Machine Learning for Cyber Security Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The...

Full description

Saved in:
Bibliographic Details
Main Authors Chen, Xiaofeng, Yan, Hongyang, Yan, Qiben, Zhang, Xiangliang
Format eBook
LanguageEnglish
Published Cham Springer International Publishing AG 2020
Springer International Publishing
Edition1
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783030624590
3030624595

Cover

Table of Contents:
  • 4 Chinese Open Domain Entity Relation Extraction and Its Inspiration -- 4.1 Introduction of Chinese Open Domain Entity Relation Extraction -- 4.2 Inspiration of English to Chinese -- 5 Conclusions -- Acknowledgement -- References -- A SEU Immune Flip-Flop with Low Overhead -- Abstract -- 1 Introduction -- 2 Proposed TSPC-RHM Flip-Flop Design -- 2.1 Radiation Hardened Memory (RHM) Cell -- 2.2 TSPC-RHM Structure and Work Principle -- 3 Simulation and Discussion -- 3.1 Cost Comparison -- 3.2 SEU Immunity -- 3.3 PVT Analysis -- 4 Conclusion -- References -- An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks -- Abstract -- 1 Introduction -- 2 System Model -- 3 Research on the Strategy of SWIPT -- 3.1 The Path Planning Strategy -- 3.2 The Energy Strategy of SWIPT -- 4 Simulation Results -- 4.1 Simulation Environment and Energy Model -- 4.2 The Path Planning Simulation -- 4.3 Energy Efficiency Analysis -- 5 Conclusion -- Acknowledgments -- References -- Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error -- Abstract -- 1 Introduction -- 2 Adaptive Beacon Transmission Power Transmission Control Algorithm Based on Prediction Error -- 2.1 Error Calculation -- 2.2 Adaptive Transmission Power Control Algorithm -- 3 Experimental Simulation and Analysis -- 3.1 Experimental Parameter Settings -- 3.2 Simulation Experiment Results Analysis -- 4 Conclusion -- References -- Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Wireless Access Method -- 3.2 Theoretical Model -- 4 Simulation and Results -- 5 Conclusions -- Acknowledgements -- References
  • 3 Construction of Health Evaluation Model -- 3.1 Battery SOH Double Exponential Recession Model -- 3.2 Gaussian Type Feature Correlation Mapping Model -- 4 Simulation Verification and Analysis -- 4.1 Evaluation Index of Simulation Verification -- 4.2 Comparison of Evaluation Accuracy -- 4.3 Validation of the Evaluation Method's Applicability -- 5 Conclusion -- Acknowledgements -- References -- Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm -- Abstract -- 1 Introduction -- 2 The Mathematical Model of Location Planning of UAVs -- 2.1 The Network Model of WSNs Data Collection -- 2.2 The Mathematical Model of WSNs Data Collection -- 3 Adaptive Search Algorithm for Location Planning of UAVs -- 3.1 Optimal Matching Method Between Sensors with UAVs -- 3.2 The Location Planning of UAVs -- 3.3 The Flow of Adaptive Search Algorithm of UAVs -- 4 Experimental Results and Analysis -- 4.1 Test Problem and Related Parameter -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Latent Dirichlet Allocation -- 3.3 Text Processing Flow -- 4 Experiment and Empirical Result -- 4.1 First Time Period: 3.9-3.23 -- 4.2 Second Time Period:3.24-4.7 -- 4.3 Third Time Period: 4.8-4.22 -- 5 Conclusion -- Acknowledgements -- References -- A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Hybrid Harmony Search -- 4.1 Harmony Memory Initialization -- 4.2 Harmony Evaluation -- 4.3 Local Search -- 4.4 Improvisation -- 4.5 Update Harmony Memory -- 5 Numerical Experiments
  • 5.1 Experimental Data and Settings
  • Intro -- Preface -- Organization -- Contents - Part II -- Vulnerability Variants and Path Factors in Networks -- 1 Introduction -- 2 Proof of Theorem 1 -- 3 Proof of Theorem 2 -- 4 Proof of Theorem 3 -- 5 Proof of Theorem 4 -- 6 Proof of Theorem 5 -- 7 Sharpness -- References -- A Variant of Sun Toughness and the Existence of Path Factors in Networks -- 1 Introduction -- 2 Main Results and Proofs -- 3 Sharpness -- 4 Open Problems -- References -- Network Adjacency Condition for Fractional (g,f,n',m)-Critical Covered Graphs -- 1 Introduction -- 2 Proof of Theorem 1 -- 3 Results on Fractional (g,f,n',m)-Critical Uniform Graphs -- References -- An Effective Remote Data Disaster Recovery Plan for the Space TT&amp -- C System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Current Backup Status and Disaster Recovery Requirements of the Critical Data -- 4 Design of the Disaster Recovery Plan for the Space TT&amp -- C System -- 4.1 Remote Data Disaster Recovery Based on Oracle -- 4.2 The Remote Data Disaster Recovery Plan for the Space TT&amp -- C System Based on Database -- 5 Evaluations -- 5.1 Testing Environment -- 5.2 Configuration of the Environment -- 5.3 Experiment Data -- 5.4 Testing Process -- 5.5 Evaluating the Performance Influence on the Production System Due to the Disaster Recovery System -- 5.6 Analysis of the Experiment Results -- 6 Conclusions -- Acknowledgments -- References -- Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain -- Abstract -- 1 Preface -- 2 Summaries -- 2.1 Definition -- 2.2 Tasks -- 2.3 Application -- 3 Summaries on English Open Doman Entity Relation Extraction -- 3.1 Binary Entity Relation Extractions -- 3.2 N-ary Entity Relation Extractions -- 3.3 Reflections and Prospect of English Open Domain Entity Relation Extraction
  • Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 Finite-Time Consensus of Multi-agent Systems with External Disturbances Without Velocity Measurements -- 4 Numerical Simulations -- 5 Conclusions -- Acknowledgements -- References -- A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication -- Abstract -- 1 Introduction -- 2 The ITU Defines Three Application Scenarios for 5G -- 3 URLLC Performance Evaluation Index -- 3.1 The ITU Defines the Performance Indicator of URLLC -- 3.2 URLLC Performance Index Defined by 3GPP -- 3.3 LTE Delay -- 3.4 URLLC Design Objectives -- 4 URLLC Implementation Method/Technology -- 4.1 Ways to Reduce Latency -- 4.2 Ways to Improve Reliability -- 5 Conclusion -- Acknowledgements -- References -- Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities -- Abstract -- 1 Introduction -- 2 Research Objects, Methods and Steps -- 2.1 Research Object -- 2.2 Research Methods -- 3 Results and Analysis -- 3.1 Analysis of the General Situation of College Students Participating in Sports Activities -- 3.2 Analysis of the Influencing Factors of College Campus Sports Culture on College Students' Participation in Sports Activities -- 4 Conclusions and Recommendations -- 4.1 Conclusion -- 4.2 Recommendation -- References -- Group Movement of Multi-agent Systems with Diverse Delays -- 1 Introduction -- 2 Preliminaries -- 3 Group Consensus Algorithm of Delayed Multi-agent Systems -- 4 Group Consensus of Multi-agent Systems with Heterogenous Delays -- 5 Simulation Examples -- 6 Conclusion -- References -- Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control -- Abstract -- 1 Introduction
  • 2 Related Work -- 3 System Model and Preliminary Work -- 3.1 System Overview -- 3.2 Sweep Coverage Threshold and Quality -- 3.3 Social Welfare and Objective Function -- 4 Sweep Coverage-Guaranteed Online Control Framework -- 4.1 Queue Dynamics and Lyapunov Function -- 4.2 Design of Coverage-Guaranteed Control Algorithm -- 4.3 Performance Analysis -- 5 Performance Evaluation -- 5.1 Data Set and Parameter Settings -- 5.2 Time Average Social Welfare -- 5.3 Queue Stability -- 6 Conclusion and Future Work -- References -- Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing -- Abstract -- 1 Introduction -- 2 Preliminaries and Problem Formulation -- 2.1 System Model -- 2.2 Max-Min Fairness-Aware Multi-task Allocation Problem -- 3 Max-Min Fairness-Aware Incentive Mechanism -- 3.1 NE in the Sensing Time Game -- 3.2 NE in the Reward Declaration Game -- 3.3 Max-Min Fairness-Aware Multi-task Allocation Algorithm -- 4 Performance Evaluation -- 4.1 Simulation Setup -- 4.2 Social Utility -- 4.3 Price of Fairness -- 5 Conclusion -- References -- Research on High Reliable Wireless Channel Data Cleaning Method -- Abstract -- 1 Introduction -- 2 Methods of Data Cleaning -- 2.1 Duplicate Records -- 2.2 Outlier Detection -- 2.3 Noise -- 2.4 Missing Value -- 3 Simulation -- 4 Conclusions -- Acknowledgment -- References -- A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions -- Abstract -- 1 Introduction -- 2 Procedures of Proposed Method -- 2.1 Feature Extraction -- 2.2 Health Assessment of Lithium-Ion Battery -- 3 Case Study -- 4 Conclusion -- Acknowledgments -- References -- Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm -- Abstract -- 1 Introduction -- 2 Evaluation Method -- 2.1 Kalman Filtering Algorithm -- 2.2 Weighted Kalman Filtering Algorithm