Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine learning for cyber security ...
~
ML4CS (Conference) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Machine learning for cyber security = 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Machine learning for cyber security/ edited by Yang Xiang, Jian Shen.
Reminder of title:
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
remainder title:
ML4CS 2024
other author:
Xiang, Yang.
corporate name:
ML4CS (Conference)
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xiii, 450 p. :ill., digital ;24 cm.
[NT 15003449]:
Secure Resource Allocation via Constrained Deep Reinforcement Learning. -- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. -- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. -- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network. -- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. -- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid. -- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin. -- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. -- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning. -- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning. -- Automatic Software Vulnerability Detection in Binary Code. -- Malicious Code Detection Based On Generative Adversarial Model. -- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. -- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. -- A Malicious Websites Classifier Based on an Improved Relation Network. -- Unknown Category Malicious Traffic Detection Based on Contrastive Learning. -- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning. -- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. -- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection. -- Provable Data Auditing Scheme from Trusted Execution Environment. -- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints. -- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. -- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. -- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. -- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. -- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning. -- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. -- YOLO-LiteMax: An Improved Model for UAV Small Object Detection. -- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. -- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
Contained By:
Springer Nature eBook
Subject:
Machine learning - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-96-4566-4
ISBN:
9789819645664
Machine learning for cyber security = 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
Machine learning for cyber security
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /[electronic resource] :ML4CS 2024edited by Yang Xiang, Jian Shen. - Singapore :Springer Nature Singapore :2025. - xiii, 450 p. :ill., digital ;24 cm. - Lecture notes in computer science,155661611-3349 ;. - Lecture notes in computer science ;15566..
Secure Resource Allocation via Constrained Deep Reinforcement Learning. -- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. -- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. -- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network. -- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. -- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid. -- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin. -- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. -- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning. -- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning. -- Automatic Software Vulnerability Detection in Binary Code. -- Malicious Code Detection Based On Generative Adversarial Model. -- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. -- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. -- A Malicious Websites Classifier Based on an Improved Relation Network. -- Unknown Category Malicious Traffic Detection Based on Contrastive Learning. -- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning. -- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. -- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection. -- Provable Data Auditing Scheme from Trusted Execution Environment. -- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints. -- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. -- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. -- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. -- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. -- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning. -- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. -- YOLO-LiteMax: An Improved Model for UAV Small Object Detection. -- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. -- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
This book constitutes the referred proceedings of the 6th International Conference on Machine Learning for Cyber Security, ML4CS 2024, held in Hangzhou, China, during December 27-29, 2024. The 30 full papers presented in this book were carefully reviewed and selected from 111 submissions. ML4CS is a well-recognized annual international forum for AI-driven security researchers to exchange ideas and present their works. The conference focus on topics such as blockchain, network security, system security, software security, threat intelligence, cybersecurity situational awareness and much many more.
ISBN: 9789819645664
Standard No.: 10.1007/978-981-96-4566-4doiSubjects--Topical Terms:
576368
Machine learning
--Congresses.
LC Class. No.: Q325.5
Dewey Class. No.: 006.31
Machine learning for cyber security = 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
LDR
:04387nmm a2200373 a 4500
001
2408804
003
DE-He213
005
20250401125249.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819645664
$q
(electronic bk.)
020
$a
9789819645657
$q
(paper)
024
7
$a
10.1007/978-981-96-4566-4
$2
doi
035
$a
978-981-96-4566-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q325.5
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
006.31
$2
23
090
$a
Q325.5
$b
.M685 2024
111
2
$a
ML4CS (Conference)
$n
(6th :
$d
2024 :
$c
Hangzhou, China)
$3
3781637
245
1 0
$a
Machine learning for cyber security
$h
[electronic resource] :
$b
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
$c
edited by Yang Xiang, Jian Shen.
246
3
$a
ML4CS 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 450 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15566
505
0
$a
Secure Resource Allocation via Constrained Deep Reinforcement Learning. -- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. -- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. -- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network. -- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. -- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid. -- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin. -- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. -- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning. -- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning. -- Automatic Software Vulnerability Detection in Binary Code. -- Malicious Code Detection Based On Generative Adversarial Model. -- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. -- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. -- A Malicious Websites Classifier Based on an Improved Relation Network. -- Unknown Category Malicious Traffic Detection Based on Contrastive Learning. -- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning. -- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. -- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection. -- Provable Data Auditing Scheme from Trusted Execution Environment. -- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints. -- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. -- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. -- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. -- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. -- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning. -- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. -- YOLO-LiteMax: An Improved Model for UAV Small Object Detection. -- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. -- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
520
$a
This book constitutes the referred proceedings of the 6th International Conference on Machine Learning for Cyber Security, ML4CS 2024, held in Hangzhou, China, during December 27-29, 2024. The 30 full papers presented in this book were carefully reviewed and selected from 111 submissions. ML4CS is a well-recognized annual international forum for AI-driven security researchers to exchange ideas and present their works. The conference focus on topics such as blockchain, network security, system security, software security, threat intelligence, cybersecurity situational awareness and much many more.
650
0
$a
Machine learning
$x
Congresses.
$3
576368
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Xiang, Yang.
$3
1569045
700
1
$a
Shen, Jian.
$3
1680574
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15566.
$3
3781638
856
4 0
$u
https://doi.org/10.1007/978-981-96-4566-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514302
電子資源
11.線上閱覽_V
電子書
EB Q325.5
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login