Narrow your search

Library

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

ULiège (3)

VIVES (3)

ULB (2)

VUB (1)


Resource type

book (4)


Language

English (4)


Year
From To Submit

2024 (4)

Listing 1 - 4 of 4
Sort by

Book
Blockchain-Based Data Security in Heterogeneous Communications Networks
Authors: ---
ISBN: 3031524772 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions. Discusses the need for decentralized data security approaches in heterogeneous communications networks (HCN); Presents solutions applicable and practical for real-world applications; Investigates HCN data security approaches such as reliable data provenance, transparent data query, and fair data marketing.


Book
Decentralized Privacy Preservation in Smart Cities
Authors: ---
ISBN: 3031540751 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities and privacy challenges and discuss the benefits of adopting decentralized trust models in achieving privacy preservation. The authors then give a comprehensive review of fundamental decentralized techniques and privacy-preserving cryptographic techniques. The next four chapters each detail a decentralized trust-based scheme, focusing respectively on privacy-preserving identity management, cross-domain authentication, data analytics, and data search, in specific use cases. Finally, the book explores open issues and outlines future research directions in the field of decentralized privacy preservation. Discusses benefits and challenges of applying decentralized trusts in smart cities Provides scheme designs and security analysis for use cases in smart cities, offering insights into applications Includes cryptographic knowledge accompanied by practical algorithm and protocol implementations.


Book
Blockchain-Based Data Security in Heterogeneous Communications Networks
Authors: --- ---
ISBN: 9783031524776 Year: 2024 Publisher: Cham Springer Nature Switzerland :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Backdoor Attacks against Learning-Based Algorithms
Authors: --- --- ---
ISBN: 9783031573897 3031573897 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Listing 1 - 4 of 4
Sort by