E-Books durchsuchen

Machine Learning for Cyber Security [2020]

1
Deep Convolutional Neural Network Based Image Segmentation for Salt Mine Recognition
1
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation
1
Vulnerability Variants and Path Factors in Networks
2
Optimization of Collaborative Filtering Algorithm in Movie Recommendation System
2
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations
2
A Variant of Sun Toughness and the Existence of Path Factors in Networks
3
Network Adjacency Condition for Fractional <inline-formula><alternatives><tex-math>\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(g,f,n',m)$$\end{document}</tex-math><inline-graphic></inline-graphic></alternatives></inline-formula>-Critical Covered Graphs
3
TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems
3
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model
4
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System
4
Software Entity Recognition Method Based on BERT Embedding
4
A Malware Classification Method Based on the Capsule Network
5
Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain
5
A Classification Method of Land Cover Based on Support Vector Machines
5
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning
6
Temporal Consistency Based Deep Face Forgery Detection Network
6
A SEU Immune Flip-Flop with Low Overhead
6
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network
7
CBOW and LSTM Based User Mobile Trajectory Prediction
7
An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks
7
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network for Effective Cyber Intrusion Detection
8
Framework Optimization for Face Recognition
8
Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error
8
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs
9
Machine Learning Assisted OSP Approach for Improved QoS Performance on 3D Charge-Trap Based SSDs
9
Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model
9
A Scientometric Analysis of Malware Detection Research Based on CiteSpace
10
Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements
10
A Location Method for Reliability-Critical Paths Based on Monte Carlo Search Tree
10
Malware Detection Based on Static and Dynamic Features Analysis
11
A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication
11
Research of Expressway Vehicle Detection Based on Faster R-CNN and Domain Adaptation
11
Classification of Malware Variant Based on Ensemble Learning
12
A Short-Term Traffic Flow Forecasting Method Based on Support Vector Regression Optimized by Genetic Algorithm
12
Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities
12
Detection of Malicious Domains in APT via Mining Massive DNS Logs
13
Short-Term Traffic Flow Prediction Based on Hybrid Model
13
Group Movement of Multi-agent Systems with Diverse Delays
13
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting
14
Uneven Clustering Routing Protocol for Geological Disaster Monitoring Sensor Network
14
Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control
14
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network
15
Clustering Analysis Method of Ethnic Cultural Resources Based on Deep Neural Network Model
15
Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing
15
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network
16
Optimal Group Consensus of Second-Order Multi-agent Systems
16
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things
16
Research on High Reliable Wireless Channel Data Cleaning Method
17
A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server
17
A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions
17
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices
18
SDUW-Net: An Effective Retinal Vessel Segmentation Model
18
Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm
18
Machine Learning Agricultural Application Based on the Secure Edge Computing Platform
19
A New Mobility Model Based on Markov Chain for MANETs
19
Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm
19
QoS Investigation for Power Network with Distributed Control Services
20
Image Dust Storm Synthetic Method Based on Optical Model
20
Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization
20
Fog Server Placement for Multimodality Data Fusion in Neuroimaging
21
Research on Classification Model of Government Big Data Based on Deep Learning
21
A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search
21
Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance
22
Research of Paper Recommendation System Based on Citation Network Model
22
An Adaptive Data Protection Scheme for Optimizing Storage Space
22
Towards Privacy-Preserving Aggregated Prediction from SPDZ
23
CellIdNet: Automatic Cell Instance Segmentation and Classification in Bone Marrow Examination with Double Backbone Networks
23
The Thinned Rectangular Array Based on Modified Interger Genetic Algorithm
23
A Secure Neural Network Prediction Model with Multiple Data Providers
24
Mathematical Subject Information Entity Recognition Method Based on BiLSTM-CRF
24
A Novel Method to Classify Videos Based VBR Trace
24
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility
25
A Facial Fatigue Expression Recognition Method Based on Sparse Representation on the Low-Resolution Image
25
Research on Friendvertising-Counter Technology in Big Data
25
A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations
26
Spontaneous Expression Recognition Based on Visual Attention Mechanism and Co-salient Features
26
A Survey of Researches on Personalized Bundle Recommendation Techniques
26
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
27
Single Image Super-Resolution Reconstruction Using Nonlocal Low-Rank Prior
27
Estimation of Motor Imagination Based on Consumer-Grade EEG Device
27
Deep Learning Algorithms Design and Implementation Based on Differential Privacy
28
Product Consistency Joint Detection Algorithm Based on Deep Learning
28
An Overview of Key Technologies and Challenges of 6G
28
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning
29
Research on Image Recognition Method of Ethnic Costume Based on VGG
29
Q-Learning-Based Adaptive Bacterial Foraging Optimization
29
An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm
30
National Defense Education Resource Recommender of High Education Institutions Based on Knowledge-Aware Generative Adversarial Network
30
Counterfactual Retrieval for Augmentation and Decisions
30
Recommender Systems with Condensed Local Differential Privacy
31
Dictionary Learning Based on Structural Self-similarity and Convolution Neural Network
31
Firefly Algorithm Based on Dynamic Step Change Strategy
31
Exploiting Bluetooth to Enquire Close Contacts Without Privacy Leakage
32
Short-Text Feature Expansion and Classification Based on Non-negative Matrix Factorization
32
Earthquakes Detection Scheme by Dynamic Time Warping on Smartphones
32
A Differentially Private Random Decision Tree Classifier with High Utility
33
Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning
33
Towards Accurate Seismic Events Detection Using Motion Sensors on Smartphones
33
Research on Blind Signature Based Anonymous Electronic Cash Scheme
34
A Swarm Enhanced Light Gradient Boosting Machine for Crowdfunding Project Outcome Prediction
Feedback