The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823480
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in Their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for The Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-based zkSNARK in Bitcoin Script;Homomorphic Encryption based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
Text-to-SQL systems facilitate smooth interaction with databases by translating natural language queries into Structured Query Language (SQL), bridging the gap between non-technical users and complex database manageme...
详细信息
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823619
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in Their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for The Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-based zkSNARK in Bitcoin Script;Homomorphic Encryption based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
Information Retrieval (IR) systems which provide accurate and contextually relevant information to healthcare and law etc. where accuracy is very crucial. Traditional information retrieval methods fundamentally based ...
详细信息
To avoid the "feeling out of control" caused by the redundant information of the human-computer interface to the doctor, based on the cognitive model of the doctor during the operation, the human-machine int...
详细信息
The proceedings contain 77 papers. The topics discussed include: advanced optimization techniques for electric vehicle integrated solar-hydro-thermal systems;lowering the peak to average power ratio by using the pts m...
ISBN:
(纸本)9798331513894
The proceedings contain 77 papers. The topics discussed include: advanced optimization techniques for electric vehicle integrated solar-hydro-thermal systems;lowering the peak to average power ratio by using the pts method for high-speed application systems;impact of atmospheric turbidity on terahertz communication in tropical sub-continent;solar energy based cogeneration system for improved solar energy utilization;vision transformers for retinal disease classification using optical coherence tomography images;a classification approach to UPI transaction efficiency and its impact on microbusinesses in digital India;optimal power dispatch in combined heat and power systems with solar and wind integration;and optimization of cluster head selection using bacterial foraging algorithm for energy-efficient routing in wireless body area networks.
This paper develops a Smart Public Transportation System using RFID technology, IoT integration, and a MERN-based web application for increasing the efficiency, accessibility, and user experience of urban transit syst...
详细信息
This contribution delves into the incorporation of Sustainable Development Goals (SDGs) into the computerengineering curriculum. The study addresses challenges associated with integrating SDGs as cross-cutting conten...
详细信息
As technology advances, traditional library management systems can no longer meet the needs of modern readers for efficiency and convenience. The cumbersome nature of traditional library operations has led to a declin...
详细信息
Graph data represents information efficiently and can be used to learn subsequent tasks easily. In the domain of biological science, recommender systems, social network analysis graph representation learning has becom...
详细信息
暂无评论