𝔖 Scriptorium
✦   LIBER   ✦

📁

Big Data Technologies and Applications: 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023

✍ Scribed by Zhiyuan Tan, Yulei Wu, Min Xu


Publisher
Springer
Year
2024
Tongue
English
Leaves
198
Series
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed post-conference proceedings of the 13th International Conference on Big Data Technologies and Applications, BDTA 2023, held in Edinburgh, United Kingdom, in August 2023. The 8 full papers and 3 short papers of BDTA 2023 were selected from 23 submissions and present new advances and research results in the fields of big data technologies, collection and storage, big data management and retrieval, big data mining and approaches.

✦ Table of Contents


Preface
Organization
Contents
Main Track – Regular Papers
CTL-I: Infrared Few-Shot Learning via Omnidirectional Compatible Class-Incremental
1 Introduction
2 Related Work
2.1 Few Shot Learning
2.2 Class Incremental Learning in Infrared Images
3 Proposed Method
3.1 Preliminary
3.2 Model of CTL-I
3.3 Virtual Prototypes Assignment with Loss
3.4 Compatibility Update
4 Experiments
4.1 Implementation Details
4.2 Benchmark Comparison
4.3 Further Analysis
5 Conclusion
References
Can Federated Models Be Rectified Through Learning Negative Gradients?
1 Introduction
2 Related Work
2.1 Model Poisoning and Defending Mechanisms
2.2 Detection of Poisoned Models
2.3 Formulation of Machine Unlearning
2.4 Unlearning Federated Learning
2.5 Challenges to Federated Unlearning
3 Methodology
3.1 Experimental Data
3.2 Network Implementation
4 Experimental Results and Discussion
4.1 Federated Main Model
4.2 Retraining of Federated Main Model
5 Conclusion
References
BigText-QA: Question Answering over a Large-Scale Hybrid Knowledge Graph
1 Introduction
2 Background and Related Work
3 BigText Knowledge Graph
4 BigText Question Answering
4.1 Question-Answering Pipeline
4.2 Weighting Schemes
4.3 Similarities and Thresholds
5 Experiments
6 Result and Discussion
7 Conclusion
References
STLGCN: Spatial-Temporal Graph Convolutional Network for Long Term Traffic Forecasting
1 Introduction
2 Related Work
2.1 Graph Convolution
2.2 Graph Generation
2.3 Traffic Forecasting
3 Methods
3.1 Preliminary
3.2 Framework
3.3 Graph Generation Block
3.4 Spatial-Temporal Blocks
4 Experiments
4.1 Datasets
4.2 Baseline Algorithms
4.3 Experiment Settings
4.4 Experimental Results
5 Conclusions
References
Image Forgery Detection Using Cryptography and Deep Learning
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Summary
3.2 Image Processing
3.3 Hash Generation
4 Experimental Design
4.1 Deep Learning Experiment
5 Results and Discussion
5.1 Deep Learning Without Hashing
5.2 Deep Learning with Cryptography
5.3 Results Evaluation
6 Conclusion
References
Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
1 Introduction
1.1 Related Work
1.2 Our Contribution
2 Preliminary
2.1 Bilinear Groups
2.2 Access Structures
2.3 Linear Secret Sharing Schemes
3 System Model
3.1 Security Model
4 Our Construction
5 Our Construction with CRFs
6 Secure Analysis
6.1 Proof of RH-CPABE
6.2 Proof of RH-CPABE-CRF
7 Performance
8 Conclusion
References
IoT Attacks Countermeasures: Systematic Review and Future Research Direction
1 Introduction
1.1 Background and Statistics
1.2 Computing Survey
2 IoT Attack Countermeasures Background
2.1 Advantages of IoT Attack Countermeasures
2.2 Disadvantages of IoT Attack Countermeasures
3 Comparative Systematic Analysis of the Study
3.1 Classified by Publication Type
3.2 Classified by Publication Year
4 IoT Architecture and Its Security Challenges
4.1 Perception Layer (PL)
4.2 Middle-Ware Layer (ML)
4.3 Application Layer (AL)
4.4 Network Layer (NL)
4.5 Security Challenges and Threat Model
5 Countermeasures and Threat Models for Security Attacks in IoT
5.1 Novel IoT Attack Countermeasures
6 Future Direction, Summary and Conclusion
6.1 Conclusion
References
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
1 Introduction
2 Literature Search and Bibliometric Network
2.1 Literature Search
2.2 Bibliometric Analysis
2.3 Blockchain and Digital Forensic Bibliometric Network
3 Systematic Review
3.1 Digital Evidence
3.2 Chain of Custody
3.3 Storage Architectures
3.4 Blockchain Technology: Key Principles and Characteristics
3.5 Blockchain’s Intersection with Digital Forensics
3.6 Blockchain in Chain of Custody for Digital Evidence
3.7 Existing Frameworks and Methodology
3.8 Open-Ended Issues
4 Conclusion
References
Main Track–Short Paper and PhD Track
Forest Fire Prediction Using Multi-Source Deep Learning
1 Introduction
2 Literature Review
3 Datasets
4 Methodology
5 Experimentation and Results
6 Conclusion
References
Research on Preprocessing Process for Improved Image Generation Based on Contrast Enhancement
1 Introduction
2 Proposed Preprocessing Process
2.1 Extract Optimal Values
2.2 Generation an Image
2.3 Verifying the Quality of the Generated Image
3 Conclusion
References
An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case
1 Introduction
1.1 Challenges of Current Evidence Management Processes
2 Relevant Technologies
2.1 Blockchain and Its Feasibility for Evidence Storage
2.2 Evidence Storage Architectures
2.3 IPFS
2.4 Encryption Methods (Evidence Security and Access Control)
3 System Overview
3.1 System Requirements
3.2 System Design and Case Study
4 Conclusions
References
SECSOC Workshop
A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities
1 Introduction
1.1 Problem Statement
1.2 Our Contribution
2 Background Overview of Blockchain Technology
2.1 Ethereum
2.2 Smart Contract
3 Non-Fungible Token (NFT)
3.1 Protecting Digital Collectibles
3.2 Boosting Gaming Industry
3.3 Tokenised Stock
3.4 Protocols
3.5 Standards
3.6 Desired Properties
4 NFT Challenges
4.1 Usability Challenges
4.2 Slow Confirmation
4.3 High Gas-Prices
4.4 Data Inaccessibility
4.5 Anonymity and Privacy
4.6 Governance Consideration
4.7 Intellectual Property (IP) Right
5 Security Analysis
5.1 Cybersecurity
5.2 Spoofing
5.3 Tampering
5.4 Smart Contracts Security
5.5 Repudiation
5.6 DoS
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Big Data Technologies and Applications:
✍ Zhiyuan Tan (editor), Yulei Wu (editor), Min Xu (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the 13</span><span><sup>th </sup></span><span>International Conference on Big Data Technologies and Applications, BDTA 2023, held in Edinburgh, United Kingdom, in August 2023.<br> The 8 full papers and 3 short papers of BDTA 202

Big Data Technologies and Applications:
✍ Rui Hou; Huan Huang; Deze Zeng; Guisong Xia; Kareem Kamal A. Ghany; Hossam M. Za 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

This book constitutes the refereed post-conference proceedings of the 11th and the 12th International Conference on Big Data Technologies and Applications, BDTA 2021 and BDTA 2022, held in December 2021 and 2022. Due to COVID-19 pandemic both conferences were held virtually. The 23 full papers of BD

Big Data Technologies and Applications:
✍ Rui Hou, Huan Huang, Deze Zeng, Guisong Xia, Kareem Kamal A. Ghany, Hossam M. Za 📂 Library 📅 2023 🏛 Springer-EAI 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the 11</span><span><sup>th</sup></span><span> and the 12</span><span><sup>th</sup></span><span> International Conference on Big Data Technologies and Applications, BDTA 2021 and BDTA 2022, held in December 2021 and 2022. Due to

Big Data Technologies and Applications:
✍ Zeng Deze (editor), Huan Huang (editor), Rui Hou (editor), Seungmin Rho (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

This book constitutes the refereed post-conference proceedings of the 10<sup>th</sup> International Conference on Big Data Technologies and Applications, BDTA 2020, and the 13<sup>th</sup> International Conference on Wireless Internet, WiCON 2020, held in December 2020. Due to COVID-19 pandemic the

Big Data Technologies and Applications:
✍ Jason J. Jung, Pankoo Kim, Kwang Nam Choi 📂 Library 📅 2018 🏛 Springer International Publishing 🌐 English

<p>This book constitutes the refereed post-conference proceedings of the 8<sup>th<br></sup>International Conference on Big Data Technologies and Applications, BDTA 2017, held in Gwangju, South Korea, in November 2017. The 15 revised full papers were carefully reviewed and selected from 25 submission