Download or read book Innovative Mobile and Internet Services in Ubiquitous Computing written by Leonard Barolli and published by Springer Nature. This book was released on 2020-06-09 with total page 667 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents the latest research findings, methods and development techniques, challenges and solutions concerning UPC from both theoretical and practical perspectives, with an emphasis on innovative, mobile and Internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC), which makes it possible to create a human-oriented computing environment in which computer chips are embedded in everyday objects and interact with the physical world. Through UPC, people can go online even while moving around, thus enjoying nearly permanent access to their preferred services. Though it has the potential to revolutionize our lives, UPC also poses a number of new research challenges.
Download or read book Adversarial Machine Learning written by Aneesh Sreevallabh Chivukula and published by Springer Nature. This book was released on 2023-03-06 with total page 316 pages. Available in PDF, EPUB and Kindle. Book excerpt: A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.
Download or read book Cybersecurity and Secure Information Systems written by Aboul Ella Hassanien and published by Springer. This book was released on 2019-06-19 with total page 320 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.
Download or read book AI Machine Learning and Deep Learning written by Fei Hu and published by CRC Press. This book was released on 2023-06-05 with total page 420 pages. Available in PDF, EPUB and Kindle. Book excerpt: Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models and algorithms can actually also be used for cyber security (i.e., the use of AI to achieve security). Since AI/ML/DL security is a newly emergent field, many researchers and industry professionals cannot yet obtain a detailed, comprehensive understanding of this area. This book aims to provide a complete picture of the challenges and solutions to related security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then, the book describes many sets of promising solutions to achieve AI security and privacy. The features of this book have seven aspects: This is the first book to explain various practical attacks and countermeasures to AI systems Both quantitative math models and practical security implementations are provided It covers both "securing the AI system itself" and "using AI to achieve security" It covers all the advanced AI attacks and threats with detailed attack models It provides multiple solution spaces to the security and privacy issues in AI tools The differences among ML and DL security and privacy issues are explained Many practical security applications are covered
Download or read book Machine Learning for Data Science Handbook written by Lior Rokach and published by Springer Nature. This book was released on 2023-08-17 with total page 975 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book organizes key concepts, theories, standards, methodologies, trends, challenges and applications of data mining and knowledge discovery in databases. It first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. It also gives in-depth descriptions of data mining applications in various interdisciplinary industries.
Download or read book Innovations in Cyber Physical Systems written by Jawar Singh and published by Springer Nature. This book was released on 2021-09-09 with total page 807 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book presents a collection of peer-reviewed articles from the International Conference on Innovations in Cyber Physical Systems (ICICPS 2020). The conference provided opportunities for the presentation of new research results and discussion about them. It was also an opportunity to generation of new ideas in all CPS aspects, including theory, tools, applications, systems, test-beds and field deployments. The range of topics explored is wide, and covers security, control, optimization, machine learning, game theory, mechanism design, mobile and cloud computing, model-based design, verification, data mining/analytics, signal processing, and human-in-the-loop shared or supervisory control. This book will be useful to researchers, students, industrialist, developers, and practitioners alike.
Download or read book Artificial Intelligence and Security written by Xingming Sun and published by Springer Nature. This book was released on 2020-08-31 with total page 841 pages. Available in PDF, EPUB and Kindle. Book excerpt: This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.
Download or read book Security in Computer and Information Sciences written by Erol Gelenbe and published by Springer Nature. This book was released on 2022-06-29 with total page 145 pages. Available in PDF, EPUB and Kindle. Book excerpt: This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
Download or read book Advanced Intelligent Computing Technology and Applications written by De-Shuang Huang and published by Springer Nature. This book was released on 2023-07-30 with total page 823 pages. Available in PDF, EPUB and Kindle. Book excerpt: This three-volume set of LNCS 14086, LNCS 14087 and LNCS 14088 constitutes - in conjunction with the double-volume set LNAI 14089-14090- the refereed proceedings of the 19th International Conference on Intelligent Computing, ICIC 2023, held in Zhengzhou, China, in August 2023. The 337 full papers of the three proceedings volumes were carefully reviewed and selected from 828 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
Download or read book HCI for Cybersecurity Privacy and Trust written by Abbas Moallem and published by Springer Nature. This book was released on 2021-07-03 with total page 500 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. HCI-CPT 2021 includes a total of 30 papers; they were organized in topical sections named: usable security; security and privacy by design; user behavior analysis in cybersecurity; and security and privacy awareness.
Download or read book Artificial Intelligence in IoT and Cyborgization written by Rajesh Kumar Dhanaraj and published by Springer Nature. This book was released on 2023-10-31 with total page 191 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book introduces the concept of combining artificial intelligence (AI) and Internet of things (IoT) with real human organs to form a cybernetic organism or cyborg. It is a concept of man–machine mixture which helps in restoring or enhancing the ability of a body part by integrating some technology or artificial component with that body part. These smart artificial organs act as a substitute for real organs having various capabilities like scanning the body, detecting and transmitting the diagnostic data to machines. For example, an artificial heart is capable of monitoring the overall health of a person, and lungs can inform the doctor of abnormalities. This book benefits academic researchers and industrialist who work in the field cyborgization and IoT within human bodies.
Download or read book Formal Methods and Software Engineering written by Yi Li and published by Springer Nature. This book was released on 2023-11-09 with total page 320 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, ICFEM 2023, held in Brisbane, QLD, Australia, during November 21–24, 2023. The 13 full papers presented together with 8 doctoral symposium papers in this volume were carefully reviewed and selected from 34 submissions, the volume also contains one invited paper. The conference focuses on applying formal methods to practical applications and presents papers for research in all areas related to formal engineering methods.
Download or read book Big Data Intelligence and Computing written by Ching-Hsien Hsu and published by Springer Nature. This book was released on 2023-04-30 with total page 570 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the International Conference on Big Data Intelligence and Computing, DataCom 2022, which took place in Denarau Island, Fiji, in December 2022. The 30 full papers included in this volume were carefully reviewed and selected from 88 submissions. The papers detail big data analytics solutions, distributed computation paradigms, on-demand services, autonomic systems, and pervasive applications.
Download or read book Information Systems Security written by Venkata Ramana Badarla and published by Springer Nature. This book was released on 2022-12-10 with total page 297 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc
Download or read book Advanced Information Networking and Applications written by Leonard Barolli and published by Springer Nature. This book was released on 2020-03-27 with total page 1535 pages. Available in PDF, EPUB and Kindle. Book excerpt: This proceedings book covers the theory, design and applications of computer networks, distributed computing and information systems. Today’s networks are evolving rapidly, and there are several developing areas and applications. These include heterogeneous networking supported by recent technological advances in power wireless communications, along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations, which is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enables novel, low-cost and high-volume applications. However, implemeting these applications has sometimes been difficult due to interconnection problems. As such, different networks need to collaborate, and wired and next-generation wireless systems need to be integrated in order to develop high-performance computing solutions to address the problems arising from these networks’ complexities. This ebook presents the latest research findings, as well as theoretical and practical perspectives on the innovative methods and development techniques related to the emerging areas of information networking and applications
Download or read book Generative Adversarial Networks and Deep Learning written by Roshani Raut and published by CRC Press. This book was released on 2023-04-10 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book explores how to use generative adversarial networks in a variety of applications and emphasises their substantial advancements over traditional generative models. This book's major goal is to concentrate on cutting-edge research in deep learning and generative adversarial networks, which includes creating new tools and methods for processing text, images, and audio. A Generative Adversarial Network (GAN) is a class of machine learning framework and is the next emerging network in deep learning applications. Generative Adversarial Networks(GANs) have the feasibility to build improved models, as they can generate the sample data as per application requirements. There are various applications of GAN in science and technology, including computer vision, security, multimedia and advertisements, image generation, image translation,text-to-images synthesis, video synthesis, generating high-resolution images, drug discovery, etc. Features: Presents a comprehensive guide on how to use GAN for images and videos. Includes case studies of Underwater Image Enhancement Using Generative Adversarial Network, Intrusion detection using GAN Highlights the inclusion of gaming effects using deep learning methods Examines the significant technological advancements in GAN and its real-world application. Discusses as GAN challenges and optimal solutions The book addresses scientific aspects for a wider audience such as junior and senior engineering, undergraduate and postgraduate students, researchers, and anyone interested in the trends development and opportunities in GAN and Deep Learning. The material in the book can serve as a reference in libraries, accreditation agencies, government agencies, and especially the academic institution of higher education intending to launch or reform their engineering curriculum
Download or read book Business Intelligence for Enterprise Internet of Things written by Anandakumar Haldorai and published by Springer Nature. This book was released on 2020-06-09 with total page 289 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book discusses Internet of Things (IoT) as it relates to enterprise applications, systems, and infrastructures. The authors discuss IoT and how it’s disrupting industries such as enterprise manufacturing, enterprise transportation, enterprise smart market, enterprise utilities, and enterprise healthcare. They cover how IoT in the enterprise will have a major impact on the lives of consumers and professionals around the world and how it will change the way we think about professional and consumer networks. The book's topics include IoT enterprise system architecture, IoT enabling enterprise technologies, and IoT enterprise services and applications. Examples include enterprise on demand, market impacts, and implications on smart technologies, big data enterprise management, and future enterprise Internet design for various IoT use cases, such as share markets, healthcare, smart cities, smart environments, smart communications and smart homes.