Atjaunināt sīkdatņu piekrišanu

E-grāmata: Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13655
  • Izdošanas datums: 12-Jan-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031200960
  • Formāts - EPUB+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13655
  • Izdošanas datums: 12-Jan-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031200960

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed
proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.

The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Traditional Chinese Medicine Health Status Identification with Graph Attention Network
1(14)
Amin Fu
Jishun Ma
Chuansheng Wang
Changen Zhou
Zuoyong Li
Shenghua Teng
Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence
15(12)
Bowen Xue
Huifen Zhong
Junrui Lu
Tianwei Zhou
Ben Niu
Privacy Preserving CSI Fingerprint Device-Free Localization
27(13)
Tianxin Huang
Lingjun Zhao
Zeyang Dai
Liang Lin
Huakun Huang
A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing Model
40(17)
Haichao Wu
Xiaoming Liu
Wei Ou
Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference
57(15)
Peng Lin
Changsheng Dou
Nannan Gu
Zhiyuan Shi
Lili Ma
VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts
72(15)
Fan Jiang
Yuanlong Cao
Jianmao Xiao
Hui Yi
Gang Lei
Min Liu
Shuiguang Deng
Hao Wang
Robust Remote Sensing Scene Classification with Multi-view Voting and Entropy Ranking
87(12)
Jinyang Wang
Tao Wang
Min Can
George Hadjichristofi
Visualized Analysis of the Emerging Trends of Automated Audio Description Technology
99(10)
Lingqian Zheng
Xinrong Cao
Anomaly Detection for Multi-time Series with Normalizing Flow
109(9)
Weiye Ning
Xin Xie
Yuhui Huang
Si Yu
Zhao Li
Hao Yang
Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis
118(15)
Yanning Zhang
A Lightweight NFT Auction Protocol for Cross-chain Environment
133(14)
Hongyu Guo
Mao Chen
Wei Ou
A Multi-scale Framework for Out-of-Distribution Detection in Dermoscopic Images
147(13)
Zhongzheng Huang
Tao Wang
Yuanzheng Cai
Lingyu Liang
Swarm Intelligence for Multi-objective Portfolio Optimization
160(10)
Li Chen
Yongjin Wang
Jia Liu
Lijing Tan
Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology
170(15)
Huiling Liu
Data Leakage with Label Reconstruction in Distributed Learning Environments
185(13)
Xiaoxue Zhang
Xiuhua Zhou
Kongyang Chen
Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural Network
198(15)
Haiying Chen
Jiahui Zou
Spatio-Temporal Context Modeling for Road Obstacle Detection
213(15)
Xiuen Wu
Tao Wang
Lingyu Liang
Zuoyong Li
Fum Yew Ching
A Survey of Android Malware Detection Based on Deep Learning
228(15)
Dianxin Wang
Tian Chen
Zheng Zhang
Nan Zhang
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Network
243(14)
Chunhua Kong
Kai Ma
Jiatong Wei
Explanation-Guided Minimum Adversarial Attack
257(14)
Mingting Liu, Xiaozhang Liu, Anli Yan, Yuan Qi, and Wei Li CIFD: A Distance for Complex Intuitionistic Fuzzy Set
271(10)
Yangyang Zhao
Fuyuan Xiao
Security Evaluation Method of Distance Education Network Nodes Based on Machine Learning
281(15)
Jiajuan Fang
MUEBA: A Multi-model System for Insider Threat Detection
296(15)
Jing Liu
Jingci Zhang
Changcun Du
Dianxin Wang
Bayesian Based Security Detection Method for Vehicle CAN Bus Network
311(15)
Shen Jiang
Hailan Zhang
Discrete Wavelet Transform-Based CNN for Breast Cancer Classification from Histopathology Images
326(15)
Yuan Qi
Xiaozhang Liu
Hua Li
Mingting Liu
Wei Li
Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process
341(15)
Hid Du
Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem
356(10)
Ben Niu
Yuda Wang
Jia Liu
Qianying Liu
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm
366(14)
Zhengjian Duan
Large Scale Network Intrusion Detection Model Based on FS Feature Selection
380(14)
Mei Hong
Yingyong Zou
Chun Ai
Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN Gateway
394(15)
Jiatong Wei
Kai Ma
Chunhua Kong
Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective
409(16)
Huoyuan Dong
Jialiang Dong
Shuai Yuan
Zhitao Guan
A Novel Security Scheme for Mobile Healthcare in Digital Twin
425(17)
Nansen Wang
Wenbao Han
Wei Ou
Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining Data
442(15)
Guoqiang Zhao
Meitao Zhang
Yingying Wu
Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain
457(15)
Xuanwei Lin
Chen Dong
Ximeng Liu
Dong Cheng
Diverse Web APIs Recommendation with Privacy-preservation for Mashup Development
472(14)
Shengqi Wu
Lianyong Qi
Yuwen Liu
Yihong Yang
Ying Miao
Fei Dai
Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine Learning
486(15)
Shuilan Song
Xinjiu Liang
FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning
501(15)
Ning Li
Nansen Wang
Wei Ou
Wenbao Han
Increase Channel Attention Based on Unet++ Architecture for Medical Images
516(5)
Fei Wu
Sikai Liu
Bo Li
Jinghong Tang
Distributed Power Load Missing Value Forecasting with Privacy Protection
521(14)
Ying Miao
Lianyong Qi
Haoyang Wu
Yuxin Tian
Shengqi Wu
Yuqing Wang
Fei Dai
Shaoqi Ding
Differentially Private Generative Model with Ratio-Based Gradient Clipping
535(15)
Jianchen Lin
Yanqing Yao
Differential Privacy Protection Algorithm for Data Clustering Center
550(10)
Mingyang Ma
Hongyong Yang
Fei Liu
Improved Kmeans Algorithm Based on Privacy Protection
560(8)
Caixin Wang
Lili Wang
Hongyong Yang
Symmetry Structured Analysis Sparse Coding for Key Frame Extraction
568(18)
Yujie Li
Benying Tan
Shuxue Ding
Christian Desrosiers
Ahmad Chaddad
Data Reconstruction from Gradient Updates in Federated Learning
586(11)
Xiaoxue Zhang
Junhao Li
Jianjie Zhang
Jijie Yan
Enmin Zhu
Kongyang Chen
Natural Backdoor Attacks on Speech Recognition Models
597(14)
Jinwen Xin
Xixiang Lyu
Jing Ma
Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction
611(13)
Jiahui Wu
Zuoyong Li
Pantea Keikhosrokiani
Yuanzheng Cai
AP-GCL: Adversarial Perturbation on Graph Contrastive Learning
624(10)
ZiYu Zheng
HaoRan Chen
Ke Peng
An Overview of Opponent Modeling for Multi-agent Competition
634(15)
Lit Liu
Jie Yang
Yaoyuan Zhang
Jingci Zhang
Yuxi Ma
Research on Potential Threat Identification Algorithm for Electric UAV Network Communication
649(16)
Gebiao Hu
Zhichi Lin
Zheng Guo
Ruiqing Xu
Xiao Zhang
Author Index 665