Collaborative Computing: Networking, Applications and Worksharing
Springer International Publishing (Verlag)
978-3-031-24385-1 (ISBN)
The 57 full papers presented in the proceedings were carefully reviewed and selected from 171 submissions. The papers are organized in the following topical sections: Recommendation System; Federated Learning and application; Edge Computing and Collaborative working; Blockchain applications; Security and Privacy Protection; Deep Learning and application; Collaborative working; Images processing and recognition.
Security and Privacy Protection.- A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA.- A Visual Tool for Interactively Privacy Analysis and Preservation on Order-Dynamic Tabular Data.- Prevention of GAN-based Privacy Inferring Attacks towards Federated Learning.- ACS: An Efficient Messaging System With Strong Tracking-resistance.- Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection.- A Privacy-Preserving Lightweight Energy Data Sharing Scheme based on Blockchain for Smart Grid.- Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing.- A Stochastic Gradient Descent Algorithm Based on Adaptive Differential Privacy.- Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic.- A Secure Auction Mechanism for Task Allocation in Mobile Crowdsensing.- Deep Learning and application.- A Pareto-EfficientTask-Allocation Framework based on Deep Reinforcement Learning Algorithm in MEC.- An Adaptive Ensembled Neural Network-based Approach to IoT Device Identification.- Fine-grained Head Pose Estimation Based on 6D Rotation Representation with Multiregression Loss.- Purpose Driven Biological Lawsuit Modeling and Analysis Based on DIKWP.- Research on Depth-adaptive Dual-arm Collaborative Grasping Method.- Collaborative working.- Semantic SLAM for mobile robot with Human-In-the-Loop. -Incorporating Feature Labeling into Crowdsourcing for More Accurate Aggregation Labels.- Cost Performance Driven Multi-Request Allocation in D2D Service Provision Systems.- Collaborative Mobile Edge Computing through UPF Selection.- Deep Reinforcement Learning for Multi-UAV Exploration under Energy Constraints.- Optimization of Large-Scale Knowledge Forward Reasoning Based on OWL 2 DL Ontology.- ITAR:A Method for Indoor RFID Trajectory Automatic Recovery.- A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet.- VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.- Images processing and recognition.- Landmark Detection Based on Human Activity Recognition for Automatic Floor Plan Construction.- Facial Action Unit Detection by exploring the weak relationships between AU labels.- An improved dual-subnet lane line detection model with a channel attention mechanism for complex environments.- Facial Expression Recognition Based on Deep Spatiotemporal Attention Network.
Erscheinungsdatum | 27.01.2023 |
---|---|
Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Zusatzinfo | XX, 535 p. 211 illus., 178 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 831 g |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Schlagworte | Applications • Artificial Intelligence • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • conference proceedings • cryptography • Data Security • Engineering • Informatics • Internet • machine learning • Mathematics • Network Protocols • Network Security • Research • Signal Processing • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems |
ISBN-10 | 3-031-24385-4 / 3031243854 |
ISBN-13 | 978-3-031-24385-1 / 9783031243851 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich