default search action
3rd ML4CS 2020: Guangzhou, China
- Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12486, Springer 2020, ISBN 978-3-030-62222-0 - Ming Wan, Jinfang Li, Hao Luo, Kai Wang, Yingjie Wang, Bailing Wang:
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation. 1-11 - Xuetao Zhang, Jinshuang Wang, Meng Sun, Yao Feng:
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations. 12-25 - Weijie Han, Jingfeng Xue, Fuquan Zhang, Yingfeng Zhang:
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model. 26-34 - Ziyu Wang, Weijie Han, Yue Lu, Jingfeng Xue:
A Malware Classification Method Based on the Capsule Network. 35-49 - Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li:
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning. 50-64 - Juan Wang, Meng Wang, Guanxiang Yin, Yuejin Zhang:
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network. 65-72 - Yiguang Gong, Yunping Liu, Chuanyang Yin, Zhiyong Fan:
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network for Effective Cyber Intrusion Detection. 73-88 - Yaming Zhang, Yan Liu:
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs. 89-99 - Budong Xu, Yongqin Li, Xiaomei Yu:
A Scientometric Analysis of Malware Detection Research Based on CiteSpace. 100-110 - Budong Xu, Yongqin Li, Xiaomei Yu:
Malware Detection Based on Static and Dynamic Features Analysis. 111-124 - Hui Guo, Shuguang Huang, Min Zhang, Zulie Pan, Fan Shi, Cheng Huang, Beibei Li:
Classification of Malware Variant Based on Ensemble Learning. 125-139 - Lu Huang, Jingfeng Xue, Weijie Han, Zixiao Kong, Zequn Niu:
Detection of Malicious Domains in APT via Mining Massive DNS Logs. 140-152 - Qian Xie, Zheng Huang, Jie Guo, Weidong Qiu:
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting. 153-159 - Meng Zhao, Chen Jin, Lingmin Jin, Shenghua Teng, Zuoyong Li:
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network. 160-169 - Lingmin Jin, Rui Ma, Meng Zhao, Shenghua Teng, Zuoyong Li:
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network. 170-179 - Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad:
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things. 180-194 - Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen:
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices. 195-205 - Fan Wu, Zhuoqun Xu, Huanghe Liu, Zongwei Zhu:
Machine Learning Agricultural Application Based on the Secure Edge Computing Platform. 206-220 - Shen Jin, Xuesong Liang, Hao Tian:
QoS Investigation for Power Network with Distributed Control Services. 221-233 - Xuan Yan, Xiaolong Xu, Yu Zheng, Fei Dai:
Fog Server Placement for Multimodality Data Fusion in Neuroimaging. 234-248 - Yuanshan Liu, Hongyong Yang, Yize Yang, Yuling Li:
Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance. 249-261 - Qi Zhao, Bo Zhang, Anli Yan, Shan Jing, Chuan Zhao:
Towards Privacy-Preserving Aggregated Prediction from SPDZ. 262-271 - Fengtian Kuang, Bo Mi, Darong Huang:
A Secure Neural Network Prediction Model with Multiple Data Providers. 272-286 - Zhenfei Chen, Tianqing Zhu, Chenguang Wang, Wei Ren, Ping Xiong:
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility. 287-296 - Ting Yan, Dan Li:
A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations. 297-306 - Zhenwei Chen, Yinghui Zhang, Gang Han, Jiangyong He, Rui Guo, Dong Zheng:
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks. 307-316 - Xuefeng Xu, Yanqing Yao, Lei Cheng:
Deep Learning Algorithms Design and Implementation Based on Differential Privacy. 317-330 - Xiaosong Zhang, Ling Pang, Linhong Guo, Yuanzhang Li:
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning. 331-339 - Xianfu Cheng, Yanqing Yao, Ao Liu:
An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm. 340-354 - Ao Liu, Yanqing Yao, Xianfu Cheng:
Recommender Systems with Condensed Local Differential Privacy. 355-365 - Suhang Wang, Chen Wang, Jian Xu:
Exploiting Bluetooth to Enquire Close Contacts Without Privacy Leakage. 366-375 - Datong Wu, Taotao Wu, Xiaotong Wu:
A Differentially Private Random Decision Tree Classifier with High Utility. 376-385 - Ying Wang, Haojia Zhu, Fengyin Li:
Research on Blind Signature Based Anonymous Electronic Cash Scheme. 386-392 - Yin Zhang, Fanglin An, Kejie Zhao, Jun Ye:
A Verifiable E-Lottery Scheme. 393-401 - Xu Gou, Linbo Qing, Yi Wang, Mulin Xin:
Re-Training and Parameter Sharing with the Hash Trick for Compressing Convolutional Neural Networks. 402-416 - Ruidi Yang:
Survey on Privacy-Preserving Machine Learning Protocols. 417-425 - Ruidi Yang, Maohua Sun:
Efficient Privacy-Preserving Binary Tree Search. 426-436 - Zheng Li, Maohua Sun:
Privacy-Preserving Classification of Personal Data with Fully Homomorphic Encryption: An Application to High-Quality Ionospheric Data Prediction. 437-446 - Dongxiang Song, Mingju Yuan:
An Improved Method for Data Storage Based on Blockchain Smart Contract. 447-460 - Yanling Hu:
Security Problems and Countermeasures of Network Accounting Information System. 461-469 - Shiyu Chen, Qianmu Li, Huaqiu Long, Jian Jiang:
Analysis on Industrial Internet Traffic Characteristics. 470-483 - Ting Liu, Guanghui Yan, Gang Cai, Qiong Wang, Mingjie Yang:
User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality. 484-499 - Sheng Hong, Yue Wang:
Attack and Repair Strategies for Computer Network About Viruses. 500-510 - Meihui Lan, Wei Gao:
Vulnerability Variants and Matching in Networks. 511-518 - Xiangxiang Jiang, Yuxi Ma, Gang Zhao, Xiaohui Kuang, Yuanzhang Li, Ruyun Zhang:
A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline. 519-529 - Xiang Li, Xinyang Deng, Wen Jiang:
A Novel Method of Network Security Situation Assessment Based on Evidential Network. 530-539 - Yanli Wang, Ying Zheng, Fengyin Li:
Research and Application of Digital Signature Technology. 540-546 - Hui Dou, Yuling Chen, Yangyang Long, Yuanchao Tu:
A Low Energy-Consuming Security Data Aggregation Protocol. 547-557 - Xinying Yu, Rui Ge, Fengyin Li:
Research on Blockchain-Based Identity Authentication Scheme in Social Networks. 558-565 - Xinyu Zhang, YuJun Liu, Yuling Chen, Zhan Wang:
A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy. 566-577 - Haining Yang, Ye Su, Jing Qin, Jinhua Ma, Huaxiong Wang:
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. 578-592 - Wei Tang, Yu-Ling Chen, Yun Yang:
A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold. 593-606 - Jiming Wang, Xueshuo Xie, Yaozheng Fang, Ye Lu, Tao Li, Guiling Wang:
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing. 607-622 - Bing Zhang, Zhiyong Guo, Yangdan Ni, Meng Yang, Ruiying Cheng, Yu Xiao:
A Secure and Moderate Data Synchronization Method Based on Network Isolation. 623-633 - Shuai Zhang, Fuyou Miao:
Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring. 634-643
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.