Machine Learning for Cyber Security

Machine Learning for Cyber Security

4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I

Teng, Huang; Cai, Jun; Yan, Hongyang; Li, Jin; Xu, Yuan

Springer International Publishing AG

01/2023

669

Mole

Inglês

9783031200953

15 a 20 dias

1056

Descrição não disponível.
Traditional Chinese Medicine Health Status Identification with Graph Attention Network.- "Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence".- Privacy Preserving CSI Fingerprint Device-Free Localization.- A Novel Blockchain-MEC-based Near-domain Medical Resource Sharing Model.- Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference.- VDDL: A Deep Learning-based Vulnerability Detection Model for Smart Contracts.- "Robust Remote Sensing Scene Classification with Multi-View Voting and Entropy Ranking".- Visualized analysis of the emerging trends of automated audio description technology.- Anomaly Detection for Multi-Time Series with Normalizing Flow.- Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis.- "A Lightweight NFT Auction Protocol for Cross-chain Environment".- "A Multi-Scale Framework for Out-of-Distribution Detection in Dermoscopic Images".- Swarm Intelligence for Multi-objective Portfolio Optimization.- Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology.- "Data Leakage with Label Reconstruction in Distributed Learning Environments".- Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural Network.- "Spatio-Temporal Context Modeling for Road Obstacle Detection".- A Survey of Android Malware Detection Based on Deep Learning.- "Information Encryption Transmission Method of Automobile Communication Network Based on Neural Network".- Explanation-Guided Minimum Adversarial Attack.- CIFD: A Distance for Complex Intuitionistic Fuzzy Set.- Security Evaluation Method of Distance Education Network Nodes Based on Machine Learning.- "MUEBA:A Multi-Model System for Insider Threat Detection".- "Bayesian Based Security Detection Method for Vehicle CAN Bus Network".- "Discrete Wavelet Transform-based CNN for Breast Cancer Classification from Histopathology Images".- "Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process".- Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem.- A Method for Residual Network Image Classification with Multi-scale Feature Fusion.- "High Voltage Power Communication Network Security Early Warning and Monitoring System Based on Hmac Algorithm".- "Large Scale Network Intrusion Detection Model Based on FS Feature Selection".- "Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN Gateway".- Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective.- A Novel Security Scheme for Mobile Healthcare in Digital Twin.- Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining Data.- Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain.- Diverse Web APIs Recommendation with Privacy-preservation for Mashup Development.- Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine Learning.- FedTD?Efficiently share telemedicine data with federated distillation learning.- Increase channel attention based on Unet++ architecture for medical images.- Distributed Power Load Missing Value Forecasting with Privacy Protection.- Differentially Private Generative Model with Ratio-based Gradient Clipping.- Differential privacy protection algorithm for data clustering center.- Improved Kmeans algorithm based on privacy protection.- Symmetry Structured Analysis Sparse Coding for Key Frame Extraction.- Data Reconstruction from Gradient Updates in Federated Learning.- Natural Backdoor Attacks on Speech Recognition Models.- Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction.- AP-GCL:Adversarial perturbation ongraph contrastive learning .- An Overview of Opponent Modeling for Multi-agent Competition.- Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;computer networks;computer science;computer security;computer systems;computer vision;cryptography;data security;databases;education;engineering;internet;learning;machine learning;mathematics;network protocols;network security;privacy;signal processing;telecommunication systems