咨询与建议

限定检索结果

文献类型

  • 78 篇 会议
  • 3 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 72 篇 工学
    • 61 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 18 篇 信息与通信工程
    • 18 篇 生物工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 50 篇 理学
    • 40 篇 数学
    • 18 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 6 篇 化学
    • 4 篇 物理学
    • 3 篇 系统科学
    • 2 篇 大气科学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 5 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 7 篇 machine learning
  • 6 篇 deep learning
  • 4 篇 network security
  • 3 篇 learning systems
  • 3 篇 computer appl. i...
  • 3 篇 computers and ed...
  • 3 篇 multi agent syst...
  • 3 篇 systems and data...
  • 2 篇 reinforcement le...
  • 2 篇 support vector m...
  • 2 篇 deep neural netw...
  • 2 篇 generative adver...
  • 2 篇 digital storage
  • 2 篇 pixels
  • 2 篇 sentiment analys...
  • 2 篇 data visualizati...
  • 2 篇 cryptology
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 chemical activat...

机构

  • 13 篇 college of manag...
  • 8 篇 greater bay area...
  • 5 篇 school of comput...
  • 4 篇 fujian provincia...
  • 4 篇 institute of art...
  • 4 篇 great bay area i...
  • 3 篇 college of cyber...
  • 3 篇 key laboratory o...
  • 3 篇 guangzhou univer...
  • 3 篇 xidian universit...
  • 3 篇 beijing key labo...
  • 3 篇 michigan state u...
  • 3 篇 school of cyber ...
  • 3 篇 school of electr...
  • 3 篇 school of inform...
  • 3 篇 division of comp...
  • 3 篇 national key lab...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 2 篇 college of compu...

作者

  • 5 篇 niu ben
  • 4 篇 zhou tianwei
  • 4 篇 li zuoyong
  • 3 篇 xue bowen
  • 3 篇 hong sheng
  • 3 篇 xiaofeng chen
  • 3 篇 hongyang yan
  • 3 篇 geng shuang
  • 3 篇 li yuling
  • 3 篇 xiangliang zhang
  • 3 篇 yang yize
  • 3 篇 liu jia
  • 3 篇 yao yanqing
  • 3 篇 qiben yan
  • 3 篇 yang hongyong
  • 3 篇 liu yuanshan
  • 2 篇 xue jingfeng
  • 2 篇 wang fangwei
  • 2 篇 li qingru
  • 2 篇 cheng xianfu

语言

  • 81 篇 英文
检索条件"任意字段=3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020"
81 条 记 录,以下是21-30 订阅
排序:
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model  1
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Han, Weijie Xue, Jingfeng Zhang, Fuquan Zhang, Yingfeng School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Space Information Space Engineering University Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China Equipment Development Department Beijing100071 China
Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive approac... 详细信息
来源: 评论
machine learning Agricultural Application Based on the Secure Edge Computing Platform  1
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Fan, Wu Xu, Zhuoqun Liu, Huanghe Zongwei, Zhu Suzhou Institute for Advanced Study University of Science and Technology of China Suzhou215000 China Graduate School at Shenzhen Tsinghua University Shenzhen518055 China
machine learning (ml) is fast becoming a powerful tool for increasing agricultural production, for instance, ml predicts weather and yield through satellite images. Such approaches, however, most applications are base... 详细信息
来源: 评论
Querying Little Is Enough: Model Inversion Attack via Latent Information  3rd
Querying Little Is Enough: Model Inversion Attack via Latent...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Mo, Kanghua Huang, Teng Xiang, Xiaoyu Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou China College of Cyber Science Nankai University Tianjin China
With the development of machine learning (ml) technology, various online intelligent services use ml models to provide predictions. However, attacker may obtain privacy information of the model through interaction wit... 详细信息
来源: 评论
Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance  3rd
Event-Triggered Control for Distributed Optimal in Multi-age...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Liu, Yuanshan Yang, Hongyong Yang, Yize Li, Yuling School of Information and Electrical Engineering Ludong University Yantai264025 China School of Electrical and Electronic Engineering University of Adelaide Adelaide Australia Key Laboratory of Cyber-Physical System and Intelligent Control in Universities of Shandong Ludong University Yantai264025 China
In this paper, based on linear quadratic theory, the optimal control problem for multi-agent systems with external disturbances is studied. Firstly, the optimal distributed controller is designed by the performance in... 详细信息
来源: 评论
Building Undetectable Covert Channels Over Mobile Networks with machine learning  3rd
Building Undetectable Covert Channels Over Mobile Networks w...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Zhang, Xiaosong Pang, Ling Guo, Linhong Li, Yuanzhang Department of Computer Science and Technology Tangshan University Tangshan063000 China National Key Laboratory of Science and Technology on Information System Security Beijing100101 China School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China
Covert channel is an important way to transmit covert message and implement covert communication through the network. However, the existing research on covert channel cannot meet the security requirements of covert co... 详细信息
来源: 评论
A Novel Method of Network security Situation Assessment Based on Evidential Network  3rd
A Novel Method of Network Security Situation Assessment Base...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Li, Xiang Deng, Xinyang Jiang, Wen School of Electronics and Information Northwestern Polytechnical University Xi’an China Peng Cheng Laboratory Shenzhen China
Network security situation awareness is a new type of network security technology. It evaluates the network security situation in real time from a macro perspective. Also it can predict the trend of the development of... 详细信息
来源: 评论
Cross-Project Software Defect Prediction Based on Feature Selection and Transfer learning  3rd
Cross-Project Software Defect Prediction Based on Feature Se...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Lei, Tianwei Xue, Jingfeng Han, Weijie School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China School of Space Information Space Engineering University Beijing101416 China
Cross-project software defect prediction solves the problem that traditional defect prediction can’t get enough data, but how to apply the model learned from the data of different mechanisms to the target data set is... 详细信息
来源: 评论
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting  1
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Xie, Qian Huang, Zheng Guo, Jie Qiu, Weidong Shanghai Jiao Tong University Shanghai China Westone Cryptologic Research Center Beijing China
Distributed Denial-of-Service (DDoS) attacks disrupts the availability of essential services, which are one of the most harmful threats in today’s Internet. Many DDoS detection algorithms based on machine learning te... 详细信息
来源: 评论
A File-Level Continuous Data Protection Scheme for Enforcing security Baseline  3rd
A File-Level Continuous Data Protection Scheme for Enforcing...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Jiang, Xiangxiang Ma, Yuxi Zhao, Gang Kuang, Xiaohui Li, Yuanzhang Zhang, Ruyun School of Computer Science and Technology Beijing Institute of Technology Beijing China Artificial Intelligence and Blockchain Guangzhou University Guangzhou China National Key Laboratory of Science and Technology on Information System Security Beijing China Zhejiang Lab HangzhouZhejiang China
Massive data is the basis of machine learning, and continuous data protection is an effective means to ensure data integrity and availability. At present, continuous data protection adopts the same backup strategy in ... 详细信息
来源: 评论
An Adaptive Data Protection Scheme for Optimizing Storage Space  3rd
An Adaptive Data Protection Scheme for Optimizing Storage Sp...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Ming, Meng Zhao, Gang Kuang, Xiaohui Liu, Lu Zhang, Ruyun School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou China National Key Laboratory of Science and Technology on Information System Security Beijing China Zhejiang Lab HangzhouZhejiang Province China
Data is the main driving factor of artificial intelligence represented by machine learning, and how to ensure data security is one of the severe challenges. In many traditional methods, a single snapshot strategy is u... 详细信息
来源: 评论