the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a sto...
ISBN:
(纸本)9783030042110
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a storm-based parallel clustering algorithm of streaming data;iterative maximum clique clustering based detection filter;towards a compact and effective representation for datasets with inhomogeneous clusters;adaptive fuzzy clustering algorithm withlocal information and markov random field for image segmentation;efficient direct structured subspace clustering;privacy-preserving K-means clustering upon negative databases;self-paced multi-task multi-view capped-norm clustering;shape clustering as a type of procrustes analysis;anthropometric features based gait pattern prediction using random forest for patient-specific gait training;aspect-level sentiment classification with conv-attention mechanism;Attention-based combination of CNN and RNN for relation classification;discrete sparse hashing for cross-modal similarity search;solving the double dummy bridge problem with shallow autoencoders;cross-project issue classification based on ensemble modeling in a social coding world;decision tree twin support vector machine based on kernel clustering for multi-class classification;machine learning techniques for classification of livestock behavior;two-stage attention network for aspect-level sentiment classification;the fuzzy misclassification analysis with deep neural network for handling class noise problem;a neuronal morphology classification approach based on deep residual neural networks;Robust multi-view features fusion method based on CNMF;privacy-preserving naive bayes classification using fully homomorphic encryption;classification of calligraphy style based on convolutional neural network;tropical fruits classification using an alexnet-type convolutional neural network and image augmentation;supervised and semi-supervised multi-task binary classification.
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a sto...
ISBN:
(纸本)9783030042202
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a storm-based parallel clustering algorithm of streaming data;iterative maximum clique clustering based detection filter;towards a compact and effective representation for datasets with inhomogeneous clusters;adaptive fuzzy clustering algorithm withlocal information and markov random field for image segmentation;efficient direct structured subspace clustering;privacy-preserving K-means clustering upon negative databases;self-paced multi-task multi-view capped-norm clustering;shape clustering as a type of procrustes analysis;anthropometric features based gait pattern prediction using random forest for patient-specific gait training;aspect-level sentiment classification with conv-attention mechanism;Attention-based combination of CNN and RNN for relation classification;discrete sparse hashing for cross-modal similarity search;solving the double dummy bridge problem with shallow autoencoders;cross-project issue classification based on ensemble modeling in a social coding world;decision tree twin support vector machine based on kernel clustering for multi-class classification;machine learning techniques for classification of livestock behavior;two-stage attention network for aspect-level sentiment classification;the fuzzy misclassification analysis with deep neural network for handling class noise problem;a neuronal morphology classification approach based on deep residual neural networks;Robust multi-view features fusion method based on CNMF;privacy-preserving naive bayes classification using fully homomorphic encryption;classification of calligraphy style based on convolutional neural network;tropical fruits classification using an alexnet-type convolutional neural network and image augmentation;supervised and semi-supervised multi-task binary classification.
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a sto...
ISBN:
(纸本)9783030041816
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a storm-based parallel clustering algorithm of streaming data;iterative maximum clique clustering based detection filter;towards a compact and effective representation for datasets with inhomogeneous clusters;adaptive fuzzy clustering algorithm withlocal information and markov random field for image segmentation;efficient direct structured subspace clustering;privacy-preserving K-means clustering upon negative databases;self-paced multi-task multi-view capped-norm clustering;shape clustering as a type of procrustes analysis;anthropometric features based gait pattern prediction using random forest for patient-specific gait training;aspect-level sentiment classification with conv-attention mechanism;Attention-based combination of CNN and RNN for relation classification;discrete sparse hashing for cross-modal similarity search;solving the double dummy bridge problem with shallow autoencoders;cross-project issue classification based on ensemble modeling in a social coding world;decision tree twin support vector machine based on kernel clustering for multi-class classification;machine learning techniques for classification of livestock behavior;two-stage attention network for aspect-level sentiment classification;the fuzzy misclassification analysis with deep neural network for handling class noise problem;a neuronal morphology classification approach based on deep residual neural networks;Robust multi-view features fusion method based on CNMF;privacy-preserving naive bayes classification using fully homomorphic encryption;classification of calligraphy style based on convolutional neural network;tropical fruits classification using an alexnet-type convolutional neural network and image augmentation;supervised and semi-supervised multi-task binary classification.
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a sto...
ISBN:
(纸本)9783030042387
the proceedings contain 401 papers. the special focus in this conference is on Neural Information Processing. the topics include: Discovering similarities in malware behaviors by clustering of API call sequences;a storm-based parallel clustering algorithm of streaming data;iterative maximum clique clustering based detection filter;towards a compact and effective representation for datasets with inhomogeneous clusters;adaptive fuzzy clustering algorithm withlocal information and markov random field for image segmentation;efficient direct structured subspace clustering;privacy-preserving K-means clustering upon negative databases;self-paced multi-task multi-view capped-norm clustering;shape clustering as a type of procrustes analysis;anthropometric features based gait pattern prediction using random forest for patient-specific gait training;aspect-level sentiment classification with conv-attention mechanism;Attention-based combination of CNN and RNN for relation classification;discrete sparse hashing for cross-modal similarity search;solving the double dummy bridge problem with shallow autoencoders;cross-project issue classification based on ensemble modeling in a social coding world;decision tree twin support vector machine based on kernel clustering for multi-class classification;machine learning techniques for classification of livestock behavior;two-stage attention network for aspect-level sentiment classification;the fuzzy misclassification analysis with deep neural network for handling class noise problem;a neuronal morphology classification approach based on deep residual neural networks;Robust multi-view features fusion method based on CNMF;privacy-preserving naive bayes classification using fully homomorphic encryption;classification of calligraphy style based on convolutional neural network;tropical fruits classification using an alexnet-type convolutional neural network and image augmentation;supervised and semi-supervised multi-task binary classification.
the Vehicular Ad-hoc networks (VANET) raises as an emerging technology for smart transport as observed in the recent decade. However, there are some hurdles affect the applications of VANET, the advancement of VANET n...
详细信息
Withthe progress in space technologies, the future integrated network incorporating ground internet and spatial network is emerging as the times require. the particularity of space application requires secure transmi...
详细信息
ISBN:
(纸本)9781509063529
Withthe progress in space technologies, the future integrated network incorporating ground internet and spatial network is emerging as the times require. the particularity of space application requires secure transmission and storage of mass data. these data contain a lot of repeating data, which occupy an enormous storage space and many network bandwidth resources. How to efficiently delete the repeating data while ensuring the data confidentiality poses a great challenge to the data deduplication technology. this paper proposes a secure data deduplication scheme to be implemented in the integrated network In this scheme, many key servers are distributed into the entire network so that the client can be linked to several nearby key servers at any time. then a key generated by a key server is chosen randomly. the key fingerprint is saved to the key fingerprint server to ensure that the data withthe same attributes can be encrypted by the same key for the purpose of ciphertext deduplication. the theoretical analysis shows that, compared with DupLESS and threshold blind signature, this scheme improves the security of the deduplication system, avoids a single point of failure, simplifies the signature verification, and thus reduces the computational overhead at the client side.
the development of human civilization today can't be separated from the Artificial Intelligence. To prepare for this, early education on Artificial intelligent should be done. Some activities have been done to sup...
详细信息
the modernization of the traditional distribution systems toward the so-called smart grid creates an environment conducive for the applications of distribution system state estimators. In this paper, two distribution ...
详细信息
An essential requirement in operating a carrier-grade network (CGN) is ensuring the high availability and reliability. Software-defined networking (SDN) is expected to address such requirement while improving the netw...
详细信息
ISBN:
(纸本)9783901882982
An essential requirement in operating a carrier-grade network (CGN) is ensuring the high availability and reliability. Software-defined networking (SDN) is expected to address such requirement while improving the network management. One challenging issue faced in the process of enhancing the reliability of SDN-enabled CGN is how to achieve rapid recovery with minimal effort. there are two well-known approaches to determine the failover scope: end-to-end (global) detouring and local detouring. Particularly, the local detouring approach provides an efficient means to achieve faster recovery, as it locally detours the disrupted flows around the failed network components using a preconfigured alternative path. However, it requires thousands of flow entries per switch to be configured. To address the technical challenges, we propose a fault-tolerant forwarding table design (FFTD), which groups the flows using group entries and aggregates the flows using a tagging mechanism for scalable and rapid recovery from the dual-failures of switches or links without overburdening the controller and the flow table's memory. Our extensive emulation results reveal that the proposed FFTD satisfies the CGN's 50 ms recovery requirement. Additionally, it reduces the alternate path flow storage requirement by up to 99%.
the volume, velocity, variety, veracity and value of data currently produced and consumed by different types of information systems turned big Data into a phenomena of study. For data variety, temporal data commonly r...
详细信息
暂无评论