咨询与建议

限定检索结果

文献类型

  • 78 篇 会议
  • 3 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 72 篇 工学
    • 61 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 18 篇 信息与通信工程
    • 18 篇 生物工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 50 篇 理学
    • 40 篇 数学
    • 18 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 6 篇 化学
    • 4 篇 物理学
    • 3 篇 系统科学
    • 2 篇 大气科学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 5 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 7 篇 machine learning
  • 6 篇 deep learning
  • 4 篇 network security
  • 3 篇 learning systems
  • 3 篇 computer appl. i...
  • 3 篇 computers and ed...
  • 3 篇 multi agent syst...
  • 3 篇 systems and data...
  • 2 篇 reinforcement le...
  • 2 篇 support vector m...
  • 2 篇 deep neural netw...
  • 2 篇 generative adver...
  • 2 篇 digital storage
  • 2 篇 pixels
  • 2 篇 sentiment analys...
  • 2 篇 data visualizati...
  • 2 篇 cryptology
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 chemical activat...

机构

  • 13 篇 college of manag...
  • 8 篇 greater bay area...
  • 5 篇 school of comput...
  • 4 篇 fujian provincia...
  • 4 篇 institute of art...
  • 4 篇 great bay area i...
  • 3 篇 college of cyber...
  • 3 篇 key laboratory o...
  • 3 篇 guangzhou univer...
  • 3 篇 xidian universit...
  • 3 篇 beijing key labo...
  • 3 篇 michigan state u...
  • 3 篇 school of cyber ...
  • 3 篇 school of electr...
  • 3 篇 school of inform...
  • 3 篇 division of comp...
  • 3 篇 national key lab...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 2 篇 college of compu...

作者

  • 5 篇 niu ben
  • 4 篇 zhou tianwei
  • 4 篇 li zuoyong
  • 3 篇 xue bowen
  • 3 篇 hong sheng
  • 3 篇 xiaofeng chen
  • 3 篇 hongyang yan
  • 3 篇 geng shuang
  • 3 篇 li yuling
  • 3 篇 xiangliang zhang
  • 3 篇 yang yize
  • 3 篇 liu jia
  • 3 篇 yao yanqing
  • 3 篇 qiben yan
  • 3 篇 yang hongyong
  • 3 篇 liu yuanshan
  • 2 篇 xue jingfeng
  • 2 篇 wang fangwei
  • 2 篇 li qingru
  • 2 篇 cheng xianfu

语言

  • 81 篇 英文
检索条件"任意字段=3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020"
81 条 记 录,以下是31-40 订阅
排序:
A Verifiable E-Lottery Scheme  3rd
A Verifiable E-Lottery Scheme
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Zhang, Yin An, Fanglin Zhao, Kejie Ye, Jun School of Computer Science and Cyberspace Security Hainan University Haikou China
With the development of Internet and computer technology, e-lottery gradually becomes the main form of lottery tickets purchased buy people. The e-lottery existing at present only realizes the function that the tradit... 详细信息
来源: 评论
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting  1
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Xie, Qian Huang, Zheng Guo, Jie Qiu, Weidong Shanghai Jiao Tong University Shanghai China Westone Cryptologic Research Center Beijing China
Distributed Denial-of-Service (DDoS) attacks disrupts the availability of essential services, which are one of the most harmful threats in today’s Internet. Many DDoS detection algorithms based on machine learning te... 详细信息
来源: 评论
A Deep learning Approach to Radar Extrapolation  3rd
A Deep Learning Approach to Radar Extrapolation
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Yi, Lei Tian, Wei Wang, Xiang Xu, Xiaolong Nanjing University of Information Science and Technology Nanjing210044 China Institute for Climate and Application Research Nanjing China
Nowcasting is really important for citizen and industry since it matters to everyone on social and economic activities and is significant for monitoring and forecasting disasters. As the foundation of the task, radar ... 详细信息
来源: 评论
Optimal Group Consensus of Second-Order Multi-agent Systems  1
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Yang, Yize Yang, Hongyong Li, Yuling Liu, Yuanshan School of Information and Electrical Engineering Ludong University Yantai264025 China School of Electrical and Electronic Engineering University of Adelaide Adelaide Australia Key Laboratory of Cyber-Physical System and Intelligent Control in Universities of Shandong Ludong University Yantai264025 China
The optimal control problems play an important role in modern control theory. This paper focuses on the optimal problem for group flocking movement of multi-agent systems (MAS). Two new cost functions are proposed wit... 详细信息
来源: 评论
A Variant of Sun Toughness and the Existence of Path Factors in Networks  1
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Zhu, Linli Baskonus, Haci Mehmet Gao, Wei School of Computer Engineering Jiangsu University of Technology Changzhou213001 China Department of Mathematics and Science Education Faculty of Education Harran University Sanliurfa Turkey
Among several parameters in computer networks to measure its vulnerability, toughness is the most important one which has raised widespread concern from mathematicians and computer scientists. Starting from the requir... 详细信息
来源: 评论
Analysis on Industrial Internet Traffic Characteristics  3rd
Analysis on Industrial Internet Traffic Characteristics
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Chen, Shiyu Li, Qianmu Long, Huaqiu Jiang, Jian School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Intelligent Manufacturing Department Wuyi University Jiangmen529020 China Jiangsu Zhongtian Internet Technology Co. Ltd. Nantong226009 China
Digital economy is an important engine to promote high-quality growth of China’s economy. In the future, Chinese enterprises will face the inevitable requirement to transform from traditional economy to digital econo... 详细信息
来源: 评论
Q-learning-Based Adaptive Bacterial Foraging Optimization  3rd
Q-Learning-Based Adaptive Bacterial Foraging Optimization
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Niu, Ben Xue, Bowen College of Management Shenzhen University Shenzhen518060 China Great Bay Area International Institute for Innovation Shenzhen University Shenzhen518060 China
As a common biological heuristic algorithm, Bacterial Foraging Optimization (BFO) is often used to solve optimization problems. Aiming at increasing the solution accuracy and convergence performance while enhancing th... 详细信息
来源: 评论
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing  3rd
Attribute Propagation Enhanced Community Detection Model for...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Wang, Jiming Xie, Xueshuo Fang, Yaozheng Lu, Ye Li, Tao Wang, Guiling College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China New Jersey Institute of Technology NewarkNJ07102 United States
Bitcoin is a kind of decentralized cryptocurrency on a peer-to-peer network. Anonymity makes Bitcoin widely used in online payment but it is a disadvantage for regulatory purposes. We aim to de-anonymize Bitcoin to as... 详细信息
来源: 评论
An Imbalanced learning Based Method for Esophageal Squamous Cell Carcinoma (ESCC) Distant Metastasis Predicting  3rd
An Imbalanced Learning Based Method for Esophageal Squamous ...
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Li, Xuemei Yang, Bo Peng, Lizhi Li, Baosheng Zhu, Jian Educational Technology Center Shandong College of Traditional Chinese Medicine Yantai264199 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Department of Radiation Oncology Shandong Cancer Hospital affiliated to Shandong University Jinan250117 China
Accurately predicting distant metastasis is very important for esophageal squamous cell carcinoma (ESCC) patients, as it is a key evidence to determine the degree of this disease. Traditional metastasis predictions ar... 详细信息
来源: 评论
Squeeze Criterion GANs: Double Adversarial learning Method  3rd
Squeeze Criterion GANs: Double Adversarial Learning Method
收藏 引用
3rd international conference on machine learning for cyber security, ml4cs 2020
作者: Gan, Yan Xiang, Tao Ye, Mao College of Computer Science Chongqing University Chongqing400044 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
Generative adversarial networks (GANs) have attracted much attention since it is able to effective learn from an unknown real distribution. However, the instability of the training process greatly affects the quality ... 详细信息
来源: 评论