International Symposium on Security and Privacy in Social Networks and Big Data最新文献

筛选
英文 中文
The Impact of Synthetic Data on Membership Inference Attacks 合成数据对隶属推理攻击的影响
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_6
Md Sakib Nizam Khan, S. Buchegger
{"title":"The Impact of Synthetic Data on Membership Inference Attacks","authors":"Md Sakib Nizam Khan, S. Buchegger","doi":"10.1007/978-981-99-5177-2_6","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_6","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption 基于区块链和属性加密的政府数据安全共享
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_21
Daling Shi, C. Cao, Jun Ye
{"title":"Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption","authors":"Daling Shi, C. Cao, Jun Ye","doi":"10.1007/978-981-19-7242-3_21","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_21","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure and Efficient Data Processing for Cloud Computing with Fine-Grained Access Control 基于细粒度访问控制的云计算安全高效数据处理
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_11
JingJing Wang, Hao Feng, Zheng Yu, Rongtao Liao, Shi Chen, Ting Liang
{"title":"Secure and Efficient Data Processing for Cloud Computing with Fine-Grained Access Control","authors":"JingJing Wang, Hao Feng, Zheng Yu, Rongtao Liao, Shi Chen, Ting Liang","doi":"10.1007/978-981-99-5177-2_11","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_11","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved (t, n)-Threshold Proxy Signature Scheme 改进的(t, n)阈值代理签名方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_1
Yaodong Zhang, Feng Liu
{"title":"Improved (t, n)-Threshold Proxy Signature Scheme","authors":"Yaodong Zhang, Feng Liu","doi":"10.1007/978-981-19-7242-3_1","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_1","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133638481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Publicly Verifiable Private Set Intersection from Homomorphic Encryption 同态加密中的公开可验证私有集交集
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_8
Yuting Jiang, Jianghong Wei, Jing-Ling Pan
{"title":"Publicly Verifiable Private Set Intersection from Homomorphic Encryption","authors":"Yuting Jiang, Jianghong Wei, Jing-Ling Pan","doi":"10.1007/978-981-19-7242-3_8","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_8","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115201903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection 基于特征选择的SDN控制器DDoS攻击检测与防御
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_16
Yan Xu, Yongming Liu, Jinxing Ma
{"title":"Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection","authors":"Yan Xu, Yongming Liu, Jinxing Ma","doi":"10.1007/978-981-19-7242-3_16","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_16","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113981916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Privacy-Harming Social Media Posts in Italian 意大利社交媒体上伤害隐私帖子的检测
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_12
Federico Peiretti, R. Pensa
{"title":"Detection of Privacy-Harming Social Media Posts in Italian","authors":"Federico Peiretti, R. Pensa","doi":"10.1007/978-981-99-5177-2_12","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_12","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm Substitution Attacks on Identity-Based Encryption 基于身份加密的算法替换攻击
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_2
Yifei Wang, Yuliang Lin, Yi Wang, Wei-dun Peng, Lin Liu
{"title":"Algorithm Substitution Attacks on Identity-Based Encryption","authors":"Yifei Wang, Yuliang Lin, Yi Wang, Wei-dun Peng, Lin Liu","doi":"10.1007/978-981-19-7242-3_2","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_2","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Common Features of Fake News by Multi-Head-Attention 多头关注法提取假新闻共性特征
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_2
T. Ishimaru, M. Mimura
{"title":"Extracting Common Features of Fake News by Multi-Head-Attention","authors":"T. Ishimaru, M. Mimura","doi":"10.1007/978-981-99-5177-2_2","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_2","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"48 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory Privacy Protection Scheme for Different Travel Modes 不同出行方式的轨迹隐私保护方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-7913-1_10
Yanzi Li, Jing Zhang, Pengzhao Gao, Sitong Shi
{"title":"Trajectory Privacy Protection Scheme for Different Travel Modes","authors":"Yanzi Li, Jing Zhang, Pengzhao Gao, Sitong Shi","doi":"10.1007/978-981-16-7913-1_10","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_10","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信