Atjaunināt sīkdatņu piekrišanu

Artificial Intelligence Security and Privacy: Second International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 182 pages, height x width: 235x155 mm, 40 Illustrations, color; 11 Illustrations, black and white; X, 182 p. 51 illus., 40 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15399
  • Izdošanas datums: 18-Jan-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819611474
  • ISBN-13: 9789819611478
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 182 pages, height x width: 235x155 mm, 40 Illustrations, color; 11 Illustrations, black and white; X, 182 p. 51 illus., 40 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15399
  • Izdošanas datums: 18-Jan-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 9819611474
  • ISBN-13: 9789819611478
This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.





The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications.
.- BadHAR: Backdoor Attacks in Federated Human Activity Recognition
Systems.

.- Fully Automated Generation Mechanism of Rootfs for Specified Operating
Systems under Linux.

.- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels.

.- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated
Learning.

.- Intelligent backpack based on ireless mobile technology.

.- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on
BERTopic: A Case Study of Hotel Management.

.- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay
Modulation.

.- Enhancing Adversarial Robustness in Object Detection via Multi-Task
Learning and Class-Aware Adversarial Training.

.- FedHKD: A Hierarchical Federated Learning Approach Integrating  lustering
and Knowledge Distillation for Non-IID Data.

.- Application of Ensemble Learning Based on High-Dimensional Features in
Financial Big Data.

.- Collaborative Framework for Dynamic Knowledge Updating and Transparent
Reasoning with Large Language Models.

.- Zero-Shot Dense Retrieval based on Query Expansion.

.- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation.

.- Generative Image Steganography Based on Latent Space Vector Coding and
Diffusion Model.