Atjaunināt sīkdatņu piekrišanu

E-grāmata: Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13656
  • Izdošanas datums: 12-Jan-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031200991
  • Formāts - EPUB+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13656
  • Izdošanas datums: 12-Jan-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031200991

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed
proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.
The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.

AMAD: Improving Adversarial Robustness Without Reducing Accuracy
1(14)
Yujie Lin
Ximeng Liu
Nan Jiang
Multi-party Secure Comparison of Strings Based on Outsourced Computation
15(16)
Xin Zhang
Chao Shan
Yunfeng Zou
Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain
31(8)
Zui Luo
Chang Chen
Wangjie Qiu
Overview of DDoS Attack Research Under SDN
39(15)
Lei Guo
Shan Jing
Chuan Zhao
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism
54(7)
Sikai Liu
Fei Wu
Jinghong Tang
Bo Li
Performance Improvement of Classification Model Based on Adversarial Sample Generation
61(14)
Qian Jiang
Jie Kang
Zhendong Wu
Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning
75(14)
Chang Liu
Chaozhong Long
Yuchuan Yu
Ziqi Lin
Federated Community Detection in Social Networks
89(15)
Zhiwei Zheng
Zekai Chen
Ximeng Liu
Nan Jiang
A Textual Adversarial Attack Scheme for Domain-Specific Models
104(14)
Jialiang Dong
Shen Wang
Longfei Wu
Huoyuan Dong
Zhitao Guan
An Improved Conv-LSTM Method for Gear Fault Detection
118(12)
Yang Zhang
Jianwu Zhang
Guanhong Zhang
Hong Li
Extracting Random Secret Key Scheme for One-Time Pad Under Intelligent Connected Vehicle
130(14)
Junjie Chu
Mu Han
Shidian Ma
Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization
144(11)
Guolin Zheng
Zuoyong Li
Wenkai Hu
Haoyi Fan
Fum Yew Ching
Zhaochai Yu
Kaizhi Chen
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part I
155(10)
Shu Gong
Gang Hua
Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network
165(15)
Simin Li
Mu Han
Dynamic Momentum for Deep Learning with Differential Privacy
180(11)
Guanbiao Lin
Hu Li
Yingying Zhang
Shiyu Peng
Yufeng Wang
Zhenxin Zhang
Jin Li
An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP
191(11)
Yuhui Huang
Xin Xie
Weiye Ning
Dengquan Wu
Zixi Li
Hao Yang
PCB Defect Detection Method Based on Improved RetinaNet
202(12)
Yusheng Xu
Xinrong Cao
Rong Hu
Pantea Keikhosrokiani
Zuoyong Li
A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning
214(14)
Xiaoyu Zhang
Ye Jin
Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province
228(10)
Shu Gong
Gang Hua
Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection
238(16)
Zhonghua Peng
Rong Hu
Fuen Wang
Haoyi Fan
Yee Wei Eng
Zuoyong Li
Liwei Zhou
DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection
254(12)
Shicheng Li
Xiaoguo Yang
Haoming Zhang
Chaoyu Zheng
Yugen Yi
A Lattice-Based Aggregate Signature Based on Revocable Identity
266(9)
Yang Cui
Huayu Cheng
Fengyin Li
Domenico Santaniello
Research and Design of an Emergency Supply Assurance Monitoring System in the Post-epidemic Context
275(8)
Yongbo Li
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion
283(16)
Fei Peng
Shao-hua Meng
Min Long
Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process
299(10)
Yiting Zhang
Ming Liu
Jianan Guo
Zhaojie Wang
Yilei Wang
Tiancai Liang
Sunil Kumar Singh
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II
309(12)
Shu Gong
Gang Hua
Xiaomei Zhang
Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks
321(14)
Lie Xu
Overlapping Community Discovery Algorithm Based on Three-Level Neighbor Node Influence
335(10)
Shishuang Chen
Guanru Huang
Sui Lin
Wenchao Jiang
Zhiming Zhao
Content-Aware Deep Feature Matching
345(10)
Weice Wang
Zuoyong Li
Xiangpan Zheng
Taotao Lai
Pantea Keikhosrokiani
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps
355(15)
Fei Peng
Xin-lin Zhang
Min Long
An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model
370(12)
Zhang Ling
Ma Zongxin
Yan MingYu
Jiang Wenchao
A Certificateless-Based Blind Signature Scheme with Message Recovery
382(8)
Xiao Li
Mengwen Wang
Fengyin Li
Fault Detection of Rolling Bearings by Using a Combination Network Model
390(10)
Tingting Chen
Guanhong Zhang
Tong Wu
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs
400(11)
Jiahui Huang
Teng Huang
Jiehua Zhang
Research on Influential Factors of Online Learning Behavior Based on Big Data
411(11)
Fangqin Ma
JunHan Qiu
Short Speech Key Generation Technology Based on Deep Learning
422(14)
Zhengyin Lv
Zhendong Wu
Juan Chen
Domain Adversarial Interaction Network for Cross-Domain Fault Diagnosis
436(11)
Weikai Lu
Jian Chen
Hao Zheng
Haoyi Fan
Eng Yee Wei
Xinrong Cao
Deyang Zhang
A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain
447(8)
Xueqing Sun
Xiao Li
Fengyin Li
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric
455(14)
Pengfei Huang
Wanqing Jie
Arthur Sandor Voundi Koe
Ruitao Hou
Hongyang Yan
Mourad Nouioua
Phan Due Thien
Jacques Mbous Ikong
Camara Lancine
Research on Key Technologies for the Trusted Perception of Network Information for Big Data
469(10)
Yuxiang Li
Fakariah Hani Mohd Ali
Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network
479(16)
Lanwei Zeng
Yudong Wang
Chang Zhu
Wenchao Jiang
Jiaxing Li
Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm
495(15)
Teng Peng
Xiaohong Wang
Towards Differentially Private Contrastive Learning
510(11)
Wenjun Li
Anli Yan
Taoyu Zhu
Teng Huang
Xuandi Luo
Shaowei Wang
Two-Stage High Precision Membership Inference Attack
521(15)
Shi Chen
Yubin Zhong
Secure Storage Method for Network Resources of Professional Works Based on Decision Tree Algorithm
536(14)
Bomei Tan
Rong Yu
Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis
550(15)
Jiaoxing Xu
A Broad Learning System Based on the Idea of Vertical Federated Learning
565(10)
Junrong Ge
Xiaojiao Wang
Fengyin Li
Akshat Gaurav
PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency
575(9)
Jianan Guo
Lei Shang
Ydei Wang
Tiancai Liang
Zhaojie Wang
Hui An
Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application
584(25)
Na Wang
Jian Jiao
Shangcheng Zhang
Jianwei Liu
Kaifa Zheng
Junsong Fu
Jiawen Qiao
A Event Extraction Method of Document-Level Based on the Self-attention Mechanism
609(12)
Xueming Qiao
Yao Tang
Yanhong Liu
Maomao Su
Chao Wang
Yansheng Fu
Xiaofang Li
Mingrui Wu
Qiang Fu
Dongjie Zhu
Author Index 621