the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649530
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero Knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649479
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero Knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
the proceedings contain 33 papers. the special focus in this conference is on data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823480
the proceedings contain 33 papers. the special focus in this conference is on data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-Based Cryptographic Protocols for three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-Based Decompositions for Spatial data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for the Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script;Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains;exploring Anomaly Detection for Marine Radar Systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
the proceedings contain 33 papers. the special focus in this conference is on data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823619
the proceedings contain 33 papers. the special focus in this conference is on data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-Based Cryptographic Protocols for three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-Based Decompositions for Spatial data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for the Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script;Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains;exploring Anomaly Detection for Marine Radar Systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
For the first time, a national proficiency testing for data center power quality is organized. A verification plan is designed specifically for the operational characteristics of data centers, where all participating ...
详细信息
this study, using the Longwangxi slope in Yunyang as an example, investigates the deformation characteristics of various slope areas through field investigation, engineering analogy, and numerical simulation. the moni...
详细信息
this study, using the Longwangxi slope in Yunyang as an example, investigates the deformation characteristics of various slope areas through field investigation, engineering analogy, and numerical simulation. the monitoring plan was designed based on these analyses, with monitoring equipment deployed to collect data on surface and deep cumulative displacements in active deformation regions. the real monitoring data validated the conclusions drawn from the engineering analogy and numerical simulation. this research demonstrates that a combination of field investigation, engineering analogy, and numerical simulation can provide practical monitoring indicators and spatial layout for slope monitoring design. For deep accumulated slopes with underlying bedding bedrock, a comprehensive monitoring system that includes surface displacement, deep displacement, and rainfall should be established. the surface displacement is mainly distributed at the slope's front edge, while deep displacement is significant in the middle of the slope, where the soil-rock interface inclination is gentle, and the accumulation body is thick.
this paper explores the development of a shape-changing tangible interface capable of transitioning between four geometric forms: cylinder, triangular prism, cube, and pentagonal prism. through an iterative prototypin...
详细信息
ISBN:
(纸本)9798400711978
this paper explores the development of a shape-changing tangible interface capable of transitioning between four geometric forms: cylinder, triangular prism, cube, and pentagonal prism. through an iterative prototyping process, we developed a flexible outer shell that can change into the four mentioned geometric shapes using different discs. When this flexible shell combines with an inner multi-disc mechanism, it can create a self-contained, handheld device capable of physically representing different dimensions or categories of data. the study focuses on material exploration to produce the outer shell and the basics of the inner disc mechanism to achieve transitions between shapes, addressing boththe input and output potentials of tangible interfaces. the inner disc mechanism inspired by planetary gearsets allows the tangible to adjust its form within a small, portable configuration. the material exploration results demonstrate the feasibility of such a device after adding the multi-disc mechanism envisioned here. this shape-changing tangible device that will be finalized in the continuation of this research has potential applications in data visualization, assistive technology for the visually impaired, interactive gaming, and virtual reality. Future work aims to complete the multi-disc mechanism and automate the shape-changing capability by equipping a servo motor controlled by a microprocessor, enabling wireless control, and exploring further interactive possibilities with additional input functionalities such as buttons, touch displays, and scroll wheels.
Reducing road accidents remains a paramount concern worldwide, given their profound impact on public safety and well-being. In this paper, we propose a novel methodology for creating a labelled graph data model to pre...
详细信息
ISBN:
(纸本)9783031741852;9783031741869
Reducing road accidents remains a paramount concern worldwide, given their profound impact on public safety and well-being. In this paper, we propose a novel methodology for creating a labelled graph data model to predict accident hotspots in urban areas, leveraging accident and road network infrastructure data. the proposed methodology focuses on the creation of a labelled graph where intersections serve as nodes and road segments as arcs by associating accident data with intersections. In order to demonstrate the usability of the proposed methodology, experiments are conducted using simple Machine Learning models to predict accident hotspots, which serve to identify high-risk areas.
the proceedings contain 375 papers. the special focus in this conference is on China Electrotechnical Society. the topics include: Optimization Analysis of Ironless Linear Synchronous Motor;a Transformer Approach to C...
ISBN:
(纸本)9789819613908
the proceedings contain 375 papers. the special focus in this conference is on China Electrotechnical Society. the topics include: Optimization Analysis of Ironless Linear Synchronous Motor;a Transformer Approach to Composite Power System Risk Assessment;adaptive Model Predictive Control for Servo Motor within High-Voltage Circuit Breaker;partial Discharge Characteristics of Protrusion Defects in 35 kV Vacuum Interrupter;Underwater Image Enhancement Method Based on MuLA-GAN;lightning Current Sweep Damage Test System Based on Energy Conversion;risk Assessment of Coupled Gas-Electricity Systems Under Extreme Weather;characterization of Winding Deformation of 750 kV Transformer Under Short-Circuit Condition;analysis of Velocity Prediction Method of Electromagnetic Linear Propulsion Mechanism;study on Carbon Reduction in Public Buildings Based on Dynamic Emission Factors;Analysis of Output Admittance Characteristics and Grid-Connected Stability of three-Phase LCL Inverter in Weak Grid;A State-Dependent Switching Control of 4D Switching Model for three-Phase VSC;Research on Numerical Calculation of Transient Electric Shock Under DC Transmission Lines Based on Finite Element Bionic Model;data Center Power Quality Test Proficiency Testing Scheme and Implementation;research on Series Arc Fault Detection Method Under Mechanical Fault Condition of Motor;analysis of Electric Vehicle Charging Behavior Based on Gaussian Mixture Model Clustering;A Topology-Reconfigurable Cascaded Resonant DC-DC Converter with Inherent Voltage Balance Capability for Wide Range Applications;low Carbon Optimal Scheduling of Multi-Virtual Power Plants Based on Nash Negotiation;A Bidirectional Modular Multilevel DC-DC Converter with Inherent Voltage Balance Capability;multi-Objective Coordination and Stability Control of High Proportion Wind Power System Based on K-Domain Tuning Damping.
the proceedings contain 375 papers. the special focus in this conference is on China Electrotechnical Society. the topics include: Optimization Analysis of Ironless Linear Synchronous Motor;a Transformer Approach to C...
ISBN:
(纸本)9789819613786
the proceedings contain 375 papers. the special focus in this conference is on China Electrotechnical Society. the topics include: Optimization Analysis of Ironless Linear Synchronous Motor;a Transformer Approach to Composite Power System Risk Assessment;adaptive Model Predictive Control for Servo Motor within High-Voltage Circuit Breaker;partial Discharge Characteristics of Protrusion Defects in 35 kV Vacuum Interrupter;Underwater Image Enhancement Method Based on MuLA-GAN;lightning Current Sweep Damage Test System Based on Energy Conversion;risk Assessment of Coupled Gas-Electricity Systems Under Extreme Weather;characterization of Winding Deformation of 750 kV Transformer Under Short-Circuit Condition;analysis of Velocity Prediction Method of Electromagnetic Linear Propulsion Mechanism;study on Carbon Reduction in Public Buildings Based on Dynamic Emission Factors;Analysis of Output Admittance Characteristics and Grid-Connected Stability of three-Phase LCL Inverter in Weak Grid;A State-Dependent Switching Control of 4D Switching Model for three-Phase VSC;Research on Numerical Calculation of Transient Electric Shock Under DC Transmission Lines Based on Finite Element Bionic Model;data Center Power Quality Test Proficiency Testing Scheme and Implementation;research on Series Arc Fault Detection Method Under Mechanical Fault Condition of Motor;analysis of Electric Vehicle Charging Behavior Based on Gaussian Mixture Model Clustering;A Topology-Reconfigurable Cascaded Resonant DC-DC Converter with Inherent Voltage Balance Capability for Wide Range Applications;low Carbon Optimal Scheduling of Multi-Virtual Power Plants Based on Nash Negotiation;A Bidirectional Modular Multilevel DC-DC Converter with Inherent Voltage Balance Capability;multi-Objective Coordination and Stability Control of High Proportion Wind Power System Based on K-Domain Tuning Damping.
暂无评论