International Conference on Ubiquitous Security最新文献

筛选
英文 中文
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization FedTA:基于Top-k机制和Adam优化的局部差分联邦学习
International Conference on Ubiquitous Security Pub Date : 2022-01-01 DOI: 10.1007/978-981-99-0272-9_26
Yuting Li, Guojun Wang, Tao Peng, Guanghui Feng
{"title":"FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization","authors":"Yuting Li, Guojun Wang, Tao Peng, Guanghui Feng","doi":"10.1007/978-981-99-0272-9_26","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_26","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131922668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN 基于分布式SDN弱一致性的网络取证调查方法
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_18
Xuehua Liu, Liping Ding, T. Zheng, Fang Yu, Zhen Jia, Wang Xiao
{"title":"A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN","authors":"Xuehua Liu, Liping Ding, T. Zheng, Fang Yu, Zhen Jia, Wang Xiao","doi":"10.1007/978-981-19-0468-4_18","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_18","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Search over Encrypted Educational Resources in Cloud Storage 云存储中加密教育资源的智能搜索
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_7
Qiang Zhang, Guihua Duan, Shukun Liu
{"title":"Smart Search over Encrypted Educational Resources in Cloud Storage","authors":"Qiang Zhang, Guihua Duan, Shukun Liu","doi":"10.1007/978-981-19-0468-4_7","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_7","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129365464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study 工业4.0背景下IDS安全组件的原型设计——纺织服装业案例研究
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_13
Nuno Torres, Ana Chaves, C. Toscano, Pedro Pinto
{"title":"Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study","authors":"Nuno Torres, Ana Chaves, C. Toscano, Pedro Pinto","doi":"10.1007/978-981-99-0272-9_13","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_13","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124554499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable and Controllable Data Sharing Based on Blockchain 基于区块链的可靠可控数据共享
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_17
Yipeng Zou, Tao Peng, Wentao Zhong, Kejian Guan, Guojun Wang
{"title":"Reliable and Controllable Data Sharing Based on Blockchain","authors":"Yipeng Zou, Tao Peng, Wentao Zhong, Kejian Guan, Guojun Wang","doi":"10.1007/978-981-19-0468-4_17","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_17","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud 传感器云降噪的自适应变分模态分解方法
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_33
Zhenru Huo, G. Jia, Weidong Fang, Wei Chen, Wuxiong Zhang
{"title":"A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud","authors":"Zhenru Huo, G. Jia, Weidong Fang, Wei Chen, Wuxiong Zhang","doi":"10.1007/978-981-99-0272-9_33","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_33","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125989358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection 基于方面的半监督生成在线评论垃圾邮件检测模型
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_14
Shitao Wang, Wenjun Jiang, Shuhong Chen
{"title":"An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection","authors":"Shitao Wang, Wenjun Jiang, Shuhong Chen","doi":"10.1007/978-981-99-0272-9_14","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_14","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals 一种基于反向拍卖的泛在电力终端D2D高效传输机制
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_24
Xingshen Wei, Yongjian Cao, Peng Gao, Junxian Xu
{"title":"A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals","authors":"Xingshen Wei, Yongjian Cao, Peng Gao, Junxian Xu","doi":"10.1007/978-981-19-0468-4_24","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_24","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning 安全深度强化学习的子目标分层策略
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_15
Fei Yu, Feng Gao, Yao Yuan, X. Xing, Yinglong Dai
{"title":"Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning","authors":"Fei Yu, Feng Gao, Yao Yuan, X. Xing, Yinglong Dai","doi":"10.1007/978-981-99-0272-9_15","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_15","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131239559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization 改进的布谷鸟搜索算法及其在函数优化中的应用
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_30
Song Feng, Cuina Cheng, Li Mo
{"title":"An Improved Cuckoo Search Algorithm and Its Application in Function Optimization","authors":"Song Feng, Cuina Cheng, Li Mo","doi":"10.1007/978-981-99-0272-9_30","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_30","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"30 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信