This book constitutes the proceedings of the 30th International Conference on Web Services, ICWS 2023, held as Part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, in September 2023.
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted behaviour mediated by the networks which connect them.
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.
This book constitutes the proceedings of the 30th International Conference on Web Services, ICWS 2023, held as Part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, in September 2023.
This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in safeguarding personal information.
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century - focusing (in particular) on the socio-technological transformations associated with modernism.
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century - focusing (in particular) on the socio-technological transformations associated with modernism.
This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where digital interconnectivity is paramount yet vulnerable.
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022.
This book provides a thorough and unique overview of the challenges, opportunities and solutions related with data protection in the age of AI and ML technologies.
This book provides a thorough and unique overview of the challenges, opportunities and solutions related with data protection in the age of AI and ML technologies.
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.
This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field.
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017.
This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019.
This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020.
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency.
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices.
This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where digital interconnectivity is paramount yet vulnerable.
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017.
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022.
This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.
This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field.
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain.
This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.
This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020.
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain.
This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019.
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency.
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017.
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017.