The proceedings contain 35 papers. The topics discussed include: a survey of weakly-supervised semantic segmentation;privacy analysis of federated learning via dishonest servers;a new method of construction of permuta...
ISBN:
(纸本)9798350312935
The proceedings contain 35 papers. The topics discussed include: a survey of weakly-supervised semantic segmentation;privacy analysis of federated learning via dishonest servers;a new method of construction of permutation trinomials with coefficients 1;cross-consensus measurement of individual-level decentralization in blockchains;an expert knowledge generation model in smart contract vulnerability fuzzing;cyber-attack detection using secret sharing schemes;exploring downvoting in blockchain-based online social media platforms;inventory big data management for internet of things based on privacy preserving;securitizing microcredits using blockchain;an efficient transformer with distance-aware attention;application of profiled analysis to ADC-based remote side-channel attacks;and an individual-differences-based method for discovering viewpoints on interactive behavior.
The proceedings contain 174 papers. The topics discussed include: analyzing the effects of driving experience on backing maneuvers based on data collected by eye-tracking devices;recommendation algorithm based on soci...
ISBN:
(纸本)9798350304602
The proceedings contain 174 papers. The topics discussed include: analyzing the effects of driving experience on backing maneuvers based on data collected by eye-tracking devices;recommendation algorithm based on social information and global average matrix decomposition;data analytics for dependable transportation systems in a smart city;stabilizing technology for online user dynamics by controlling one-way weights of links;a novel feature extraction technique for ECG arrhythmia classification using ml;fault-tolerant data aggregation with error-checking for smart grids;characterization of execution time variability in FPGA-based ai-accelerators;an improved deep learning-based approach to urban weather radar echo extrapolation;balanced hashgraph based on dynamic MCMC: efficient, practical and compatible;a blockchain of blockchains structure based on asset trading scheme;and research on malicious traffic detection based on word embedding algorithms and neural networks.
The proceedings contain 185 papers. The topics discussed include: wearable IMU based gait quality quantitative evaluation method;quantum computing approach for energy optimization in a prosumer community;raising citiz...
ISBN:
(纸本)9781665462976
The proceedings contain 185 papers. The topics discussed include: wearable IMU based gait quality quantitative evaluation method;quantum computing approach for energy optimization in a prosumer community;raising citizens and institutions awareness of environmental problems using smart sensing technologies;event detection in financial markets;design-space exploration of quantized transposed convolutional neural networks for FPGA-based systems-on-chip;seamless sensor data acquisition for the edge-to-cloud continuum;occupancy prediction in buildings: an approach leveraging LSTM and federated learning;lightweight model by iterative momentum pruning scheme for channel reduction;a deep reinforcement learning based approach for intelligent reconfigurable surface elements selection;exploiting mobility data to forecast Covid-19 spread;machine learning methods for microwave imaging in cancer detection;and physical activity recognition using deep transfer learning with convolutional neural networks.
The proceedings contain 39 papers. The topics discussed include: an insider threat detection method based on heterogeneous graph embedding;predicting relations in sg-cim model based on graph structure and semantic inf...
ISBN:
(纸本)9781665480697
The proceedings contain 39 papers. The topics discussed include: an insider threat detection method based on heterogeneous graph embedding;predicting relations in sg-cim model based on graph structure and semantic information;a semantic analysis-based method for smart contract vulnerability;overview of blockchain and cloud service integration;a Russian hate speech corpus for cybersecurity applications;modeling learner behavior analysis based on educational big data and dynamic Bayesian network;remote audit scheme of embedded device software based on TPM;practical verifiable computation on encrypted data;high-performance distributed feature storage and consumption services in power grid scenarios;job scheduling on edge and cloud servers;and disk failure prediction based on SW-disk feature engineering.
A hybrid multi cloud integrates infrastructure components of on-premises, private, and public cloud sources into one centralized, distributed computing environment. Hybrid multi cloudsecurity must operate at all leve...
详细信息
ISBN:
(纸本)9798350385939;9798350385922
A hybrid multi cloud integrates infrastructure components of on-premises, private, and public cloud sources into one centralized, distributed computing environment. Hybrid multi cloudsecurity must operate at all levels of the distributed network and must be resilient to external threats. Since there is a continuous data exchange between different layers, any gap in privileges and insecure communications can expose vital sensitive data to unauthorized access and loss, leading to data breach. Data governance with dispersed logging and monitoring capabilities leads to inefficient audit trails. In this paper we are presenting a factual study and statistical evaluation on the importance of data categorization as a tool for sensitive data in such an environment, data integrity during data life cycle status changes and escalation of privileges highlighting the missed security compliances. The paper also proposes few methodologies like a centralised status management monitor, event based data synchronisation, centralised master data distribution, integration testing automation and the best practices to be considered by the product teams for a secured product.
In the realm of cloudcomputing, the task of configuring access control policies is a critical aspect of ensuring security of cloud resources. However, policy configuration remains a complex task with a high cognitive...
详细信息
ISBN:
(纸本)9798350375367
In the realm of cloudcomputing, the task of configuring access control policies is a critical aspect of ensuring security of cloud resources. However, policy configuration remains a complex task with a high cognitive load as it requires a simultaneous understanding of the cloud environment and security requirements of the organization. This often creates gaps between intended and actual policy configuration leading to misconfigurations of policies. A misconfigured policy can introduce subtle and unexpected vulnerabilities that can be exploited by malicious entities to gain unauthorized access to cloud resources. In this paper, we model and analyze a particular class of access control vulnerabilities that arise due to the creation of covert channels in role-based access control policies. We present a tool CovertHunter that uses a Large Language Model to recognize intent behind policy configuration described in natural language and check it against actual cloud policies to automatically detect vulnerabilities arising due to the presence of covert channels.
Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized the entire industry with their extraordinary power, and gained traction in the cloud community. Deploying LLM workloads in cloud has become i...
详细信息
ISBN:
(纸本)9798350377149;9798350377132
Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized the entire industry with their extraordinary power, and gained traction in the cloud community. Deploying LLM workloads in cloud has become increasingly common nowadays, as cloud easily fulfills their requirement on extensive computing resources. There are already tools (such as Kubernetes) that help simplify the management of Artificial Intelligence (AI) workloads, yet LLMs often require the balancing of multi-dimensional demands, which can be hard to handle by basic tools. This paper introduces an AI-aware orchestration framework that optimizes LLM performance from aspects including scheduling, scaling, and advanced data management. It can improve the cost-efficiency of the LLM workloads while ensuring its performance, while ensuring the absence of common security risks, supported by Intel hardware.
Information Technology plays a pivotal role in the modern business landscape, facilitating efficient operations and communication. However, the increasing reliance on IT systems also exposes organizations to various s...
详细信息
With the rapid development of the cutting edge cloudcomputing technology, millions of vulnerabilities have been identified, there is a growing concern that organizations should devote plenty of time and lots of resou...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
With the rapid development of the cutting edge cloudcomputing technology, millions of vulnerabilities have been identified, there is a growing concern that organizations should devote plenty of time and lots of resources to secure. The overarching objective of remediation is to prioritize the vulnerabilities. Hence, define the severity and the urgency of the vulnerabilities and remediate them automatically is very important. Although the recognized Common Vulnerability Scoring System (CVSS) 4.0 method addresses this issues partly, they are difficult to be implemented in practices on the cloud because of the complication and lack of risk based factors. To this end, we propose a Cost-effective Massive Automation Method of Vulnerability Analysis and Remediation Based on cloud Native Framework. Specifically, considering that the current CVSS is more like a severity of vulnerabilities, we design a novel formula to define the urgency of vulnerabilities. The formula takes the advantaged of the capabilities of modern cloud-based infrastructure and simplifies the CVSS. Besides, we propose an algorithm of risk reduction by leveraging the cloud native security capabilities, which cut down unnecessary patching time and workload. Particularly, in order to remediation the risk on the cloud, we implement an automatic scheme to harden the vulnerabilities by invoking the cloud native APIs based on the security Orchestration, Automation and Response (SOAR) platform. Finally, we conduct comprehensive experiments to evaluate our system. Experimental results demonstrate the effectiveness of ours approach has a high ratio of urgency risk recognition of 99.24%. Meanwhile, ours approach shows a maximum risk reduction by downgrade the fixable vulnerability with a average of 79% risk reduction rate in application level and 99% of risk reduction rate in operating system level respectively. As a result, our approach lightens the workload of patching greatly in the real cloudcomputing environ
With the rapid development of geographic location technology and the explosive growth of data, a large amount of spatial data is outsourced to the cloud server for reducing the local high storage and computing burdens...
详细信息
With the rapid development of geographic location technology and the explosive growth of data, a large amount of spatial data is outsourced to the cloud server for reducing the local high storage and computing burdens, but at the same time causes security issues. Thus, extensive privacy-preserving spatial data query schemes have been proposed. Most of the existing schemes use Asymmetric Scalar-Product-Preserving Encryption (ASPE) to encrypt data, but ASPE has proven to be insecure against known plaintext attack. And the existing schemes require users to provide more information about query range and thus generate a large amount of ciphertexts, which causes high storage and computational burdens. To solve these issues, based on enhanced ASPE designed in our conference version, we first propose a basic Privacy-preserving Spatial Data Query (PSDQ) scheme by using a new unified index structure, which only requires users to provide less information about query range. Then, we propose an enhanced PSDQ scheme (PSDQ$<^>+$+) by using Geohash-based $R$R-tree structure (called $GR$GR-tree) and efficient pruning strategy, which greatly reduces the query time. Formal security analysis proves that our schemes achieve Indistinguishability under Chosen Plaintext Attack (IND-CPA), and extensive experiments demonstrate that our schemes are efficient in practice.
暂无评论