Machine Learning for Cyber Security -

Machine Learning for Cyber Security

4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III
Buch | Softcover
XVII, 691 Seiten
2023 | 1st ed. 2023
Springer International Publishing (Verlag)
978-3-031-20101-1 (ISBN)
106,99 inkl. MwSt
The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.
The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.

Design of Active Defense System for Railway Communication Network Based on Deep Neural Network.- Human Resource Network Information Recommendation Method Based on Machine Learning.- Machine Learning Based Abnormal Flow Analysis of University Course Teaching Network.- A Learned Multi-objective Bacterial Foraging Optimization Algorithm With Continuous Deep Q-learning.- Webpage Text Detection Based on Improved Faster-RCNN Model.- Turbo: A High-Performance and Secure Off-chain Payment Hub.- A Complete Information Detection Method for Vehicle CAN Network Gateway Based on Neural Network.- Optimization of Data Transmission Efficiency of Wireless Communication Network for Chemical Energy Monitoring.- Deep Spatio-Temporal Decision Fusion Network for Facial Expression Recognition.- A Tabu-based Multi-Objective Particle Swarm Optimization for Irregular Flight Recovery Problem.- A Robot Foreign Object Inspection Algorithm for Transmission Line Based on Improved YOLOv5.- Path Planning Algorithm based on A_star Algorithm and Q-learning Algorithm.- Belief x2 Divergence-based Dynamical Complexity Analysis for Biological Systems.- Local Feature Acquisition Method of Multi-Layer Vision Network Image Based on Virtual Reality.- Channel Selection for EEG Emotion Recognition via An Enhanced Firefly Algorithm with Brightness-distance Attraction.- Security Risk Assessment Method of High Voltage Power Communication Network Based on Fuzzy Clustering.- Trimodal fusion network combined global-local feature extraction strategy and spatial-frequency fusion strategy.- Data Security Risk Prediction of Labor Relationship Rights Protection Network Platform Based on Machine Learning.- Research on LSTM based Traffic Flow prediction adaptive beacon Transmission period and Power joint control.- Construction of Color Network Model of Folk Painting Based on Machine Learning.-Research on Intrusion Prevention Optimization Algorithm Of Power UAV Network Communication Based on Artificial Intelligence.- Designof Network Big Data Anti Attack System for Carbon Emission Measurement Based on Deep Learning.- An Efficient Particle YOLO Detector for Urine Sediment Detection.- Evolutionary Factor-Driven Concise Bacterial Foraging Optimization Algorithm for Solving Customer Clustering Problems.- Brain Storm Optimization Algorithm with Multiple Generation Strategies for Patient Data Clustering.- TGPFM: An Optimized Framework for Ordering and Transporting Raw Materials for Production.- Visual Analysis of Facial Expression Recognition Research Based on Knowledge Graph.- Brainstorming-based Large Scale Neighborhood Search for Vehicle Routing with Real Travel Time.- A SAR Image Preprocessing Algorithm Based on Improved Homomorphic Wavelet Transform and Retinex.- Medical data clustering based on multi-objective clustering algorithm.- Self-supervised Visual-Semantic Embedding Network Based on Local Label Optimization.- A New Deep Network Model for Stock Price Prediction.- A Method for Residual Network Image Classification with Multi-scale Feature Fusion.- Face morphing detection based on a two-stream network with channel attention and residual of multiple color spaces.- DU-Net: A Novel Architecture for Retinal Vessels Segmentation.- Sub-pixel level edge extraction technology for industrial parts for smart manufacturing.- USDSE: A Novel Method to Improve Service Reputation based on Double-Side Evaluation.- Morphology-based Soft Label Smoothing Strategy For Fine-grained Domain Adaptationming.- MOOC Performance Prediction and Online Design Instructional Suggestions Based on LightGBM.- MOOC Dropout Prediction Based on Bayesian Network.- Knowledge Enhanced BERT based on Corpus Associate Generation.- Multi-objective Particle Swarm Optimization based on Archive Control Strategy.- A Hybrid Multi-Objective Genetic-Particle Swarm Optimization Algorithm for Airline Crew Rostering Problem with Fairness and Satisfaction.- Plant Leaf Area Measurement Using 3D Imaging: A Comparative Study between Dynamic Structured Light Stereo and Time-of-Flight.- Subgraph matching based on Path adaptation for large-scale graph.- Photovoltaic Panel Intelligent Management and Identification Detection System based on YOLOv5.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XVII, 691 p. 306 illus., 181 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1059 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Artificial Intelligence • Communication Systems • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • Correlation Analysis • Databases • Education • Engineering • Image Analysis • Image Processing • Internet • machine learning • Mathematics • Network Protocols • Signal Processing • Telecommunication Systems • wireless telecommunication systems
ISBN-10 3-031-20101-9 / 3031201019
ISBN-13 978-3-031-20101-1 / 9783031201011
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00