


default search action
4th ML4CS 2022: Guangzhou, China - Volume 2
- Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li:

Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13656, Springer 2023, ISBN 978-3-031-20098-4 - Yujie Lin, Ximeng Liu, Nan Jiang:

AMAD: Improving Adversarial Robustness Without Reducing Accuracy. 1-14 - Xin Zhang, Chao Shan, Yunfeng Zou:

Multi-party Secure Comparison of Strings Based on Outsourced Computation. 15-30 - Zui Luo, Chang Chen

, Wangjie Qiu:
Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain. 31-38 - Lei Guo, Shan Jing, Chuan Zhao:

Overview of DDoS Attack Research Under SDN. 39-53 - Sikai Liu, Fei Wu, Jinghong Tang

, Bo Li:
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism. 54-60 - Qian Jiang

, Jie Kang
, Zhendong Wu
:
Performance Improvement of Classification Model Based on Adversarial Sample Generation. 61-74 - Chang Liu, Chaozhong Long, Yuchuan Yu, Ziqi Lin:

Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning. 75-88 - Zhiwei Zheng, Zekai Chen, Ximeng Liu, Nan Jiang:

Federated Community Detection in Social Networks. 89-103 - Jialiang Dong

, Shen Wang
, Longfei Wu, Huoyuan Dong
, Zhitao Guan:
A Textual Adversarial Attack Scheme for Domain-Specific Models. 104-117 - Yang Zhang, Jianwu Zhang, Guanhong Zhang, Hong Li:

An Improved Conv-LSTM Method for Gear Fault Detection. 118-129 - Junjie Chu, Mu Han, Shidian Ma:

Extracting Random Secret Key Scheme for One-Time Pad Under Intelligent Connected Vehicle. 130-143 - Guolin Zheng, Zuoyong Li, Wenkai Hu, Haoyi Fan, Fum Yew Ching, Zhaochai Yu, Kaizhi Chen:

Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization. 144-154 - Shu Gong, Gang Hua:

Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part I. 155-164 - Simin Li, Mu Han:

Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network. 165-179 - Guanbiao Lin, Hu Li, Yingying Zhang, Shiyu Peng, Yufeng Wang, Zhenxin Zhang, Jin Li:

Dynamic Momentum for Deep Learning with Differential Privacy. 180-190 - Yuhui Huang

, Xin Xie
, Weiye Ning
, Dengquan Wu
, Zixi Li
, Hao Yang
:
An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP. 191-201 - Yusheng Xu, Xinrong Cao, Rong Hu, Pantea Keikhosrokiani

, Zuoyong Li:
PCB Defect Detection Method Based on Improved RetinaNet. 202-213 - Xiaoyu Zhang, Ye Jin:

A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning. 214-227 - Shu Gong, Gang Hua:

Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province. 228-237 - Zhonghua Peng, Rong Hu, Fuen Wang, Haoyi Fan, Yee Wei Eng, Zuoyong Li, Liwei Zhou:

Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection. 238-253 - Shicheng Li, Xiaoguo Yang, Haoming Zhang, Chaoyu Zheng, Yugen Yi:

DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection. 254-265 - Yang Cui, Huayu Cheng, Fengyin Li, Domenico Santaniello:

A Lattice-Based Aggregate Signature Based on Revocable Identity. 266-274 - Yongbo Li:

Research and Design of an Emergency Supply Assurance Monitoring System in the Post-epidemic Context. 275-282 - Fei Peng, Shao-hua Meng, Min Long:

Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion. 283-298 - Yiting Zhang, Ming Liu, Jianan Guo, Zhaojie Wang

, Yilei Wang, Tiancai Liang, Sunil Kumar Singh
:
Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process. 299-308 - Shu Gong, Gang Hua, Xiaomei Zhang:

Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II. 309-320 - Jie Xu:

Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks. 321-334 - Shishuang Chen, Guanru Huang, Sui Lin, Wenchao Jiang, Zhiming Zhao:

Overlapping Community Discovery Algorithm Based on Three-Level Neighbor Node Influence. 335-344 - Weice Wang, Zuoyong Li, Xiangpan Zheng, Taotao Lai, Pantea Keikhosrokiani

:
Content-Aware Deep Feature Matching. 345-354 - Fei Peng, Xin-lin Zhang, Min Long:

F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps. 355-369 - Ling Zhang, Zongxin Ma, Mingyu Yan, Wenchao Jiang, Muhammad:

An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model. 370-381 - Xiao Li, Mengwen Wang, Fengyin Li:

A Certificateless-Based Blind Signature Scheme with Message Recovery. 382-389 - Tingting Chen, Guanhong Zhang, Tong Wu:

Fault Detection of Rolling Bearings by Using a Combination Network Model. 390-399 - Jiahui Huang, Teng Huang, Jiehua Zhang:

zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs. 400-410 - Fangqin Ma, Junhan Qiu:

Research on Influential Factors of Online Learning Behavior Based on Big Data. 411-421 - Zhengyin Lv

, Zhendong Wu
, Juan Chen
:
Short Speech Key Generation Technology Based on Deep Learning. 422-435 - Weikai Lu, Jian Chen

, Hao Zheng, Haoyi Fan, Eng Yee Wei, Xinrong Cao, Deyang Zhang:
Domain Adversarial Interaction Network for Cross-Domain Fault Diagnosis. 436-446 - Xueqing Sun, Xiao Li, Fengyin Li:

A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain. 447-454 - Pengfei Huang, Wanqing Jie, Arthur Sandor Voundi Koe, Ruitao Hou, Hongyang Yan, Mourad Nouioua

, Phan Duc Thien
, Jacques Mbous Ikong, Camara Lancine:
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric. 455-468 - Yuxiang Li, Fakariah Hani Mohd Ali:

Research on Key Technologies for the Trusted Perception of Network Information for Big Data. 469-478 - Lanwei Zeng, Yudong Wang, Chang Zhu, Wenchao Jiang, Jiaxing Li:

Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network. 479-494 - Teng Peng, Xiaohong Wang:

Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm. 495-509 - Wenjun Li

, Anli Yan, Taoyu Zhu, Teng Huang, Xuandi Luo
, Shaowei Wang:
Towards Differentially Private Contrastive Learning. 510-520 - Shi Chen, Yubin Zhong:

Two-Stage High Precision Membership Inference Attack. 521-535 - Bomei Tan, Rong Yu:

Secure Storage Method for Network Resources of Professional Works Based on Decision Tree Algorithm. 536-549 - Jiaoxing Xu:

Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis. 550-564 - Junrong Ge, Xiaojiao Wang, Fengyin Li, Akshat Gaurav:

A Broad Learning System Based on the Idea of Vertical Federated Learning. 565-574 - Jianan Guo

, Lei Shang, Yilei Wang
, Tiancai Liang, Zhaojie Wang
, Hui An
:
PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency. 575-583 - Na Wang, Jian Jiao, Shangcheng Zhang, Jianwei Liu, Kaifa Zheng, Junsong Fu, Jiawen Qiao:

Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application. 584-608 - Xueming Qiao, Yao Tang, Yanhong Liu, Maomao Su, Chao Wang, Yansheng Fu, Xiaofang Li, Mingrui Wu, Qiang Fu, Dongjie Zhu:

A Event Extraction Method of Document-Level Based on the Self-attention Mechanism. 609-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














