Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Backdoor Attacks against Learning-Based Algorithms
  • Language: en
  • Pages: 161

Backdoor Attacks against Learning-Based Algorithms

None

New Directions of Modern Cryptography
  • Language: en
  • Pages: 392

New Directions of Modern Cryptography

  • Type: Book
  • -
  • Published: 2012-12-06
  • -
  • Publisher: CRC Press

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents

Artificial Intelligence for Communications and Networks
  • Language: en
  • Pages: 589

Artificial Intelligence for Communications and Networks

  • Type: Book
  • -
  • Published: 2019-07-04
  • -
  • Publisher: Springer

This two-volume set LNICST 286-287 constitutes the post-conference proceedings of the First EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019, held in Harbin, China, in May 2019. The 93 full papers were carefully reviewed and selected from 152 submissions. The papers are organized in topical sections on artificial intelligence, mobile network, deep learning, machine learning, wireless communication, cognitive radio, internet of things, big data, communication system, pattern recognition, channel model, beamforming, signal processing, 5G, mobile management, resource management, wireless position.

Computer Security – ESORICS 2022
  • Language: en
  • Pages: 749

Computer Security – ESORICS 2022

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Wireless Algorithms, Systems, and Applications
  • Language: en
  • Pages: 661

Wireless Algorithms, Systems, and Applications

  • Type: Book
  • -
  • Published: 2019-06-20
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.

Wireless Algorithms, Systems, and Applications
  • Language: en
  • Pages: 874

Wireless Algorithms, Systems, and Applications

  • Type: Book
  • -
  • Published: 2015-07-31
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015, held in Qufu, Shandong, China, in August 2015. The 36 revised full papers presented together with 5 revised short papers and 42 invited papers were carefully reviewed and selected from 133 initial submissions. The papers present current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks. .

AI, Machine Learning and Deep Learning
  • Language: en
  • Pages: 347

AI, Machine Learning and Deep Learning

  • Type: Book
  • -
  • Published: 2023-06-05
  • -
  • Publisher: CRC Press

Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on ...

Wireless Algorithms, Systems, and Applications
  • Language: en
  • Pages: 929

Wireless Algorithms, Systems, and Applications

  • Type: Book
  • -
  • Published: 2017-06-09
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 12th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2017, held in Guilin, China, in June 2017.The 70 full papers and 9 short papers presented in this book werde carefully reviewed and selected from 238 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.

Ubiquitous Security
  • Language: en
  • Pages: 571

Ubiquitous Security

This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

Encoding Bioethics
  • Language: en
  • Pages: 247

Encoding Bioethics

Encoding Bioethics addresses important ethical concerns from the perspective of each of the stakeholders who will develop, deploy, and use artificial intelligence systems to support clinical decisions. Utilizing an applied ethical model of patient-centered care, this book considers the viewpoints of programmers, health system and health insurance leaders, clinicians, and patients when AI is used in clinical decision-making. The authors build on their respective experiences as a surgeon-bioethicist and a surgeon-AI developer to give the reader an accessible account of the relevant ethical considerations raised when AI systems are introduced into the physician-patient relationship.