Machine Learning for Cyber Security
Springer International Publishing (Verlag)
978-3-031-20098-4 (ISBN)
AMAD: Improving Adversarial Robustness Without Reducing Accuracy.- Multi-Party Secure Sharing and Comparison of Strings Based on Outsourced Computation.- Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain.- Overview of DDoS Attack Research under SDN.- A medical image segmentation method based on Residual network and channel attention mechanism.- Performance improvement of classification model based on Chinese adversarial samples generation.- Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning.- Federated Community Detection in Social Networks.- A Textual Adversarial Attack Scheme for Domain-Specific Models.- An improved Conv-LSTM method for gear fault detection.- Extracting Random Secret Key Scheme for One-time Pad under Intelligent Connected Vehicle.- Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization.- Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part I.- Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network.- Dynamic Momentum for Deep Learning with Differential Privacy.- An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP.- PCB Defect Detection Method Based on Improved RetinaNet.- A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning.- Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province.- Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection.- DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection.- A Lattice-Based Aggregate Signature Based on Revocable Identity.- Research and design of an emergency supply assurance monitoring system in the post-epidemic context.- Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion.- Optimal Revenue Analysis of the Stubborn Mining basedon Markov Decision Process.- Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II.- Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks.- Overlapping community discovery algorithm based on three-level neighbor node influence.- Content-Aware Deep Feature Matching.- F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps.- An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model.- A Certificateless-Based Blind Signature Scheme with Message Recovery.- Fault Detection of Rolling Bearings by Using A Combination Network Model.- zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs.- Research on influential factors of online learning behavior based on big data.- Short speech key generation technology based on deep learning.- Domain Adversarial Interaction Network for Cross-domain Fault Diagnosis.- A Vehicle Data Publishing System with Privacy-awares inVANETs Based on Blockchain.- Highsimb: A Concrete Blockchain High Simulation With Contract Vulnerability Detection For Ethereum and Hyperledger Fabric.- Research on key technologies for the trusted perception of network information for big data.- Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network.- Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm.- Towards Differentially Private Contrastive Learning.- Two-stage High Precision Membership Inference Attack.- Secure Storage Method for Network Resources of professional Works Based on Decision Tree Algorithm.- Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis.- A Broad Learning System Based on the Idea of Vertical Federated Learning.- PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency.- Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application.- A Event Extraction Method of Document-level based on the Self-attention Mechanism.
Erscheinungsdatum | 14.01.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XVII, 625 p. 212 illus., 142 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 960 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • cryptography • Databases • Data Mining • Data Security • Education • Engineering • Image Analysis • Image Processing • Internet • learning • machine learning • Network Protocols • Network Security • Signal Processing |
ISBN-10 | 3-031-20098-5 / 3031200985 |
ISBN-13 | 978-3-031-20098-4 / 9783031200984 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich