default search action
4th ML4CS 2022: Guangzhou, China - Volume 1
- Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li:
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13655, Springer 2023, ISBN 978-3-031-20095-3 - Amin Fu, Jishun Ma, Chuansheng Wang, Changen Zhou, Zuoyong Li, Shenghua Teng:
Traditional Chinese Medicine Health Status Identification with Graph Attention Network. 1-14 - Bowen Xue, Huifen Zhong, Junrui Lu, Tianwei Zhou, Ben Niu:
Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence. 15-26 - Tianxin Huang, Lingjun Zhao, Zeyang Dai, Liang Lin, Huakun Huang:
Privacy Preserving CSI Fingerprint Device-Free Localization. 27-39 - Haichao Wu, Xiaoming Liu, Wei Ou:
A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing Model. 40-56 - Peng Lin, Changsheng Dou, Nannan Gu, Zhiyuan Shi, Lili Ma:
Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference. 57-71 - Fan Jiang, Yuanlong Cao, Jianmao Xiao, Hui Yi, Gang Lei, Min Liu, Shuiguang Deng, Hao Wang:
VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts. 72-86 - Jinyang Wang, Tao Wang, Min Gan, George Hadjichristofi:
Robust Remote Sensing Scene Classification with Multi-view Voting and Entropy Ranking. 87-98 - Lingqian Zheng, Xinrong Cao:
Visualized Analysis of the Emerging Trends of Automated Audio Description Technology. 99-108 - Weiye Ning, Xin Xie, Yuhui Huang, Si Yu, Zhao Li, Hao Yang:
Anomaly Detection for Multi-time Series with Normalizing Flow. 109-117 - Yanning Zhang:
Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis. 118-132 - Hongyu Guo, Mao Chen, Wei Ou:
A Lightweight NFT Auction Protocol for Cross-chain Environment. 133-146 - Zhongzheng Huang, Tao Wang, Yuanzheng Cai, Lingyu Liang:
A Multi-scale Framework for Out-of-Distribution Detection in Dermoscopic Images. 147-159 - Li Chen, Yongjin Wang, Jia Liu, Lijing Tan:
Swarm Intelligence for Multi-objective Portfolio Optimization. 160-169 - Huiling Liu:
Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology. 170-184 - Xiaoxue Zhang, Xiuhua Zhou, Kongyang Chen:
Data Leakage with Label Reconstruction in Distributed Learning Environments. 185-197 - Haiying Chen, Jiahui Zou:
Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural Network. 198-212 - Xiuen Wu, Tao Wang, Lingyu Liang, Zuoyong Li, Fum Yew Ching:
Spatio-Temporal Context Modeling for Road Obstacle Detection. 213-227 - Dianxin Wang, Tian Chen, Zheng Zhang, Nan Zhang:
A Survey of Android Malware Detection Based on Deep Learning. 228-242 - Chunhua Kong, Kai Ma, Jiatong Wei:
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Network. 243-256 - Mingting Liu, Xiaozhang Liu, Anli Yan, Yuan Qi, Wei Li:
Explanation-Guided Minimum Adversarial Attack. 257-270 - Yangyang Zhao, Fuyuan Xiao:
CIFD: A Distance for Complex Intuitionistic Fuzzy Set. 271-280 - Jiajuan Fang:
Security Evaluation Method of Distance Education Network Nodes Based on Machine Learning. 281-295 - Jing Liu, Jingci Zhang, Changcun Du, Dianxin Wang:
MUEBA: A Multi-model System for Insider Threat Detection. 296-310 - Shen Jiang, Hailan Zhang:
Bayesian Based Security Detection Method for Vehicle CAN Bus Network. 311-325 - Yuan Qi, Xiaozhang Liu, Hua Li, Mingting Liu, Wei Li:
Discrete Wavelet Transform-Based CNN for Breast Cancer Classification from Histopathology Images. 326-340 - Hui Du:
Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process. 341-355 - Ben Niu, Yuda Wang, Jia Liu, Qianying Liu:
Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem. 356-365 - Zhengjian Duan:
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm. 366-379 - Mei Hong, Yingyong Zou, Chun Ai:
Large Scale Network Intrusion Detection Model Based on FS Feature Selection. 380-393 - Jiatong Wei, Kai Ma, Chunhua Kong:
Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN Gateway. 394-408 - Huoyuan Dong, Jialiang Dong, Shuai Yuan, Zhitao Guan:
Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective. 409-424 - Nansen Wang, Wenbao Han, Wei Ou:
A Novel Security Scheme for Mobile Healthcare in Digital Twin. 425-441 - Guoqiang Zhao, Meitao Zhang, Yingying Wu:
Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining Data. 442-456 - Xuanwei Lin, Chen Dong, Ximeng Liu, Dong Cheng:
Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain. 457-471 - Shengqi Wu, Lianyong Qi, Yuwen Liu, Yihong Yang, Ying Miao, Fei Dai:
Diverse Web APIs Recommendation with Privacy-preservation for Mashup Development. 472-485 - Shuilan Song, Xinjiu Liang:
Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine Learning. 486-500 - Ning Li, Nansen Wang, Wei Ou, Wenbao Han:
FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning. 501-515 - Fei Wu, Sikai Liu, Bo Li, Jinghong Tang:
Increase Channel Attention Based on Unet++ Architecture for Medical Images. 516-520 - Ying Miao, Lianyong Qi, Haoyang Wu, Yuxin Tian, Shengqi Wu, Yuqing Wang, Fei Dai, Shaoqi Ding:
Distributed Power Load Missing Value Forecasting with Privacy Protection. 521-534 - Jianchen Lin, Yanqing Yao:
Differentially Private Generative Model with Ratio-Based Gradient Clipping. 535-549 - Mingyang Ma, Hongyong Yang, Fei Liu:
Differential Privacy Protection Algorithm for Data Clustering Center. 550-559 - Caixin Wang, Lili Wang, Hongyong Yang:
Improved Kmeans Algorithm Based on Privacy Protection. 560-567 - Yujie Li, Benying Tan, Shuxue Ding, Christian Desrosiers, Ahmad Chaddad:
Symmetry Structured Analysis Sparse Coding for Key Frame Extraction. 568-585 - Xiaoxue Zhang, Junhao Li, Jianjie Zhang, Jijie Yan, Enmin Zhu, Kongyang Chen:
Data Reconstruction from Gradient Updates in Federated Learning. 586-596 - Jinwen Xin, Xixiang Lyu, Jing Ma:
Natural Backdoor Attacks on Speech Recognition Models. 597-610 - Jiahui Wu, Zuoyong Li, Pantea Keikhosrokiani, Yuanzheng Cai:
Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction. 611-623 - Ziyu Zheng, HaoRan Chen, Ke Peng:
AP-GCL: Adversarial Perturbation on Graph Contrastive Learning. 624-633 - Lu Liu, Jie Yang, Yaoyuan Zhang, Jingci Zhang, Yuxi Ma:
An Overview of Opponent Modeling for Multi-agent Competition. 634-648 - Gebiao Hu, Zhichi Lin, Zheng Guo, Ruiqing Xu, Xiao Zhang:
Research on Potential Threat Identification Algorithm for Electric UAV Network Communication. 649-663
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.