Machine Learning for Cyber Security Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The...
Saved in:
| Main Authors | , , , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Cham
Springer International Publishing AG
2020
Springer International Publishing |
| Edition | 1 |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783030624590 3030624595 |
Cover
| Abstract | This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence. |
|---|---|
| AbstractList | This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence. |
| Author | Yan, Qiben Zhang, Xiangliang Yan, Hongyang Chen, Xiaofeng |
| Author_xml | – sequence: 1 fullname: Chen, Xiaofeng – sequence: 2 fullname: Yan, Hongyang – sequence: 3 fullname: Yan, Qiben – sequence: 4 fullname: Zhang, Xiangliang |
| BookMark | eNpFz0tLxDAUBeCID7Rj_0PBhbgo3NzbpslSy_iAigvFbUmbG6dOabXpKPPvFWfA1eHAx4ETiaNhHPhARAQECjMF5lDEptD7nhs4EZFEUBkgKnMq4hDeAQAzzGQhz8TFo21X3cBJxXYauuEt8eOUlNuGp-SZ283UzdtzcextHzje50K83i5fyvu0erp7KK-r1ErQuUopK3L01ltkp1nKAkxBrMhqdN5xgw167b0Hp7JW50YTk3OKMEcickALcbUbtmHN32E19nOov3puxnEd6v9bCtSvvdzZj2n83HCY6z_W8jBPtq-XN6UirZWR9AN8ZE_k |
| ContentType | eBook |
| DEWEY | 005.8 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 3030624609 9783030624606 |
| Edition | 1 1st ed. 2020. |
| ExternalDocumentID | 9783030624606 EBC6388691 |
| GroupedDBID | 38. AABBV ACGCR AEDXK AEHEY AEJLV AEJNW AEKFX ALMA_UNASSIGNED_HOLDINGS APEJL AVCSZ AZTDL BBABE CYNQG CZZ DACMV ESBCR I4C IEZ OAOFD OPOMJ SBO TPJZQ TSXQS Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 ABZKH Z87 |
| ID | FETCH-LOGICAL-a10856-34752fafa2ed8e1170973e63a82dfdeb2b2f8fff0d64c85983e3dd63252333d03 |
| ISBN | 9783030624590 3030624595 |
| IngestDate | Fri Nov 08 04:27:55 EST 2024 Fri Aug 29 09:50:28 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | QA76.9.A25 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a10856-34752fafa2ed8e1170973e63a82dfdeb2b2f8fff0d64c85983e3dd63252333d03 |
| OCLC | 1206402269 |
| PQID | EBC6388691 |
| PageCount | 623 |
| ParticipantIDs | askewsholts_vlebooks_9783030624606 proquest_ebookcentral_EBC6388691 |
| PublicationCentury | 2000 |
| PublicationDate | 2020 2020-11-10 |
| PublicationDateYYYYMMDD | 2020-01-01 2020-11-10 |
| PublicationDate_xml | – year: 2020 text: 2020 |
| PublicationDecade | 2020 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationYear | 2020 |
| Publisher | Springer International Publishing AG Springer International Publishing |
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
| SSID | ssj0002424171 |
| Score | 2.1943104 |
| Snippet | This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an,... |
| SourceID | askewsholts proquest |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Application software-Congresses Computer security-Congresses |
| Subtitle | Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II |
| TableOfContents | 4 Chinese Open Domain Entity Relation Extraction and Its Inspiration -- 4.1 Introduction of Chinese Open Domain Entity Relation Extraction -- 4.2 Inspiration of English to Chinese -- 5 Conclusions -- Acknowledgement -- References -- A SEU Immune Flip-Flop with Low Overhead -- Abstract -- 1 Introduction -- 2 Proposed TSPC-RHM Flip-Flop Design -- 2.1 Radiation Hardened Memory (RHM) Cell -- 2.2 TSPC-RHM Structure and Work Principle -- 3 Simulation and Discussion -- 3.1 Cost Comparison -- 3.2 SEU Immunity -- 3.3 PVT Analysis -- 4 Conclusion -- References -- An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks -- Abstract -- 1 Introduction -- 2 System Model -- 3 Research on the Strategy of SWIPT -- 3.1 The Path Planning Strategy -- 3.2 The Energy Strategy of SWIPT -- 4 Simulation Results -- 4.1 Simulation Environment and Energy Model -- 4.2 The Path Planning Simulation -- 4.3 Energy Efficiency Analysis -- 5 Conclusion -- Acknowledgments -- References -- Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error -- Abstract -- 1 Introduction -- 2 Adaptive Beacon Transmission Power Transmission Control Algorithm Based on Prediction Error -- 2.1 Error Calculation -- 2.2 Adaptive Transmission Power Control Algorithm -- 3 Experimental Simulation and Analysis -- 3.1 Experimental Parameter Settings -- 3.2 Simulation Experiment Results Analysis -- 4 Conclusion -- References -- Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Wireless Access Method -- 3.2 Theoretical Model -- 4 Simulation and Results -- 5 Conclusions -- Acknowledgements -- References 3 Construction of Health Evaluation Model -- 3.1 Battery SOH Double Exponential Recession Model -- 3.2 Gaussian Type Feature Correlation Mapping Model -- 4 Simulation Verification and Analysis -- 4.1 Evaluation Index of Simulation Verification -- 4.2 Comparison of Evaluation Accuracy -- 4.3 Validation of the Evaluation Method's Applicability -- 5 Conclusion -- Acknowledgements -- References -- Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm -- Abstract -- 1 Introduction -- 2 The Mathematical Model of Location Planning of UAVs -- 2.1 The Network Model of WSNs Data Collection -- 2.2 The Mathematical Model of WSNs Data Collection -- 3 Adaptive Search Algorithm for Location Planning of UAVs -- 3.1 Optimal Matching Method Between Sensors with UAVs -- 3.2 The Location Planning of UAVs -- 3.3 The Flow of Adaptive Search Algorithm of UAVs -- 4 Experimental Results and Analysis -- 4.1 Test Problem and Related Parameter -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Latent Dirichlet Allocation -- 3.3 Text Processing Flow -- 4 Experiment and Empirical Result -- 4.1 First Time Period: 3.9-3.23 -- 4.2 Second Time Period:3.24-4.7 -- 4.3 Third Time Period: 4.8-4.22 -- 5 Conclusion -- Acknowledgements -- References -- A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Hybrid Harmony Search -- 4.1 Harmony Memory Initialization -- 4.2 Harmony Evaluation -- 4.3 Local Search -- 4.4 Improvisation -- 4.5 Update Harmony Memory -- 5 Numerical Experiments 5.1 Experimental Data and Settings Intro -- Preface -- Organization -- Contents - Part II -- Vulnerability Variants and Path Factors in Networks -- 1 Introduction -- 2 Proof of Theorem 1 -- 3 Proof of Theorem 2 -- 4 Proof of Theorem 3 -- 5 Proof of Theorem 4 -- 6 Proof of Theorem 5 -- 7 Sharpness -- References -- A Variant of Sun Toughness and the Existence of Path Factors in Networks -- 1 Introduction -- 2 Main Results and Proofs -- 3 Sharpness -- 4 Open Problems -- References -- Network Adjacency Condition for Fractional (g,f,n',m)-Critical Covered Graphs -- 1 Introduction -- 2 Proof of Theorem 1 -- 3 Results on Fractional (g,f,n',m)-Critical Uniform Graphs -- References -- An Effective Remote Data Disaster Recovery Plan for the Space TT& -- C System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Current Backup Status and Disaster Recovery Requirements of the Critical Data -- 4 Design of the Disaster Recovery Plan for the Space TT& -- C System -- 4.1 Remote Data Disaster Recovery Based on Oracle -- 4.2 The Remote Data Disaster Recovery Plan for the Space TT& -- C System Based on Database -- 5 Evaluations -- 5.1 Testing Environment -- 5.2 Configuration of the Environment -- 5.3 Experiment Data -- 5.4 Testing Process -- 5.5 Evaluating the Performance Influence on the Production System Due to the Disaster Recovery System -- 5.6 Analysis of the Experiment Results -- 6 Conclusions -- Acknowledgments -- References -- Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain -- Abstract -- 1 Preface -- 2 Summaries -- 2.1 Definition -- 2.2 Tasks -- 2.3 Application -- 3 Summaries on English Open Doman Entity Relation Extraction -- 3.1 Binary Entity Relation Extractions -- 3.2 N-ary Entity Relation Extractions -- 3.3 Reflections and Prospect of English Open Domain Entity Relation Extraction Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 Finite-Time Consensus of Multi-agent Systems with External Disturbances Without Velocity Measurements -- 4 Numerical Simulations -- 5 Conclusions -- Acknowledgements -- References -- A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication -- Abstract -- 1 Introduction -- 2 The ITU Defines Three Application Scenarios for 5G -- 3 URLLC Performance Evaluation Index -- 3.1 The ITU Defines the Performance Indicator of URLLC -- 3.2 URLLC Performance Index Defined by 3GPP -- 3.3 LTE Delay -- 3.4 URLLC Design Objectives -- 4 URLLC Implementation Method/Technology -- 4.1 Ways to Reduce Latency -- 4.2 Ways to Improve Reliability -- 5 Conclusion -- Acknowledgements -- References -- Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities -- Abstract -- 1 Introduction -- 2 Research Objects, Methods and Steps -- 2.1 Research Object -- 2.2 Research Methods -- 3 Results and Analysis -- 3.1 Analysis of the General Situation of College Students Participating in Sports Activities -- 3.2 Analysis of the Influencing Factors of College Campus Sports Culture on College Students' Participation in Sports Activities -- 4 Conclusions and Recommendations -- 4.1 Conclusion -- 4.2 Recommendation -- References -- Group Movement of Multi-agent Systems with Diverse Delays -- 1 Introduction -- 2 Preliminaries -- 3 Group Consensus Algorithm of Delayed Multi-agent Systems -- 4 Group Consensus of Multi-agent Systems with Heterogenous Delays -- 5 Simulation Examples -- 6 Conclusion -- References -- Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control -- Abstract -- 1 Introduction 2 Related Work -- 3 System Model and Preliminary Work -- 3.1 System Overview -- 3.2 Sweep Coverage Threshold and Quality -- 3.3 Social Welfare and Objective Function -- 4 Sweep Coverage-Guaranteed Online Control Framework -- 4.1 Queue Dynamics and Lyapunov Function -- 4.2 Design of Coverage-Guaranteed Control Algorithm -- 4.3 Performance Analysis -- 5 Performance Evaluation -- 5.1 Data Set and Parameter Settings -- 5.2 Time Average Social Welfare -- 5.3 Queue Stability -- 6 Conclusion and Future Work -- References -- Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing -- Abstract -- 1 Introduction -- 2 Preliminaries and Problem Formulation -- 2.1 System Model -- 2.2 Max-Min Fairness-Aware Multi-task Allocation Problem -- 3 Max-Min Fairness-Aware Incentive Mechanism -- 3.1 NE in the Sensing Time Game -- 3.2 NE in the Reward Declaration Game -- 3.3 Max-Min Fairness-Aware Multi-task Allocation Algorithm -- 4 Performance Evaluation -- 4.1 Simulation Setup -- 4.2 Social Utility -- 4.3 Price of Fairness -- 5 Conclusion -- References -- Research on High Reliable Wireless Channel Data Cleaning Method -- Abstract -- 1 Introduction -- 2 Methods of Data Cleaning -- 2.1 Duplicate Records -- 2.2 Outlier Detection -- 2.3 Noise -- 2.4 Missing Value -- 3 Simulation -- 4 Conclusions -- Acknowledgment -- References -- A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions -- Abstract -- 1 Introduction -- 2 Procedures of Proposed Method -- 2.1 Feature Extraction -- 2.2 Health Assessment of Lithium-Ion Battery -- 3 Case Study -- 4 Conclusion -- Acknowledgments -- References -- Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm -- Abstract -- 1 Introduction -- 2 Evaluation Method -- 2.1 Kalman Filtering Algorithm -- 2.2 Weighted Kalman Filtering Algorithm |
| Title | Machine Learning for Cyber Security |
| URI | https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6388691 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030624606 |
| Volume | 12487 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZg98JeYHmI5bGyELcmaGPHeSBxgKioXZUFxLLqrbJje6lAidSmSN2_wJ9m7NhJHxyAS9S4rivNfPF4vsxnI_RSRkwkWZmGLC01JCgyCblULMxikTGtIiUzI07-cJGMvsbnUzbtOV2rLmnEq_Lmj7qS__EqtIFfjUr2HzzbDQoN8Bn8C1fwMFx3Fr_drTt7yZZAKr87alsLWayFWjgCvVm35RTzhdwh_XqJn-VCJ3HxZUBgNWcJ8hWvrm--1av2Rfy81Yt9LBtTfj0wG7Sae9_7Uxf73Gb_i2Yw7kjYwsk-pnNea-Xio5leWsZ1VFfXa77X_Hkuem1aR2bDGEZt7Lsb26rlm4l7_XFRN7aqbOBPqPAT1iajAemrrarbYzR3zNPTclspMDVJD4lZe-hoN6eT2MXx7c20-x8kZp_222kKs-Lh2-H55Kpj5oxgJkojIwTyY7N2q6b-v47QEV9-hzAEIapZ7sVxuzi5vIcOlVGsHKNbqrqP7norYGeFB-iXgwv2cMEAF2zhgj1cXmMLFrxlDdyDJcAWKthYMsAdUAJsYRJgBxJsQBK4XhsAgRuABx6PH6Kr98PLYhS6QzhCboQpSUjjlBHNNSfw3CpzUFGeUpVQnhGppRJEEJ1preExj8uM5RlVVMqEEkYopfKMPkIHVV2pxwjD0lFoyZXQSsVnJcslj3JWQtIdpSWkxifoxYZVZz9_2IKB5WzLaycIe2PP7Peuink2fFdAMMmSPHryN-M8RXd68D1DB81ipZ7DArMRpw4RvwGCt3lJ |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Machine+Learning+for+Cyber+Security%3A+Third+International+Conference%2C+ML4CS+2020%2C+Guangzhou%2C+China%2C+October+8-10%2C+2020%2C+Proceedings%2C+Part+II&rft.au=Chen%2C+Xiaofeng&rft.au=Yan%2C+Hongyang&rft.au=Yan%2C+Qiben&rft.au=Zhang%2C+Xiangliang&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2020-11-10&rft.pub=Springer+International+Publishing&rft.isbn=9783030624590&rft.volume=12487&rft.externalDocID=9783030624606 |
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830306%2F9783030624606.jpg |