دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. نویسندگان: Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang سری: Lecture Notes in Computer Science 12486 ISBN (شابک) : 9783030622220, 9783030622237 ناشر: Springer International Publishing;Springer سال نشر: 2020 تعداد صفحات: 674 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 66 مگابایت
کلمات کلیدی مربوط به کتاب یادگیری ماشین برای امنیت سایبری: سومین کنفرانس بین المللی، ML4CS 2020، گوانگژو، چین، 8 تا 10 اکتبر 2020، مجموعه مقالات، قسمت اول: علوم کامپیوتر، اپلیکیشن کامپیوتر در علوم اجتماعی و رفتاری، کامپیوتر و آموزش، کامپیوتر و جامعه
در صورت تبدیل فایل کتاب Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب یادگیری ماشین برای امنیت سایبری: سومین کنفرانس بین المللی، ML4CS 2020، گوانگژو، چین، 8 تا 10 اکتبر 2020، مجموعه مقالات، قسمت اول نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این مجموعه کتاب سه جلدی مجموعه مقالات سومین کنفرانس بینالمللی یادگیری ماشین برای امنیت سایبری، ML4CS 2020 است که در شیان، چین در اکتبر 2020 برگزار شد.
118 مقاله کامل و 40 مقاله کوتاه ارائه شده بودند. به دقت بررسی و از بین 360 مورد ارسالی انتخاب شد. این مقالات طیف گسترده ای از موضوعات زیر را ارائه می دهند: یادگیری ماشینی، امنیت، حفظ حریم خصوصی، امنیت سایبری، یادگیری ماشینی متخاصم، تشخیص و تجزیه و تحلیل بدافزار، داده کاوی، و هوش مصنوعی.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi’an, China in October 2020.
The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
Front Matter ....Pages i-xxvii
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation (Ming Wan, Jinfang Li, Hao Luo, Kai Wang, Yingjie Wang, Bailing Wang)....Pages 1-11
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations (Xuetao Zhang, Jinshuang Wang, Meng Sun, Yao Feng)....Pages 12-25
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model (Weijie Han, Jingfeng Xue, Fuquan Zhang, Yingfeng Zhang)....Pages 26-34
A Malware Classification Method Based on the Capsule Network (Ziyu Wang, Weijie Han, Yue Lu, Jingfeng Xue)....Pages 35-49
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning (Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li)....Pages 50-64
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network (Juan Wang, Meng Wang, Guanxiang Yin, Yuejin Zhang)....Pages 65-72
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network for Effective Cyber Intrusion Detection (Yiguang Gong, Yunping Liu, Chuanyang Yin, Zhiyong Fan)....Pages 73-88
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs (Yaming Zhang, Yan Liu)....Pages 89-99
A Scientometric Analysis of Malware Detection Research Based on CiteSpace (Budong Xu, Yongqin Li, Xiaomei Yu)....Pages 100-110
Malware Detection Based on Static and Dynamic Features Analysis (Budong Xu, Yongqin Li, Xiaomei Yu)....Pages 111-124
Classification of Malware Variant Based on Ensemble Learning (Hui Guo, Shu-guang Huang, Min Zhang, Zu-lie Pan, Fan Shi, Cheng Huang et al.)....Pages 125-139
Detection of Malicious Domains in APT via Mining Massive DNS Logs (Lu Huang, Jingfeng Xue, Weijie Han, Zixiao Kong, Zequn Niu)....Pages 140-152
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting (Qian Xie, Zheng Huang, Jie Guo, Weidong Qiu)....Pages 153-159
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network (Meng Zhao, Chen Jin, Lingmin Jin, Shenghua Teng, Zuoyong Li)....Pages 160-169
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network (Lingmin Jin, Rui Ma, Meng Zhao, Shenghua Teng, Zuoyong Li)....Pages 170-179
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things (Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad)....Pages 180-194
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices (Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen)....Pages 195-205
Machine Learning Agricultural Application Based on the Secure Edge Computing Platform (Wu Fan, Zhuoqun Xu, Huanghe Liu, Zhu Zongwei)....Pages 206-220
QoS Investigation for Power Network with Distributed Control Services (Shen Jin, Xuesong Liang, Hao Tian)....Pages 221-233
Fog Server Placement for Multimodality Data Fusion in Neuroimaging (Xuan Yan, Xiaolong Xu, Yu Zheng, Fei Dai)....Pages 234-248
Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance (Yuanshan Liu, Hongyong Yang, Yize Yang, Yuling Li)....Pages 249-261
Towards Privacy-Preserving Aggregated Prediction from SPDZ (Qi Zhao, Bo Zhang, Anli Yan, Shan Jing, Chuan Zhao)....Pages 262-271
A Secure Neural Network Prediction Model with Multiple Data Providers (Fengtian Kuang, Bo Mi, Darong Huang)....Pages 272-286
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility (Zhenfei Chen, Tianqing Zhu, Chenguang Wang, Wei Ren, Ping Xiong)....Pages 287-296
A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations (Ting Yan, Dan Li)....Pages 297-306
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks (Zhenwei Chen, Yinghui Zhang, Gang Han, Jiangyong He, Rui Guo, Dong Zheng)....Pages 307-316
Deep Learning Algorithms Design and Implementation Based on Differential Privacy (Xuefeng Xu, Yanqing Yao, Lei Cheng)....Pages 317-330
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning (Xiaosong Zhang, Ling Pang, Linhong Guo, Yuanzhang Li)....Pages 331-339
An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm (Xianfu Cheng, Yanqing Yao, Ao Liu)....Pages 340-354
Recommender Systems with Condensed Local Differential Privacy (Ao Liu, Yanqing Yao, Xianfu Cheng)....Pages 355-365
Exploiting Bluetooth to Enquire Close Contacts Without Privacy Leakage (Suhang Wang, Chen Wang, Jian Xu)....Pages 366-375
A Differentially Private Random Decision Tree Classifier with High Utility (Datong Wu, Taotao Wu, Xiaotong Wu)....Pages 376-385
Research on Blind Signature Based Anonymous Electronic Cash Scheme (Ying Wang, Haojia Zhu, Fengyin Li)....Pages 386-392
A Verifiable E-Lottery Scheme (Yin Zhang, Fanglin An, Kejie Zhao, Jun Ye)....Pages 393-401
Re-Training and Parameter Sharing with the Hash Trick for Compressing Convolutional Neural Networks (Xu Gou, Linbo Qing, Yi Wang, Mulin Xin)....Pages 402-416
Survey on Privacy-Preserving Machine Learning Protocols (Ruidi Yang)....Pages 417-425
Efficient Privacy-Preserving Binary Tree Search (Ruidi Yang, Maohua Sun)....Pages 426-436
Privacy-Preserving Classification of Personal Data with Fully Homomorphic Encryption: An Application to High-Quality Ionospheric Data Prediction (Zheng Li, Maohua Sun)....Pages 437-446
An Improved Method for Data Storage Based on Blockchain Smart Contract (Dongxiang Song, Mingju Yuan)....Pages 447-460
Security Problems and Countermeasures of Network Accounting Information System (Yanling Hu)....Pages 461-469
Analysis on Industrial Internet Traffic Characteristics (Shiyu Chen, Qianmu Li, Huaqiu Long, Jian Jiang)....Pages 470-483
User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality (Ting Liu, Guanghui Yan, Gang Cai, Qiong Wang, Mingjie Yang)....Pages 484-499
Attack and Repair Strategies for Computer Network About Viruses (Sheng Hong, Yue Wang)....Pages 500-510
Vulnerability Variants and Matching in Networks (Meihui Lan, Wei Gao)....Pages 511-518
A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline (Xiangxiang Jiang, Yuxi Ma, Gang Zhao, Xiaohui Kuang, Yuanzhang Li, Ruyun Zhang)....Pages 519-529
A Novel Method of Network Security Situation Assessment Based on Evidential Network (Xiang Li, Xinyang Deng, Wen Jiang)....Pages 530-539
Research and Application of Digital Signature Technology (Yanli Wang, Ying Zheng, Fengyin Li)....Pages 540-546
A Low Energy-Consuming Security Data Aggregation Protocol (Hui Dou, Yuling Chen, Yangyang Long, Yuanchao Tu)....Pages 547-557
Research on Blockchain-Based Identity Authentication Scheme in Social Networks (Xinying Yu, Rui Ge, Fengyin Li)....Pages 558-565
A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy (Xinyu Zhang, YuJun Liu, Yuling Chen, Zhan Wang)....Pages 566-577
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model (Haining Yang, Ye Su, Jing Qin, Jinhua Ma, Huaxiong Wang)....Pages 578-592
A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold (Wei Tang, Yu-Ling Chen, Yun Yang)....Pages 593-606
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing (Jiming Wang, Xueshuo Xie, Yaozheng Fang, Ye Lu, Tao Li, Guiling Wang)....Pages 607-622
A Secure and Moderate Data Synchronization Method Based on Network Isolation (Bing Zhang, Zhiyong Guo, Yangdan Ni, Meng Yang, Ruiying Cheng, Yu Xiao)....Pages 623-633
Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring (Shuai Zhang, Fuyou Miao)....Pages 634-643
Back Matter ....Pages 645-650