找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Safe, Secure, Ethical, Responsible Technologies and Emerging Applications; First EAI Internatio Franklin Tchakounte,Marcellin Atemkeng,Raje

[复制链接]
查看: 41184|回复: 57
发表于 2025-3-21 17:01:55 | 显示全部楼层 |阅读模式
书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
副标题First EAI Internatio
编辑Franklin Tchakounte,Marcellin Atemkeng,Rajeswari P
视频videohttp://file.papertrans.cn/861/860478/860478.mp4
丛书名称Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi
图书封面Titlebook: Safe, Secure, Ethical, Responsible Technologies and Emerging Applications; First EAI Internatio Franklin Tchakounte,Marcellin Atemkeng,Raje
描述This book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2023, held in Yaoundé, Cameroon, during October 25-27, 2023.  .The 24 full papers were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Regulations and Ethics of Artificial Intelligence, Resource-constrained Networks and Cybersecurity, Emerging Artificial Intelligence Applications, Reviews..
出版日期Conference proceedings 2024
关键词artificial intelligence; internet of things; biases correction; discrimination removal; invasion of priv
版次1
doihttps://doi.org/10.1007/978-3-031-56396-6
isbn_softcover978-3-031-56395-9
isbn_ebook978-3-031-56396-6Series ISSN 1867-8211 Series E-ISSN 1867-822X
issn_series 1867-8211
copyrightICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024
The information of publication is updating

书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影响因子(影响力)




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影响因子(影响力)学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications网络公开度




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications网络公开度学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引频次




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引频次学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用学科排名




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications读者反馈




书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:52:12 | 显示全部楼层
发表于 2025-3-22 00:59:30 | 显示全部楼层
978-3-031-56395-9ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024
发表于 2025-3-22 06:59:24 | 显示全部楼层
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications978-3-031-56396-6Series ISSN 1867-8211 Series E-ISSN 1867-822X
发表于 2025-3-22 09:31:39 | 显示全部楼层
Examining Potential Harms of Large Language Models (LLMs) in Africatural language data for training inclusive language models. This paper examines the potential harms of LLMs in Africa, covering harms already documented for the African context; harms studied and documented for the Western context, but previously unapplied to Africa; and novel potential harms based
发表于 2025-3-22 15:27:15 | 显示全部楼层
A Gamification Architecture to Enhance Phishing Awarenessotivation, and consideration of a learner’s profile. Subsequently, the problem of the best didactic means is posed with openness to the integration of artificial intelligence, the choice of the type of gamification, and the technologies that can contribute to ensuring that everyone is competent to e
发表于 2025-3-22 20:54:59 | 显示全部楼层
DIDOR: A Decentralized Identifier Based Onion Routing Protocolintains low communication overhead and latency, and does not require directory servers on which most existing protocols rely. We finally analyze the security of our protocol and demonstrate how it can withstand the denial of service attack on DID documents. Overall, this protocol represents a promis
发表于 2025-3-22 23:32:32 | 显示全部楼层
发表于 2025-3-23 03:51:28 | 显示全部楼层
Correlation Clustering Adapted for Cell Site Management of Mobile Networks in Developing Countriesity parameter. This approach makes it possible to determine the optimal number of cells to allocate to a technician to make his interventions efficient; this will minimize Operational Expenditure (OpEx) and cell downtime due to breakdowns and maximize the quality of service offered to customers.
发表于 2025-3-23 07:04:19 | 显示全部楼层
A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit ertificates, from which symmetric keys for communication between nodes are derived. We then implement the solution using TelosB sensors in the TOSSIM simulator with an AVL Tree. We evaluate the security and resilience of our proposed scheme through informal analysis and a formal model. The informal
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-20 11:20
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表