Atnaujinkite slapukų nuostatas

El. knyga: Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 13655
  • Išleidimo metai: 12-Jan-2023
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031200960
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 13655
  • Išleidimo metai: 12-Jan-2023
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031200960

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed
proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.

The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
Traditional Chinese Medicine Health Status Identification with Graph Attention Network
1(14)
Amin Fu
Jishun Ma
Chuansheng Wang
Changen Zhou
Zuoyong Li
Shenghua Teng
Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence
15(12)
Bowen Xue
Huifen Zhong
Junrui Lu
Tianwei Zhou
Ben Niu
Privacy Preserving CSI Fingerprint Device-Free Localization
27(13)
Tianxin Huang
Lingjun Zhao
Zeyang Dai
Liang Lin
Huakun Huang
A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing Model
40(17)
Haichao Wu
Xiaoming Liu
Wei Ou
Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference
57(15)
Peng Lin
Changsheng Dou
Nannan Gu
Zhiyuan Shi
Lili Ma
VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts
72(15)
Fan Jiang
Yuanlong Cao
Jianmao Xiao
Hui Yi
Gang Lei
Min Liu
Shuiguang Deng
Hao Wang
Robust Remote Sensing Scene Classification with Multi-view Voting and Entropy Ranking
87(12)
Jinyang Wang
Tao Wang
Min Can
George Hadjichristofi
Visualized Analysis of the Emerging Trends of Automated Audio Description Technology
99(10)
Lingqian Zheng
Xinrong Cao
Anomaly Detection for Multi-time Series with Normalizing Flow
109(9)
Weiye Ning
Xin Xie
Yuhui Huang
Si Yu
Zhao Li
Hao Yang
Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis
118(15)
Yanning Zhang
A Lightweight NFT Auction Protocol for Cross-chain Environment
133(14)
Hongyu Guo
Mao Chen
Wei Ou
A Multi-scale Framework for Out-of-Distribution Detection in Dermoscopic Images
147(13)
Zhongzheng Huang
Tao Wang
Yuanzheng Cai
Lingyu Liang
Swarm Intelligence for Multi-objective Portfolio Optimization
160(10)
Li Chen
Yongjin Wang
Jia Liu
Lijing Tan
Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology
170(15)
Huiling Liu
Data Leakage with Label Reconstruction in Distributed Learning Environments
185(13)
Xiaoxue Zhang
Xiuhua Zhou
Kongyang Chen
Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural Network
198(15)
Haiying Chen
Jiahui Zou
Spatio-Temporal Context Modeling for Road Obstacle Detection
213(15)
Xiuen Wu
Tao Wang
Lingyu Liang
Zuoyong Li
Fum Yew Ching
A Survey of Android Malware Detection Based on Deep Learning
228(15)
Dianxin Wang
Tian Chen
Zheng Zhang
Nan Zhang
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Network
243(14)
Chunhua Kong
Kai Ma
Jiatong Wei
Explanation-Guided Minimum Adversarial Attack
257(14)
Mingting Liu, Xiaozhang Liu, Anli Yan, Yuan Qi, and Wei Li CIFD: A Distance for Complex Intuitionistic Fuzzy Set
271(10)
Yangyang Zhao
Fuyuan Xiao
Security Evaluation Method of Distance Education Network Nodes Based on Machine Learning
281(15)
Jiajuan Fang
MUEBA: A Multi-model System for Insider Threat Detection
296(15)
Jing Liu
Jingci Zhang
Changcun Du
Dianxin Wang
Bayesian Based Security Detection Method for Vehicle CAN Bus Network
311(15)
Shen Jiang
Hailan Zhang
Discrete Wavelet Transform-Based CNN for Breast Cancer Classification from Histopathology Images
326(15)
Yuan Qi
Xiaozhang Liu
Hua Li
Mingting Liu
Wei Li
Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process
341(15)
Hid Du
Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem
356(10)
Ben Niu
Yuda Wang
Jia Liu
Qianying Liu
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm
366(14)
Zhengjian Duan
Large Scale Network Intrusion Detection Model Based on FS Feature Selection
380(14)
Mei Hong
Yingyong Zou
Chun Ai
Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN Gateway
394(15)
Jiatong Wei
Kai Ma
Chunhua Kong
Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective
409(16)
Huoyuan Dong
Jialiang Dong
Shuai Yuan
Zhitao Guan
A Novel Security Scheme for Mobile Healthcare in Digital Twin
425(17)
Nansen Wang
Wenbao Han
Wei Ou
Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining Data
442(15)
Guoqiang Zhao
Meitao Zhang
Yingying Wu
Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain
457(15)
Xuanwei Lin
Chen Dong
Ximeng Liu
Dong Cheng
Diverse Web APIs Recommendation with Privacy-preservation for Mashup Development
472(14)
Shengqi Wu
Lianyong Qi
Yuwen Liu
Yihong Yang
Ying Miao
Fei Dai
Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine Learning
486(15)
Shuilan Song
Xinjiu Liang
FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning
501(15)
Ning Li
Nansen Wang
Wei Ou
Wenbao Han
Increase Channel Attention Based on Unet++ Architecture for Medical Images
516(5)
Fei Wu
Sikai Liu
Bo Li
Jinghong Tang
Distributed Power Load Missing Value Forecasting with Privacy Protection
521(14)
Ying Miao
Lianyong Qi
Haoyang Wu
Yuxin Tian
Shengqi Wu
Yuqing Wang
Fei Dai
Shaoqi Ding
Differentially Private Generative Model with Ratio-Based Gradient Clipping
535(15)
Jianchen Lin
Yanqing Yao
Differential Privacy Protection Algorithm for Data Clustering Center
550(10)
Mingyang Ma
Hongyong Yang
Fei Liu
Improved Kmeans Algorithm Based on Privacy Protection
560(8)
Caixin Wang
Lili Wang
Hongyong Yang
Symmetry Structured Analysis Sparse Coding for Key Frame Extraction
568(18)
Yujie Li
Benying Tan
Shuxue Ding
Christian Desrosiers
Ahmad Chaddad
Data Reconstruction from Gradient Updates in Federated Learning
586(11)
Xiaoxue Zhang
Junhao Li
Jianjie Zhang
Jijie Yan
Enmin Zhu
Kongyang Chen
Natural Backdoor Attacks on Speech Recognition Models
597(14)
Jinwen Xin
Xixiang Lyu
Jing Ma
Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction
611(13)
Jiahui Wu
Zuoyong Li
Pantea Keikhosrokiani
Yuanzheng Cai
AP-GCL: Adversarial Perturbation on Graph Contrastive Learning
624(10)
ZiYu Zheng
HaoRan Chen
Ke Peng
An Overview of Opponent Modeling for Multi-agent Competition
634(15)
Lit Liu
Jie Yang
Yaoyuan Zhang
Jingci Zhang
Yuxi Ma
Research on Potential Threat Identification Algorithm for Electric UAV Network Communication
649(16)
Gebiao Hu
Zhichi Lin
Zheng Guo
Ruiqing Xu
Xiao Zhang
Author Index 665