0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,035 Discovery Miles 40 350 Ships in 12 - 17 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Improving Image Quality in Visual Cryptography (Hardcover, 1st ed. 2020): Bin Yan, Yong Xiang, Guang Hua Improving Image Quality in Visual Cryptography (Hardcover, 1st ed. 2020)
Bin Yan, Yong Xiang, Guang Hua
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.

China Cultural and Creative Industries Reports 2013 (Hardcover, 2014 ed.): Hardy Yong Xiang, Patricia Ann Walker China Cultural and Creative Industries Reports 2013 (Hardcover, 2014 ed.)
Hardy Yong Xiang, Patricia Ann Walker
R3,347 Discovery Miles 33 470 Ships in 12 - 17 working days

This collection provides access to up to date, very high quality research and critical perspectives on China s CCIs on an industry by industry basis. Industries dealt with by this collection include: advertising, architecture, art and antiques, computer games, crafts, design, designer fashion, film and video, music, performing arts, publishing, software, TV and radio, digital media. The collection combines recently translated work by acknowledged experts on individual sectors of the creative industries from within China with more critical work by internationally-based experts on China s CCIs and their implications beyond China. The collection draws on the expertise of research academics and of industry based practitioners. China s Creative and Cultural Industries Reports is a Lens on China providing fresh, new material and perspectives on a key area of cultural and economic development in one of the world s fastest growing economies. Publication in the form of a collection, which could be sold in multiple of traditional and digital formats, either as a volume or as individual reports, makes it possible for readers to select the format most relevant to their interests. "

Privacy-Preserving in Edge Computing (Paperback, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Paperback, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,180 Discovery Miles 41 800 Ships in 10 - 15 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Improving Image Quality in Visual Cryptography (Paperback, 1st ed. 2020): Bin Yan, Yong Xiang, Guang Hua Improving Image Quality in Visual Cryptography (Paperback, 1st ed. 2020)
Bin Yan, Yong Xiang, Guang Hua
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.

China Cultural and Creative Industries Reports 2013 (Paperback, Softcover reprint of the original 1st ed. 2014): Hardy Yong... China Cultural and Creative Industries Reports 2013 (Paperback, Softcover reprint of the original 1st ed. 2014)
Hardy Yong Xiang, Patricia Ann Walker
R3,265 Discovery Miles 32 650 Ships in 10 - 15 working days

This collection provides access to up to date, very high quality research and critical perspectives on China's CCIs on an industry by industry basis. Industries dealt with by this collection include: advertising, architecture, art and antiques, computer games, crafts, design, designer fashion, film and video, music, performing arts, publishing, software, TV and radio, digital media. The collection combines recently translated work by acknowledged experts on individual sectors of the creative industries from within China with more critical work by internationally-based experts on China's CCIs and their implications beyond China. The collection draws on the expertise of research academics and of industry based practitioners. China's Creative and Cultural Industries Reports is a Lens on China providing fresh, new material and perspectives on a key area of cultural and economic development in one of the world's fastest growing economies. Publication in the form of a collection, which could be sold in multiple of traditional and digital formats, either as a volume or as individual reports, makes it possible for readers to select the format most relevant to their interests.

Blind Source Separation - Dependent Component Analysis (Paperback, 2015 ed.): Yong Xiang, Dezhong Peng, Zuyuan Yang Blind Source Separation - Dependent Component Analysis (Paperback, 2015 ed.)
Yong Xiang, Dezhong Peng, Zuyuan Yang
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

This book provides readers a complete and self-contained set of knowledge about dependent source separation, including the latest development in this field. The book gives an overview on blind source separation where three promising blind separation techniques that can tackle mutually correlated sources are presented. The book further focuses on the non-negativity based methods, the time-frequency analysis based methods, and the pre-coding based methods, respectively.

Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases (Paperback, 1st ed. 2022):... Privacy Preservation in IoT: Machine Learning Approaches - A Comprehensive Survey and Use Cases (Paperback, 1st ed. 2022)
Youyang Qu, Longxiang Gao, Shui Yu, Yong Xiang
R1,410 Discovery Miles 14 100 Ships in 12 - 17 working days

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (Paperback, 1st ed. 2019): Yushu Zhang, Yong Xiang, Leo... Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (Paperback, 1st ed. 2019)
Yushu Zhang, Yong Xiang, Leo Yu Zhang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.

Digital Audio Watermarking - Fundamentals, Techniques and Challenges (Paperback, 1st ed. 2017): Yong Xiang, Guang Hua, Bin Yan Digital Audio Watermarking - Fundamentals, Techniques and Challenges (Paperback, 1st ed. 2017)
Yong Xiang, Guang Hua, Bin Yan
R1,716 Discovery Miles 17 160 Ships in 10 - 15 working days

This book offers comprehensive coverage on the most important aspects of audio watermarking, from classic techniques to the latest advances, from commonly investigated topics to emerging research subdomains, and from the research and development achievements to date, to current limitations, challenges, and future directions. It also addresses key topics such as reversible audio watermarking, audio watermarking with encryption, and imperceptibility control methods. The book sets itself apart from the existing literature in three main ways. Firstly, it not only reviews classical categories of audio watermarking techniques, but also provides detailed descriptions, analysis and experimental results of the latest work in each category. Secondly, it highlights the emerging research topic of reversible audio watermarking, including recent research trends, unique features, and the potentials of this subdomain. Lastly, the joint consideration of audio watermarking and encryption is also reviewed. With the help of this concept, more secure audio watermarking systems can be developed, which meet the requirements for security and privacy in cloud-based networks and systems. Accordingly, the book serves as a tutorial suitable for readers with a general knowledge of audio signal processing as well as experts in related areas, helping these readers understand the basic principles and the latest advances, concepts and applications of audio watermarking.

Location Privacy in Mobile Applications (Paperback, 1st ed. 2018): Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang Location Privacy in Mobile Applications (Paperback, 1st ed. 2018)
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Township Violence And The End Of…
Gary Kynoch Paperback R330 R258 Discovery Miles 2 580
Killing Karoline - A Memoir
Sara-Jayne King Paperback  (1)
R325 R279 Discovery Miles 2 790
Imtiaz Sooliman And The Gift Of The…
Shafiq Morton Paperback  (1)
R320 R250 Discovery Miles 2 500
100 Mandela Moments
Kate Sidley Paperback R250 R200 Discovery Miles 2 000
Iron In The Soul - The Leaders Of The…
F. A. Mouton Paperback  (1)
R99 Discovery Miles 990
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland Paperback  (4)
R320 R256 Discovery Miles 2 560
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R24 Discovery Miles 240
Comfort
Yotam Ottolenghi, Helen Goh Hardcover R795 R570 Discovery Miles 5 700
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier Paperback R320 R250 Discovery Miles 2 500
Twice The Glory - The Making Of The…
Lloyd Burnard, Khanyiso Tshwaku Paperback R325 R219 Discovery Miles 2 190

 

Partners