Collaborative Computing: Networking, Applications and Worksharing -

Collaborative Computing: Networking, Applications and Worksharing

18th EAI International Conference, CollaborateCom 2022, Hangzhou, China, October 15-16, 2022, Proceedings, Part II
Buch | Softcover
XX, 535 Seiten
2023 | 1st ed. 2023
Springer International Publishing (Verlag)
978-3-031-24385-1 (ISBN)
106,99 inkl. MwSt
The two-volume set LNICST 460 and 461 constitutes the proceedings of the 18th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2022, held in Hangzhou, China, in October 2022. 
The 57 full papers presented in the proceedings were carefully reviewed and selected from 171 submissions. The papers are organized in the following topical sections: Recommendation System; Federated Learning and application; Edge Computing and Collaborative working; Blockchain applications; Security and Privacy Protection; Deep Learning and application; Collaborative working; Images processing and recognition.

Security and Privacy Protection.- A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA.- A Visual Tool for Interactively Privacy Analysis and Preservation on Order-Dynamic Tabular Data.- Prevention of GAN-based Privacy Inferring Attacks towards Federated Learning.- ACS: An Efficient Messaging System With Strong Tracking-resistance.- Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection.- A Privacy-Preserving Lightweight Energy Data Sharing Scheme based on Blockchain for Smart Grid.- Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing.- A Stochastic Gradient Descent Algorithm Based on Adaptive Differential Privacy.- Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic.- A Secure Auction Mechanism for Task Allocation in Mobile Crowdsensing.- Deep Learning and application.- A Pareto-EfficientTask-Allocation Framework based on Deep Reinforcement Learning Algorithm in MEC.- An Adaptive Ensembled Neural Network-based Approach to IoT Device Identification.- Fine-grained Head Pose Estimation Based on 6D Rotation Representation with Multiregression Loss.- Purpose Driven Biological Lawsuit Modeling and Analysis Based on DIKWP.- Research on Depth-adaptive Dual-arm Collaborative Grasping Method.- Collaborative working.- Semantic SLAM for mobile robot with Human-In-the-Loop. -Incorporating Feature Labeling into Crowdsourcing for More Accurate Aggregation Labels.- Cost Performance Driven Multi-Request Allocation in D2D Service Provision Systems.- Collaborative Mobile Edge Computing through UPF Selection.- Deep Reinforcement Learning for Multi-UAV Exploration under Energy Constraints.- Optimization of Large-Scale Knowledge Forward Reasoning Based on OWL 2 DL Ontology.- ITAR:A Method for Indoor RFID Trajectory Automatic Recovery.- A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet.- VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.- Images processing and recognition.- Landmark Detection Based on Human Activity Recognition for Automatic Floor Plan Construction.- Facial Action Unit Detection by exploring the weak relationships between AU labels.- An improved dual-subnet lane line detection model with a channel attention mechanism for complex environments.- Facial Expression Recognition Based on Deep Spatiotemporal Attention Network.

Erscheinungsdatum
Reihe/Serie Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Zusatzinfo XX, 535 p. 211 illus., 178 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 831 g
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Schlagworte Applications • Artificial Intelligence • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • conference proceedings • cryptography • Data Security • Engineering • Informatics • Internet • machine learning • Mathematics • Network Protocols • Network Security • Research • Signal Processing • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems
ISBN-10 3-031-24385-4 / 3031243854
ISBN-13 978-3-031-24385-1 / 9783031243851
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Daten importieren, bereinigen, umformen und visualisieren

von Hadley Wickham; Mine Çetinkaya-Rundel …

Buch | Softcover (2024)
O'Reilly (Verlag)
54,90
eine Einführung mit Python, Scikit-Learn und TensorFlow

von Oliver Zeigermann; Chi Nhan Nguyen

Buch | Softcover (2024)
O'Reilly (Verlag)
19,90
Das umfassende Handbuch

von Wolfram Langer

Buch | Hardcover (2023)
Rheinwerk (Verlag)
49,90