default search action
4th ML4CS 2022: Guangzhou, China - Volume 2
- Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li:
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13656, Springer 2023, ISBN 978-3-031-20098-4 - Yujie Lin, Ximeng Liu, Nan Jiang:
AMAD: Improving Adversarial Robustness Without Reducing Accuracy. 1-14 - Xin Zhang, Chao Shan, Yunfeng Zou:
Multi-party Secure Comparison of Strings Based on Outsourced Computation. 15-30 - Zui Luo, Chang Chen, Wangjie Qiu:
Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain. 31-38 - Lei Guo, Shan Jing, Chuan Zhao:
Overview of DDoS Attack Research Under SDN. 39-53 - Sikai Liu, Fei Wu, Jinghong Tang, Bo Li:
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism. 54-60 - Qian Jiang, Jie Kang, Zhendong Wu:
Performance Improvement of Classification Model Based on Adversarial Sample Generation. 61-74 - Chang Liu, Chaozhong Long, Yuchuan Yu, Ziqi Lin:
Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning. 75-88 - Zhiwei Zheng, Zekai Chen, Ximeng Liu, Nan Jiang:
Federated Community Detection in Social Networks. 89-103 - Jialiang Dong, Shen Wang, Longfei Wu, Huoyuan Dong, Zhitao Guan:
A Textual Adversarial Attack Scheme for Domain-Specific Models. 104-117 - Yang Zhang, Jianwu Zhang, Guanhong Zhang, Hong Li:
An Improved Conv-LSTM Method for Gear Fault Detection. 118-129 - Junjie Chu, Mu Han, Shidian Ma:
Extracting Random Secret Key Scheme for One-Time Pad Under Intelligent Connected Vehicle. 130-143 - Guolin Zheng, Zuoyong Li, Wenkai Hu, Haoyi Fan, Fum Yew Ching, Zhaochai Yu, Kaizhi Chen:
Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization. 144-154 - Shu Gong, Gang Hua:
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part I. 155-164 - Simin Li, Mu Han:
Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network. 165-179 - Guanbiao Lin, Hu Li, Yingying Zhang, Shiyu Peng, Yufeng Wang, Zhenxin Zhang, Jin Li:
Dynamic Momentum for Deep Learning with Differential Privacy. 180-190 - Yuhui Huang, Xin Xie, Weiye Ning, Dengquan Wu, Zixi Li, Hao Yang:
An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP. 191-201 - Yusheng Xu, Xinrong Cao, Rong Hu, Pantea Keikhosrokiani, Zuoyong Li:
PCB Defect Detection Method Based on Improved RetinaNet. 202-213 - Xiaoyu Zhang, Ye Jin:
A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning. 214-227 - Shu Gong, Gang Hua:
Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province. 228-237 - Zhonghua Peng, Rong Hu, Fuen Wang, Haoyi Fan, Yee Wei Eng, Zuoyong Li, Liwei Zhou:
Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection. 238-253 - Shicheng Li, Xiaoguo Yang, Haoming Zhang, Chaoyu Zheng, Yugen Yi:
DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection. 254-265 - Yang Cui, Huayu Cheng, Fengyin Li, Domenico Santaniello:
A Lattice-Based Aggregate Signature Based on Revocable Identity. 266-274 - Yongbo Li:
Research and Design of an Emergency Supply Assurance Monitoring System in the Post-epidemic Context. 275-282 - Fei Peng, Shao-hua Meng, Min Long:
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion. 283-298 - Yiting Zhang, Ming Liu, Jianan Guo, Zhaojie Wang, Yilei Wang, Tiancai Liang, Sunil Kumar Singh:
Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process. 299-308 - Shu Gong, Gang Hua, Xiaomei Zhang:
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II. 309-320 - Jie Xu:
Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks. 321-334 - Shishuang Chen, Guanru Huang, Sui Lin, Wenchao Jiang, Zhiming Zhao:
Overlapping Community Discovery Algorithm Based on Three-Level Neighbor Node Influence. 335-344 - Weice Wang, Zuoyong Li, Xiangpan Zheng, Taotao Lai, Pantea Keikhosrokiani:
Content-Aware Deep Feature Matching. 345-354 - Fei Peng, Xin-lin Zhang, Min Long:
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps. 355-369 - Ling Zhang, Zongxin Ma, Mingyu Yan, Wenchao Jiang, Muhammad:
An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model. 370-381 - Xiao Li, Mengwen Wang, Fengyin Li:
A Certificateless-Based Blind Signature Scheme with Message Recovery. 382-389 - Tingting Chen, Guanhong Zhang, Tong Wu:
Fault Detection of Rolling Bearings by Using a Combination Network Model. 390-399 - Jiahui Huang, Teng Huang, Jiehua Zhang:
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs. 400-410 - Fangqin Ma, Junhan Qiu:
Research on Influential Factors of Online Learning Behavior Based on Big Data. 411-421 - Zhengyin Lv, Zhendong Wu, Juan Chen:
Short Speech Key Generation Technology Based on Deep Learning. 422-435 - Weikai Lu, Jian Chen, Hao Zheng, Haoyi Fan, Eng Yee Wei, Xinrong Cao, Deyang Zhang:
Domain Adversarial Interaction Network for Cross-Domain Fault Diagnosis. 436-446 - Xueqing Sun, Xiao Li, Fengyin Li:
A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain. 447-454 - Pengfei Huang, Wanqing Jie, Arthur Sandor Voundi Koe, Ruitao Hou, Hongyang Yan, Mourad Nouioua, Phan Duc Thien, Jacques Mbous Ikong, Camara Lancine:
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric. 455-468 - Yuxiang Li, Fakariah Hani Mohd Ali:
Research on Key Technologies for the Trusted Perception of Network Information for Big Data. 469-478 - Lanwei Zeng, Yudong Wang, Chang Zhu, Wenchao Jiang, Jiaxing Li:
Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network. 479-494 - Teng Peng, Xiaohong Wang:
Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm. 495-509 - Wenjun Li, Anli Yan, Taoyu Zhu, Teng Huang, Xuandi Luo, Shaowei Wang:
Towards Differentially Private Contrastive Learning. 510-520 - Shi Chen, Yubin Zhong:
Two-Stage High Precision Membership Inference Attack. 521-535 - Bomei Tan, Rong Yu:
Secure Storage Method for Network Resources of Professional Works Based on Decision Tree Algorithm. 536-549 - Jiaoxing Xu:
Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis. 550-564 - Junrong Ge, Xiaojiao Wang, Fengyin Li, Akshat Gaurav:
A Broad Learning System Based on the Idea of Vertical Federated Learning. 565-574 - Jianan Guo, Lei Shang, Yilei Wang, Tiancai Liang, Zhaojie Wang, Hui An:
PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency. 575-583 - Na Wang, Jian Jiao, Shangcheng Zhang, Jianwei Liu, Kaifa Zheng, Junsong Fu, Jiawen Qiao:
Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application. 584-608 - Xueming Qiao, Yao Tang, Yanhong Liu, Maomao Su, Chao Wang, Yansheng Fu, Xiaofang Li, Mingrui Wu, Qiang Fu, Dongjie Zhu:
A Event Extraction Method of Document-Level Based on the Self-attention Mechanism. 609-619
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.