoor Attacks in Self-supervised Learning -- Personalized Differential Privacy in the Shuffle Model -- MKD: Mutual Knowledge Distillation for Membership Privacy Protection -- Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm -- KEP: Keystroke Evoked Potential for EEG-based User Authentication -- Verifiable Secure Aggregation Protocol under Federated Learning -- Electronic voting privacy protection scheme based on double signature in Consortium Blockchain -- Securing 5G Positioning via Zero Trust Architecture -- Email Reading Behavior-informed Machine Learning Model to Predict Phishing Susceptibility. . |
520 ## - SUMMARY, ETC. | |
Summary, etc | This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023. The 40 regular papers and 23 workshop papers presented in this two-volume set were carefully reviewed and selected from 115 submissions. Topics of interest include, e.g., attacks and defence on AI systems; adversarial learning; privacy-preserving data mining; differential privacy; trustworthy AI; AI fairness; AI interpretability; cryptography for AI; security applications. . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
700 1# - AUTHOR 2 | |
Author 2 | Vaidya, Jaideep. |
700 1# - AUTHOR 2 | |
Author 2 | Gabbouj, Moncef. |
700 1# - AUTHOR 2 | |
Author 2 | Li, Jin. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-99-9785-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Privacy. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Services. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1611-3349 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.