Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
This book is to provide readers with an overview of in utero Pediatrics, an interdisciplinary medicine focusing on sequential and comprehensive care for fetuses and children who have functional and/or structural disorders originated from in utero. It covers congenital disorders in cardiology, neurosurgery, urology, general surgery, endocrine genetics, and other related topics. Each chapter starts with the basic theory, illustrates clinical practices on certain congenital disorders, and summaries recent research and advances in the field. Written by experts with wealthy experiences, this case-based book will be a valuable reference for pediatricians and perinatologists, as well as those who are interested in this field.
Pediatrics. --- Paediatrics --- Pediatric medicine --- Medicine --- Children --- Diseases --- Health and hygiene
Choose an application
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems. It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features and acoustic physical attributes. First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems. This book is intended for security researchers, computer scientists and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security and audio security. Advanced-level students who are studying these topics will benefit from this book as well.
Data protection --- Biometric identification. --- Privacy. --- Biometrics. --- Law and legislation.
Choose an application
This book is to provide readers with an overview of in utero Pediatrics, an interdisciplinary medicine focusing on sequential and comprehensive care for fetuses and children who have functional and/or structural disorders originated from in utero. It covers congenital disorders in cardiology, neurosurgery, urology, general surgery, endocrine genetics, and other related topics. Each chapter starts with the basic theory, illustrates clinical practices on certain congenital disorders, and summaries recent research and advances in the field. Written by experts with wealthy experiences, this case-based book will be a valuable reference for pediatricians and perinatologists, as well as those who are interested in this field.
Paediatrics --- pediatrie
Choose an application
Choose an application
Choose an application
This book constitutes the proceedings of the Third International Conference on Science of Cyber Security, SciSec 2021, held in Shanghai, China, in August 2021. The 17 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 50 submissions. These papers cover the following subjects: Cyber Security, Detection, Machine Learning and much more.
Data protection. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. .
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- computers --- informatica --- computerbeveiliging --- architectuur (informatica) --- netwerk management
Choose an application
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. .
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Choose an application
This book constitutes the proceedings of the Third International Conference on Science of Cyber Security, SciSec 2021, held in Shanghai, China, in August 2021. The 17 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 50 submissions. These papers cover the following subjects: Cyber Security, Detection, Machine Learning and much more.
Choose an application
Listing 1 - 10 of 13 | << page >> |
Sort by
|