Machine Learning for Cyber Security Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part III
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The...
Saved in:
Main Authors | , , , |
---|---|
Format | eBook |
Language | English |
Published |
Cham
Springer International Publishing AG
2020
Springer International Publishing |
Edition | 1 |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 9783030624620 3030624625 |
Cover
Table of Contents:
- 3.2 Evaluation of Optimal Cluster Number Based on Elbow Method -- 4 Experimental Analysis -- 4.1 Experimental Data and Steps -- 4.2 Analysis of Experimental Results -- 5 Conclusion -- References -- Optimal Group Consensus of Second-Order Multi-agent Systems -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Graph Theory and Definitions -- 3 Optimal Group Consensus of MAS -- 4 Numerical Examples -- 4.1 The Simulation of MAS with Leaders -- 4.2 The Simulation of MAS with Leaderless -- 5 Conclusions -- References -- A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server -- 1 Introduction -- 2 Preface -- 2.1 Markov Process -- 3 Defense Strategy of Edge Server -- 3.1 Two-Players Security Game -- 3.2 Edge Computing and Attacker's Payoff -- 3.3 The Edge Server's Optimal Response -- 4 Experimental Stimulation -- 4.1 The Prediction of Observable Behavior of Attackers -- 4.2 Comparison of the Payoff of Attacker and Edge Server -- 4.3 Comparison Between Our Scheme and the Other Three Schemes -- 5 Conclusion -- References -- SDUW-Net: An Effective Retinal Vessel Segmentation Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Image Data Preprocessing -- 3.2 Building and Training -- 4 Materials and Performances -- 4.1 Results of Improved Model -- 4.2 Results of Vessel Segmentation -- 5 Conclusions -- References -- A New Mobility Model Based on Markov Chain for MANETs -- 1 Introduction -- 2 Mobility Model of MANET -- 2.1 RWP Mobility Model -- 2.2 MRP Mobility Model -- 3 A Markov Mobility Model with Pause Time and Variable Speed -- 3.1 TSMRP Model Definition -- 3.2 Description of TSMRP Model -- 3.3 TSMRP Node Mobility Algorithms -- 3.4 TSMRP Model Simulation Implementation -- 4 Simulation Comparison -- 4.1 Building of Simulation Environment -- 4.2 Comparison and Analysis of Simulation Results -- 5 Conclusion
- References -- Research of Expressway Vehicle Detection Based on Faster R-CNN and Domain Adaptation -- 1 Introduction -- 2 Improved Domain Adaptive Faster R-CNN Model -- 3 Vehicle Detection Network Architecture -- 3.1 Domain Adaptive Component -- 3.2 Improvement of RPN -- 3.3 Network Loss Function -- 3.4 Network Model Training Method -- 4 Experiment and Result Analysis -- 5 Conclusion -- References -- A Short-Term Traffic Flow Forecasting Method Based on Support Vector Regression Optimized by Genetic Algorithm -- 1 Introduction -- 2 Prediction Model Construction -- 2.1 SVR -- 2.2 GA -- 2.3 Optimization of SVR Parameters by GA -- 3 Experiment and Result Analysis -- 3.1 Data Sources -- 3.2 Error Analysis and Comparison -- 3.3 Simulation Analysis -- 4 Conclusion -- References -- Short-Term Traffic Flow Prediction Based on Hybrid Model -- 1 Introduction -- 2 Related Work -- 3 Hybrid Model -- 3.1 ILSTM Model -- 3.2 RBFNN Model -- 3.3 Weight Fusion -- 4 Experiments -- 4.1 Data Description -- 4.2 Data Pre-processing -- 4.3 Experiment Results and Analysis -- 5 Conclusion -- References -- Uneven Clustering Routing Protocol for Geological Disaster Monitoring Sensor Network -- 1 Introduction -- 2 Network and Energy Models -- 3 Overview of PSO Algorithm -- 4 Proposed Algorithm -- 4.1 Particle Representation -- 4.2 Initialize Particle Swarm -- 4.3 Derivation Fitness Function -- 4.4 Optimal Clustering Formation -- 4.5 Establish Inter-cluster Routing -- 5 Simulation Experiments and Results -- 6 Conclusions -- References -- Clustering Analysis Method of Ethnic Cultural Resources Based on Deep Neural Network Model -- 1 Introduction -- 2 Ethnic Cultural Resources Data Vectorization -- 2.1 Feature Extraction -- 2.2 Ethnic Cultural Resources Text Vectorization -- 3 Ethnic Cultural Resources Clustering -- 3.1 K-Means Clustering Algorithm
- 4.2 Experimental Environment and Parameter Settings
- 4.3 Experimental Process and Results -- 4.4 Experimental Analysis -- 5 Conclusion -- References -- A Classification Method of Land Cover Based on Support Vector Machines -- 1 Introduction -- 2 Data and Method -- 2.1 Data Introduction -- 2.2 Method -- 3 Results -- 4 Discussions -- 5 Conclusion -- References -- Temporal Consistency Based Deep Face Forgery Detection Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Motivation -- 3.2 Temporal Consistency Based Deep Face Forgery Detection Network -- 3.3 Implementation Details -- 4 Experiments -- 4.1 Dataset and Evaluation Metric -- 4.2 Experimental Results -- 4.3 Ablation Study -- 5 Conclusion -- References -- CBOW and LSTM Based User Mobile Trajectory Prediction -- 1 Introduction -- 2 Related Work -- 3 Model -- 3.1 Data Preprocessing -- 3.2 CBOW Embedding Model -- 3.3 LSTM Based Prediction Model -- 4 Experiments and Analysis -- 5 Conclusion -- References -- Framework Optimization for Face Recognition -- 1 Introduction -- 2 Raspberry Pi System Configuration -- 2.1 Hardware Section -- 2.2 Software Part -- 3 Edge Computing Architecture Design -- 4 Cloud Architecture Design -- 5 Conclusions -- References -- Machine Learning Assisted OSP Approach for Improved QoS Performance on 3D Charge-Trap Based SSDs -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Methodology -- 4.1 Model Construct -- 4.2 Algorithm -- 4.3 Walk-Through Example -- 5 Results and Analysis -- 5.1 Experiment Environment -- 5.2 Experimental Results -- 6 Conclusion -- References -- A Location Method for Reliability-Critical Paths Based on Monte Carlo Search Tree -- 1 Introduction -- 2 Development of CPT -- 3 Research Methods -- 3.1 Obtain the Sensitivity of Circuit Unit -- 3.2 Algorithm 1: Topological Sorting and Relaxation -- 3.3 Algorithm 2: Monte Carlo Tree Search -- 4 Performance Evaluation -- 5 Conclusion
- References -- Image Dust Storm Synthetic Method Based on Optical Model -- 1 Introduction -- 2 The Proposed Method -- 3 Experimental Results -- 3.1 Evaluation of Dusty Image Synthesis -- 3.2 Parameter Discussion -- 4 Conclusion -- References -- Research on Classification Model of Government Big Data Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Research on Classification Model of Government Big Data -- 3.1 Government Big Data Text Features -- 3.2 Design of Classification Model -- 3.3 Classification Model of Government Big Data -- 4 Experiment and Result Analysis -- 4.1 Experimental Data Set -- 4.2 Performance Evaluation Index -- 4.3 Experimental Comparison and Analysis -- 5 Conclusion -- References -- Research of Paper Recommendation System Based on Citation Network Model -- 1 Introduction -- 1.1 Research Status of Paper Recommendation System -- 1.2 Research Status of Citation Network -- 2 Related Work -- 2.1 Citation Recommendation -- 2.2 Random Walk with Restart -- 3 Analysis and Construction of Three-Layer Citation Network Graph Model -- 3.1 Analysis of Three Layers Citation Network Model -- 3.2 Construction of Three Layers Citation Network Model -- 4 Recommendation Algorithm Based on Citation Network Model -- 4.1 Algorithm Design -- 4.2 Experiment and Analysis -- 5 Conclusions -- References -- CellIdNet: Automatic Cell Instance Segmentation and Classification in Bone Marrow Examination with Double Backbone Networks -- 1 Introduction -- 2 Methodology -- 2.1 Training -- 3 Experiment -- 3.1 Dataset -- 3.2 Experiment -- 4 Conclusion -- References -- Mathematical Subject Information Entity Recognition Method Based on BiLSTM-CRF -- 1 Introduction -- 2 Ralated Work -- 2.1 CRF Model -- 2.2 LSTM Model -- 2.3 BERT Model -- 2.4 BiLSTM-CRF Model -- 3 The Proposed Model -- 4 Experimental Results and Analysis -- 4.1 Experimental Data
- Intro -- Preface -- Organization -- Contents - Part III -- Deep Convolutional Neural Network Based Image Segmentation for Salt Mine Recognition -- 1 Introduction -- 2 Exploratory Data Analysis and Processing -- 3 Model Design and Optimization -- 4 Loss Function Design and Optimization -- 5 Numerical Analysis and Evaluation -- 6 Conclusion -- References -- Optimization of Collaborative Filtering Algorithm in Movie Recommendation System -- 1 Introduction -- 2 Collaborative Filtering Algorithm -- 2.1 Introduction of Collaborative Filtering Algorithm -- 2.2 The Evaluation Index of Recommendation Algorithm -- 3 Optimization of User-Based Collaborative Filtering Algorithm -- 3.1 User-Based Collaborative Filtering Algorithm -- 3.2 Optimization of User-Based Collaborative Filtering Algorithm -- 4 Algorithm Evaluation Experiment -- 4.1 Data Acquisition -- 4.2 Algorithm Testing -- 5 Conclusion -- References -- TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems -- 1 Introduction -- 2 Related Work -- 2.1 Recurrent Neural Network Based Recommendation -- 2.2 Generative Adversarial Network Based Recommendation -- 3 The Proposed Framework -- 3.1 An Overview of the Proposed Framework -- 3.2 Data Pre-processing -- 3.3 Adversarial Learning for Recommendation -- 3.4 Negative Sampling -- 4 Experimental Setup -- 4.1 Datasets -- 4.2 Implementation Details and Evaluation Metrics -- 4.3 Comparison to Baselines -- 5 Experimental Results and Analysis -- 5.1 Experimental Results -- 5.2 Social Relations Analysis -- 6 Conclusion and Future Work -- References -- Software Entity Recognition Method Based on BERT Embedding -- 1 Introduction -- 2 Related Work -- 3 Main Models -- 3.1 Initial Model BiLSTM-CRF -- 3.2 BERT Model -- 3.3 Data Set Expansion -- 4 Experiment and Analysis -- 4.1 Experimental Data -- 4.2 Evaluation Index