Machine Learning for Cyber Security Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The...

Full description

Saved in:
Bibliographic Details
Main Authors Chen, Xiaofeng, Yan, Hongyang, Yan, Qiben, Zhang, Xiangliang
Format eBook
LanguageEnglish
Published Cham Springer International Publishing AG 2020
Springer International Publishing
Edition1
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783030624590
3030624595

Cover

Abstract This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning,  Malware detection and analysis,  Data mining, and  Artificial Intelligence.
AbstractList This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning,  Malware detection and analysis,  Data mining, and  Artificial Intelligence.
Author Yan, Qiben
Zhang, Xiangliang
Yan, Hongyang
Chen, Xiaofeng
Author_xml – sequence: 1
  fullname: Chen, Xiaofeng
– sequence: 2
  fullname: Yan, Hongyang
– sequence: 3
  fullname: Yan, Qiben
– sequence: 4
  fullname: Zhang, Xiangliang
BookMark eNpFz0tLxDAUBeCID7Rj_0PBhbgo3NzbpslSy_iAigvFbUmbG6dOabXpKPPvFWfA1eHAx4ETiaNhHPhARAQECjMF5lDEptD7nhs4EZFEUBkgKnMq4hDeAQAzzGQhz8TFo21X3cBJxXYauuEt8eOUlNuGp-SZ283UzdtzcextHzje50K83i5fyvu0erp7KK-r1ErQuUopK3L01ltkp1nKAkxBrMhqdN5xgw167b0Hp7JW50YTk3OKMEcickALcbUbtmHN32E19nOov3puxnEd6v9bCtSvvdzZj2n83HCY6z_W8jBPtq-XN6UirZWR9AN8ZE_k
ContentType eBook
DEWEY 005.8
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3030624609
9783030624606
Edition 1
1st ed. 2020.
ExternalDocumentID 9783030624606
EBC6388691
GroupedDBID 38.
AABBV
ACGCR
AEDXK
AEHEY
AEJLV
AEJNW
AEKFX
ALMA_UNASSIGNED_HOLDINGS
APEJL
AVCSZ
AZTDL
BBABE
CYNQG
CZZ
DACMV
ESBCR
I4C
IEZ
OAOFD
OPOMJ
SBO
TPJZQ
TSXQS
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
ABZKH
Z87
ID FETCH-LOGICAL-a10856-34752fafa2ed8e1170973e63a82dfdeb2b2f8fff0d64c85983e3dd63252333d03
ISBN 9783030624590
3030624595
IngestDate Fri Nov 08 04:27:55 EST 2024
Fri Aug 29 09:50:28 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident QA76.9.A25
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a10856-34752fafa2ed8e1170973e63a82dfdeb2b2f8fff0d64c85983e3dd63252333d03
OCLC 1206402269
PQID EBC6388691
PageCount 623
ParticipantIDs askewsholts_vlebooks_9783030624606
proquest_ebookcentral_EBC6388691
PublicationCentury 2000
PublicationDate 2020
2020-11-10
PublicationDateYYYYMMDD 2020-01-01
2020-11-10
PublicationDate_xml – year: 2020
  text: 2020
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationYear 2020
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
SSID ssj0002424171
Score 2.1943104
Snippet This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an,...
SourceID askewsholts
proquest
SourceType Aggregation Database
Publisher
SubjectTerms Application software-Congresses
Computer security-Congresses
Subtitle Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II
TableOfContents 4 Chinese Open Domain Entity Relation Extraction and Its Inspiration -- 4.1 Introduction of Chinese Open Domain Entity Relation Extraction -- 4.2 Inspiration of English to Chinese -- 5 Conclusions -- Acknowledgement -- References -- A SEU Immune Flip-Flop with Low Overhead -- Abstract -- 1 Introduction -- 2 Proposed TSPC-RHM Flip-Flop Design -- 2.1 Radiation Hardened Memory (RHM) Cell -- 2.2 TSPC-RHM Structure and Work Principle -- 3 Simulation and Discussion -- 3.1 Cost Comparison -- 3.2 SEU Immunity -- 3.3 PVT Analysis -- 4 Conclusion -- References -- An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks -- Abstract -- 1 Introduction -- 2 System Model -- 3 Research on the Strategy of SWIPT -- 3.1 The Path Planning Strategy -- 3.2 The Energy Strategy of SWIPT -- 4 Simulation Results -- 4.1 Simulation Environment and Energy Model -- 4.2 The Path Planning Simulation -- 4.3 Energy Efficiency Analysis -- 5 Conclusion -- Acknowledgments -- References -- Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error -- Abstract -- 1 Introduction -- 2 Adaptive Beacon Transmission Power Transmission Control Algorithm Based on Prediction Error -- 2.1 Error Calculation -- 2.2 Adaptive Transmission Power Control Algorithm -- 3 Experimental Simulation and Analysis -- 3.1 Experimental Parameter Settings -- 3.2 Simulation Experiment Results Analysis -- 4 Conclusion -- References -- Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Wireless Access Method -- 3.2 Theoretical Model -- 4 Simulation and Results -- 5 Conclusions -- Acknowledgements -- References
3 Construction of Health Evaluation Model -- 3.1 Battery SOH Double Exponential Recession Model -- 3.2 Gaussian Type Feature Correlation Mapping Model -- 4 Simulation Verification and Analysis -- 4.1 Evaluation Index of Simulation Verification -- 4.2 Comparison of Evaluation Accuracy -- 4.3 Validation of the Evaluation Method's Applicability -- 5 Conclusion -- Acknowledgements -- References -- Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm -- Abstract -- 1 Introduction -- 2 The Mathematical Model of Location Planning of UAVs -- 2.1 The Network Model of WSNs Data Collection -- 2.2 The Mathematical Model of WSNs Data Collection -- 3 Adaptive Search Algorithm for Location Planning of UAVs -- 3.1 Optimal Matching Method Between Sensors with UAVs -- 3.2 The Location Planning of UAVs -- 3.3 The Flow of Adaptive Search Algorithm of UAVs -- 4 Experimental Results and Analysis -- 4.1 Test Problem and Related Parameter -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Latent Dirichlet Allocation -- 3.3 Text Processing Flow -- 4 Experiment and Empirical Result -- 4.1 First Time Period: 3.9-3.23 -- 4.2 Second Time Period:3.24-4.7 -- 4.3 Third Time Period: 4.8-4.22 -- 5 Conclusion -- Acknowledgements -- References -- A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Hybrid Harmony Search -- 4.1 Harmony Memory Initialization -- 4.2 Harmony Evaluation -- 4.3 Local Search -- 4.4 Improvisation -- 4.5 Update Harmony Memory -- 5 Numerical Experiments
5.1 Experimental Data and Settings
Intro -- Preface -- Organization -- Contents - Part II -- Vulnerability Variants and Path Factors in Networks -- 1 Introduction -- 2 Proof of Theorem 1 -- 3 Proof of Theorem 2 -- 4 Proof of Theorem 3 -- 5 Proof of Theorem 4 -- 6 Proof of Theorem 5 -- 7 Sharpness -- References -- A Variant of Sun Toughness and the Existence of Path Factors in Networks -- 1 Introduction -- 2 Main Results and Proofs -- 3 Sharpness -- 4 Open Problems -- References -- Network Adjacency Condition for Fractional (g,f,n',m)-Critical Covered Graphs -- 1 Introduction -- 2 Proof of Theorem 1 -- 3 Results on Fractional (g,f,n',m)-Critical Uniform Graphs -- References -- An Effective Remote Data Disaster Recovery Plan for the Space TT&amp -- C System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Current Backup Status and Disaster Recovery Requirements of the Critical Data -- 4 Design of the Disaster Recovery Plan for the Space TT&amp -- C System -- 4.1 Remote Data Disaster Recovery Based on Oracle -- 4.2 The Remote Data Disaster Recovery Plan for the Space TT&amp -- C System Based on Database -- 5 Evaluations -- 5.1 Testing Environment -- 5.2 Configuration of the Environment -- 5.3 Experiment Data -- 5.4 Testing Process -- 5.5 Evaluating the Performance Influence on the Production System Due to the Disaster Recovery System -- 5.6 Analysis of the Experiment Results -- 6 Conclusions -- Acknowledgments -- References -- Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain -- Abstract -- 1 Preface -- 2 Summaries -- 2.1 Definition -- 2.2 Tasks -- 2.3 Application -- 3 Summaries on English Open Doman Entity Relation Extraction -- 3.1 Binary Entity Relation Extractions -- 3.2 N-ary Entity Relation Extractions -- 3.3 Reflections and Prospect of English Open Domain Entity Relation Extraction
Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 Finite-Time Consensus of Multi-agent Systems with External Disturbances Without Velocity Measurements -- 4 Numerical Simulations -- 5 Conclusions -- Acknowledgements -- References -- A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication -- Abstract -- 1 Introduction -- 2 The ITU Defines Three Application Scenarios for 5G -- 3 URLLC Performance Evaluation Index -- 3.1 The ITU Defines the Performance Indicator of URLLC -- 3.2 URLLC Performance Index Defined by 3GPP -- 3.3 LTE Delay -- 3.4 URLLC Design Objectives -- 4 URLLC Implementation Method/Technology -- 4.1 Ways to Reduce Latency -- 4.2 Ways to Improve Reliability -- 5 Conclusion -- Acknowledgements -- References -- Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities -- Abstract -- 1 Introduction -- 2 Research Objects, Methods and Steps -- 2.1 Research Object -- 2.2 Research Methods -- 3 Results and Analysis -- 3.1 Analysis of the General Situation of College Students Participating in Sports Activities -- 3.2 Analysis of the Influencing Factors of College Campus Sports Culture on College Students' Participation in Sports Activities -- 4 Conclusions and Recommendations -- 4.1 Conclusion -- 4.2 Recommendation -- References -- Group Movement of Multi-agent Systems with Diverse Delays -- 1 Introduction -- 2 Preliminaries -- 3 Group Consensus Algorithm of Delayed Multi-agent Systems -- 4 Group Consensus of Multi-agent Systems with Heterogenous Delays -- 5 Simulation Examples -- 6 Conclusion -- References -- Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control -- Abstract -- 1 Introduction
2 Related Work -- 3 System Model and Preliminary Work -- 3.1 System Overview -- 3.2 Sweep Coverage Threshold and Quality -- 3.3 Social Welfare and Objective Function -- 4 Sweep Coverage-Guaranteed Online Control Framework -- 4.1 Queue Dynamics and Lyapunov Function -- 4.2 Design of Coverage-Guaranteed Control Algorithm -- 4.3 Performance Analysis -- 5 Performance Evaluation -- 5.1 Data Set and Parameter Settings -- 5.2 Time Average Social Welfare -- 5.3 Queue Stability -- 6 Conclusion and Future Work -- References -- Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing -- Abstract -- 1 Introduction -- 2 Preliminaries and Problem Formulation -- 2.1 System Model -- 2.2 Max-Min Fairness-Aware Multi-task Allocation Problem -- 3 Max-Min Fairness-Aware Incentive Mechanism -- 3.1 NE in the Sensing Time Game -- 3.2 NE in the Reward Declaration Game -- 3.3 Max-Min Fairness-Aware Multi-task Allocation Algorithm -- 4 Performance Evaluation -- 4.1 Simulation Setup -- 4.2 Social Utility -- 4.3 Price of Fairness -- 5 Conclusion -- References -- Research on High Reliable Wireless Channel Data Cleaning Method -- Abstract -- 1 Introduction -- 2 Methods of Data Cleaning -- 2.1 Duplicate Records -- 2.2 Outlier Detection -- 2.3 Noise -- 2.4 Missing Value -- 3 Simulation -- 4 Conclusions -- Acknowledgment -- References -- A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions -- Abstract -- 1 Introduction -- 2 Procedures of Proposed Method -- 2.1 Feature Extraction -- 2.2 Health Assessment of Lithium-Ion Battery -- 3 Case Study -- 4 Conclusion -- Acknowledgments -- References -- Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm -- Abstract -- 1 Introduction -- 2 Evaluation Method -- 2.1 Kalman Filtering Algorithm -- 2.2 Weighted Kalman Filtering Algorithm
Title Machine Learning for Cyber Security
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6388691
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030624606
Volume 12487
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZg98JeYHmI5bGyELcmaGPHeSBxgKioXZUFxLLqrbJje6lAidSmSN2_wJ9m7NhJHxyAS9S4rivNfPF4vsxnI_RSRkwkWZmGLC01JCgyCblULMxikTGtIiUzI07-cJGMvsbnUzbtOV2rLmnEq_Lmj7qS__EqtIFfjUr2HzzbDQoN8Bn8C1fwMFx3Fr_drTt7yZZAKr87alsLWayFWjgCvVm35RTzhdwh_XqJn-VCJ3HxZUBgNWcJ8hWvrm--1av2Rfy81Yt9LBtTfj0wG7Sae9_7Uxf73Gb_i2Yw7kjYwsk-pnNea-Xio5leWsZ1VFfXa77X_Hkuem1aR2bDGEZt7Lsb26rlm4l7_XFRN7aqbOBPqPAT1iajAemrrarbYzR3zNPTclspMDVJD4lZe-hoN6eT2MXx7c20-x8kZp_222kKs-Lh2-H55Kpj5oxgJkojIwTyY7N2q6b-v47QEV9-hzAEIapZ7sVxuzi5vIcOlVGsHKNbqrqP7norYGeFB-iXgwv2cMEAF2zhgj1cXmMLFrxlDdyDJcAWKthYMsAdUAJsYRJgBxJsQBK4XhsAgRuABx6PH6Kr98PLYhS6QzhCboQpSUjjlBHNNSfw3CpzUFGeUpVQnhGppRJEEJ1preExj8uM5RlVVMqEEkYopfKMPkIHVV2pxwjD0lFoyZXQSsVnJcslj3JWQtIdpSWkxifoxYZVZz9_2IKB5WzLaycIe2PP7Peuink2fFdAMMmSPHryN-M8RXd68D1DB81ipZ7DArMRpw4RvwGCt3lJ
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Machine+Learning+for+Cyber+Security%3A+Third+International+Conference%2C+ML4CS+2020%2C+Guangzhou%2C+China%2C+October+8-10%2C+2020%2C+Proceedings%2C+Part+II&rft.au=Chen%2C+Xiaofeng&rft.au=Yan%2C+Hongyang&rft.au=Yan%2C+Qiben&rft.au=Zhang%2C+Xiangliang&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2020-11-10&rft.pub=Springer+International+Publishing&rft.isbn=9783030624590&rft.volume=12487&rft.externalDocID=9783030624606
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830306%2F9783030624606.jpg