Machine learning for cyber security ...
ML4CS (Conference) (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Machine learning for cyber security = second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Machine learning for cyber security/ edited by Xiaofeng Chen, Xinyi Huang, Jun Zhang.
    Reminder of title: second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019 : proceedings /
    remainder title: ML4CS 2019
    other author: Chen, Xiaofeng.
    corporate name: ML4CS (Conference)
    Published: Cham :Springer International Publishing : : 2019.,
    Description: xiii, 398 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.
    Contained By: Springer eBooks
    Subject: Machine learning - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-30619-9
    ISBN: 9783030306199
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login