語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine learning for cyber security ...
~
ML4CS (Conference) (2024 :)
FindBook
Google Book
Amazon
博客來
Machine learning for cyber security = 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Machine learning for cyber security/ edited by Yang Xiang, Jian Shen.
其他題名:
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
其他題名:
ML4CS 2024
其他作者:
Xiang, Yang.
團體作者:
ML4CS (Conference)
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xiii, 450 p. :ill., digital ;24 cm.
內容註:
Secure Resource Allocation via Constrained Deep Reinforcement Learning. -- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. -- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. -- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network. -- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. -- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid. -- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin. -- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. -- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning. -- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning. -- Automatic Software Vulnerability Detection in Binary Code. -- Malicious Code Detection Based On Generative Adversarial Model. -- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. -- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. -- A Malicious Websites Classifier Based on an Improved Relation Network. -- Unknown Category Malicious Traffic Detection Based on Contrastive Learning. -- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning. -- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. -- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection. -- Provable Data Auditing Scheme from Trusted Execution Environment. -- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints. -- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. -- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. -- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. -- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. -- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning. -- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. -- YOLO-LiteMax: An Improved Model for UAV Small Object Detection. -- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. -- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
Contained By:
Springer Nature eBook
標題:
Machine learning - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-4566-4
ISBN:
9789819645664
Machine learning for cyber security = 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
Machine learning for cyber security
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /[electronic resource] :ML4CS 2024edited by Yang Xiang, Jian Shen. - Singapore :Springer Nature Singapore :2025. - xiii, 450 p. :ill., digital ;24 cm. - Lecture notes in computer science,155661611-3349 ;. - Lecture notes in computer science ;15566..
Secure Resource Allocation via Constrained Deep Reinforcement Learning. -- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. -- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. -- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network. -- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. -- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid. -- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin. -- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. -- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning. -- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning. -- Automatic Software Vulnerability Detection in Binary Code. -- Malicious Code Detection Based On Generative Adversarial Model. -- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. -- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. -- A Malicious Websites Classifier Based on an Improved Relation Network. -- Unknown Category Malicious Traffic Detection Based on Contrastive Learning. -- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning. -- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. -- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection. -- Provable Data Auditing Scheme from Trusted Execution Environment. -- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints. -- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. -- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. -- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. -- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. -- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning. -- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. -- YOLO-LiteMax: An Improved Model for UAV Small Object Detection. -- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. -- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
This book constitutes the referred proceedings of the 6th International Conference on Machine Learning for Cyber Security, ML4CS 2024, held in Hangzhou, China, during December 27-29, 2024. The 30 full papers presented in this book were carefully reviewed and selected from 111 submissions. ML4CS is a well-recognized annual international forum for AI-driven security researchers to exchange ideas and present their works. The conference focus on topics such as blockchain, network security, system security, software security, threat intelligence, cybersecurity situational awareness and much many more.
ISBN: 9789819645664
Standard No.: 10.1007/978-981-96-4566-4doiSubjects--Topical Terms:
576368
Machine learning
--Congresses.
LC Class. No.: Q325.5
Dewey Class. No.: 006.31
Machine learning for cyber security = 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
LDR
:04387nmm a2200373 a 4500
001
2408804
003
DE-He213
005
20250401125249.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819645664
$q
(electronic bk.)
020
$a
9789819645657
$q
(paper)
024
7
$a
10.1007/978-981-96-4566-4
$2
doi
035
$a
978-981-96-4566-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q325.5
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
006.31
$2
23
090
$a
Q325.5
$b
.M685 2024
111
2
$a
ML4CS (Conference)
$n
(6th :
$d
2024 :
$c
Hangzhou, China)
$3
3781637
245
1 0
$a
Machine learning for cyber security
$h
[electronic resource] :
$b
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024 : proceedings /
$c
edited by Yang Xiang, Jian Shen.
246
3
$a
ML4CS 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 450 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15566
505
0
$a
Secure Resource Allocation via Constrained Deep Reinforcement Learning. -- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC. -- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature. -- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network. -- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning. -- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid. -- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin. -- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS. -- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning. -- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning. -- Automatic Software Vulnerability Detection in Binary Code. -- Malicious Code Detection Based On Generative Adversarial Model. -- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought. -- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms. -- A Malicious Websites Classifier Based on an Improved Relation Network. -- Unknown Category Malicious Traffic Detection Based on Contrastive Learning. -- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning. -- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models. -- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection. -- Provable Data Auditing Scheme from Trusted Execution Environment. -- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints. -- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection. -- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks. -- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps. -- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning. -- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning. -- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks. -- YOLO-LiteMax: An Improved Model for UAV Small Object Detection. -- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection. -- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
520
$a
This book constitutes the referred proceedings of the 6th International Conference on Machine Learning for Cyber Security, ML4CS 2024, held in Hangzhou, China, during December 27-29, 2024. The 30 full papers presented in this book were carefully reviewed and selected from 111 submissions. ML4CS is a well-recognized annual international forum for AI-driven security researchers to exchange ideas and present their works. The conference focus on topics such as blockchain, network security, system security, software security, threat intelligence, cybersecurity situational awareness and much many more.
650
0
$a
Machine learning
$x
Congresses.
$3
576368
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Xiang, Yang.
$3
1569045
700
1
$a
Shen, Jian.
$3
1680574
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15566.
$3
3781638
856
4 0
$u
https://doi.org/10.1007/978-981-96-4566-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9514302
電子資源
11.線上閱覽_V
電子書
EB Q325.5
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入