The security concerns in the digital world are rapidly evolving. Artificial intelligence and Machine Learning (AI&ML) techniques are not an exception from this concern. None of us wants to stay away from the comfo...
详细信息
The proceedings contain 114 papers. The topics discussed include: application of machine learning and artificial intelligence in credit risk assessment;application of artificial intelligence in computer network techno...
ISBN:
(纸本)9798350324358
The proceedings contain 114 papers. The topics discussed include: application of machine learning and artificial intelligence in credit risk assessment;application of artificial intelligence in computer network technology;research on tackle recognition of football players based on deep reinforcement learning;design of adaptive learning quantitative training algorithm based on deep neural network algorithm;smart library construction and service mode driven by big data;application of big data fusion model in the architecture design of smart departure service platform;construction of intelligent transportation information management system based on artificial intelligence technology;optimal design of UUV autonomous navigation and positioning algorithm based on TDOA positioning model;and simulation of computer network information security assessment model based on data mining.
Given the rapid strides in technology, the need for authentication andsecurity in long-distance communications has taken center stage. Particularly in the film industry, the pirated distribution of digital videos pos...
详细信息
The proceedings contain 34 papers. The special focus in this conference is on Data security and Privacy Protection. The topics include: Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained ...
ISBN:
(纸本)9789819785452
The proceedings contain 34 papers. The special focus in this conference is on Data security and Privacy Protection. The topics include: Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained Processing Approach;efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices;more Efficient Two-Stage Sampling Technique and Its Applications;enhancing Utility in Differential Privacy Models Through Feature Extraction and Knowledge Distillation;public Auditing with Aggregated Tags for Multiple Users;Append-Only Authenticated Data Sets Based on RSA Accumulator;Decentralized Real-Time IIoT Data Integrity Verification System and Its Comprehensive Analysis;efficient and Privacy-Preserving Multi-user, Multi-database and Multi-dimensional Range Query;detection and Identification of Power Quality Disturbance Signals in New Power System Based on Quantum Classic Hybrid Convolutional Neural Networks;the Framework of General Channel Key Generation Based on Physical Layer;MEMS Design Process Based Simulation and Analysis of a Hypothetical Sensor Design with Electromechanics Interface;design and Analysis of Piezoelectric Energy Harvester for Wireless Sensor Networks;ETD-SAC: A Series-Wise Auto-correlation Mechanism Based Electricity Theft Detector for Smart Grids.
The mouse is an indispensable input device that is used in the computer system. The concept of system control using hand gesture recognition. The major advantage of this concept is it reduces the direct interaction be...
详细信息
The proceedings contain 34 papers. The special focus in this conference is on Data security and Privacy Protection. The topics include: Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained ...
ISBN:
(纸本)9789819785391
The proceedings contain 34 papers. The special focus in this conference is on Data security and Privacy Protection. The topics include: Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained Processing Approach;efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices;more Efficient Two-Stage Sampling Technique and Its Applications;enhancing Utility in Differential Privacy Models Through Feature Extraction and Knowledge Distillation;public Auditing with Aggregated Tags for Multiple Users;Append-Only Authenticated Data Sets Based on RSA Accumulator;Decentralized Real-Time IIoT Data Integrity Verification System and Its Comprehensive Analysis;efficient and Privacy-Preserving Multi-user, Multi-database and Multi-dimensional Range Query;detection and Identification of Power Quality Disturbance Signals in New Power System Based on Quantum Classic Hybrid Convolutional Neural Networks;the Framework of General Channel Key Generation Based on Physical Layer;MEMS Design Process Based Simulation and Analysis of a Hypothetical Sensor Design with Electromechanics Interface;design and Analysis of Piezoelectric Energy Harvester for Wireless Sensor Networks;ETD-SAC: A Series-Wise Auto-correlation Mechanism Based Electricity Theft Detector for Smart Grids.
The paper proposes a blockchain-based management system, a solution to tackle the most substantial problems in food supply chains. The problem of transparency, and traceability is the platform's advantage. It uses...
详细信息
ISBN:
(纸本)9783031744396;9783031744402
The paper proposes a blockchain-based management system, a solution to tackle the most substantial problems in food supply chains. The problem of transparency, and traceability is the platform's advantage. It uses decentralized blockchain technology to create the traceability of final-to-end. The elements like blockchain-enabled tracking, effective warehouse management and near-time transparency for stakeholders. Through a reliable and transparent platform which allows tracking of produce and manages inventory, the solution offers a new way to record all movements of agricultural production. The platform applies UIDs for the products at the point of origin and registering them in the system which facilitates track and trace activity during the transportation, warehousing, and transfer of ownership. Holistic traceability is the result of real-time monitoring of the shipment, status, and price enabling all stakeholders have a comprehensive view of the movements. The solution plays a crucial role in the increasing farmer profits and handling the harvest more efficiently.
The computer University of Myanmar conducted a comprehensive assessment of its computer science courses to maintain its reputation for academic excellence. The study focused on gathering genuine feedback from students...
详细信息
A randomness beacon is a source of continuous and publicly verifiable randomness which is of crucial importance for many applications. Existing works on randomness beacons suffer from at least one of the following dra...
详细信息
ISBN:
(纸本)9798400706363
A randomness beacon is a source of continuous and publicly verifiable randomness which is of crucial importance for many applications. Existing works on randomness beacons suffer from at least one of the following drawbacks: (i) security only against static (i.e., non-adaptive) adversaries, (ii) each epoch takes many rounds of communication, or (iii) computationally expensive tools such as proof-of-work (PoW) or verifiable delay functions (VDF). In this work, we introduce GRandLine, the first adaptively secure randomness beacon protocol that overcomes all these limitations while preserving simplicity and optimal resilience in the synchronous network setting. We achieve our result in two steps. First, we design a novel distributed key generation (DKG) protocol GRand that runs in O(lambda n(2) logn) bits of communication but, unlike most conventional DKG protocols, outputs both secret and public keys as group elements. Here, lambda denotes the security parameter. Second, following termination of GRand, parties can use their keys to derive a sequence of randomness beacon values, where each random value costs only a single asynchronous round and O(lambda n(2)) bits of communication. We implement GRandLine and evaluate it using a network of up to 64 parties running in geographically distributed AWS instances. Our evaluation shows that GRandLine can produce about 2 beacon outputs per second in a network of 64 parties. We compare our protocol to the state-of-the-art randomness beacon protocols OptRand (ndSS '23), BRandPiper (CCS '21), and Drand, in the same setting and observe that it vastly outperforms them.
Wireless Body Area Networks (WBANs) are a subcategory of WSNs that have been developed to support health care solutions such as blood pressure, heart rate, and endoscopic capsules. Such technologies have their benefit...
详细信息
暂无评论