


default search action
3rd ML4CS 2020: Guangzhou, China
- Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:

Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12486, Springer 2020, ISBN 978-3-030-62222-0 - Ming Wan, Jinfang Li, Hao Luo, Kai Wang

, Yingjie Wang, Bailing Wang:
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation. 1-11 - Xuetao Zhang, Jinshuang Wang, Meng Sun, Yao Feng:

AndrOpGAN: An Opcode GAN for Android Malware Obfuscations. 12-25 - Weijie Han

, Jingfeng Xue, Fuquan Zhang, Yingfeng Zhang:
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model. 26-34 - Ziyu Wang, Weijie Han

, Yue Lu, Jingfeng Xue:
A Malware Classification Method Based on the Capsule Network. 35-49 - Fangwei Wang

, Shaojie Yang
, Changguang Wang
, Qingru Li
:
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning. 50-64 - Juan Wang, Meng Wang, Guanxiang Yin, Yuejin Zhang:

DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network. 65-72 - Yiguang Gong, Yunping Liu, Chuanyang Yin, Zhiyong Fan:

A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network for Effective Cyber Intrusion Detection. 73-88 - Yaming Zhang, Yan Liu:

An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs. 89-99 - Budong Xu, Yongqin Li, Xiaomei Yu:

A Scientometric Analysis of Malware Detection Research Based on CiteSpace. 100-110 - Budong Xu, Yongqin Li, Xiaomei Yu:

Malware Detection Based on Static and Dynamic Features Analysis. 111-124 - Hui Guo

, Shuguang Huang, Min Zhang, Zulie Pan, Fan Shi, Cheng Huang, Beibei Li
:
Classification of Malware Variant Based on Ensemble Learning. 125-139 - Lu Huang, Jingfeng Xue, Weijie Han

, Zixiao Kong, Zequn Niu:
Detection of Malicious Domains in APT via Mining Massive DNS Logs. 140-152 - Qian Xie, Zheng Huang, Jie Guo, Weidong Qiu:

Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting. 153-159 - Meng Zhao, Chen Jin, Lingmin Jin, Shenghua Teng, Zuoyong Li:

Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network. 160-169 - Lingmin Jin, Rui Ma, Meng Zhao, Shenghua Teng, Zuoyong Li:

Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network. 170-179 - Muhammad Aslam, Dengpan Ye, Muhammad Hanif, Muhammad Asad:

Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things. 180-194 - Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen:

A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices. 195-205 - Fan Wu

, Zhuoqun Xu
, Huanghe Liu
, Zongwei Zhu
:
Machine Learning Agricultural Application Based on the Secure Edge Computing Platform. 206-220 - Shen Jin, Xuesong Liang, Hao Tian:

QoS Investigation for Power Network with Distributed Control Services. 221-233 - Xuan Yan, Xiaolong Xu

, Yu Zheng, Fei Dai:
Fog Server Placement for Multimodality Data Fusion in Neuroimaging. 234-248 - Yuanshan Liu, Hongyong Yang, Yize Yang, Yuling Li:

Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance. 249-261 - Qi Zhao, Bo Zhang, Anli Yan, Shan Jing, Chuan Zhao:

Towards Privacy-Preserving Aggregated Prediction from SPDZ. 262-271 - Fengtian Kuang, Bo Mi, Darong Huang

:
A Secure Neural Network Prediction Model with Multiple Data Providers. 272-286 - Zhenfei Chen, Tianqing Zhu

, Chenguang Wang
, Wei Ren, Ping Xiong:
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility. 287-296 - Ting Yan, Dan Li:

A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations. 297-306 - Zhenwei Chen, Yinghui Zhang, Gang Han, Jiangyong He, Rui Guo, Dong Zheng:

Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks. 307-316 - Xuefeng Xu

, Yanqing Yao
, Lei Cheng
:
Deep Learning Algorithms Design and Implementation Based on Differential Privacy. 317-330 - Xiaosong Zhang, Ling Pang, Linhong Guo, Yuanzhang Li:

Building Undetectable Covert Channels Over Mobile Networks with Machine Learning. 331-339 - Xianfu Cheng

, Yanqing Yao
, Ao Liu
:
An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm. 340-354 - Ao Liu

, Yanqing Yao
, Xianfu Cheng
:
Recommender Systems with Condensed Local Differential Privacy. 355-365 - Suhang Wang, Chen Wang, Jian Xu:

Exploiting Bluetooth to Enquire Close Contacts Without Privacy Leakage. 366-375 - Datong Wu, Taotao Wu, Xiaotong Wu

:
A Differentially Private Random Decision Tree Classifier with High Utility. 376-385 - Ying Wang, Haojia Zhu, Fengyin Li:

Research on Blind Signature Based Anonymous Electronic Cash Scheme. 386-392 - Yin Zhang, Fanglin An, Kejie Zhao, Jun Ye:

A Verifiable E-Lottery Scheme. 393-401 - Xu Gou, Linbo Qing, Yi Wang, Mulin Xin:

Re-Training and Parameter Sharing with the Hash Trick for Compressing Convolutional Neural Networks. 402-416 - Ruidi Yang

:
Survey on Privacy-Preserving Machine Learning Protocols. 417-425 - Ruidi Yang

, Maohua Sun
:
Efficient Privacy-Preserving Binary Tree Search. 426-436 - Zheng Li

, Maohua Sun
:
Privacy-Preserving Classification of Personal Data with Fully Homomorphic Encryption: An Application to High-Quality Ionospheric Data Prediction. 437-446 - Dongxiang Song

, Mingju Yuan
:
An Improved Method for Data Storage Based on Blockchain Smart Contract. 447-460 - Yanling Hu:

Security Problems and Countermeasures of Network Accounting Information System. 461-469 - Shiyu Chen, Qianmu Li, Huaqiu Long

, Jian Jiang:
Analysis on Industrial Internet Traffic Characteristics. 470-483 - Ting Liu, Guanghui Yan, Gang Cai, Qiong Wang, Mingjie Yang:

User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality. 484-499 - Sheng Hong, Yue Wang:

Attack and Repair Strategies for Computer Network About Viruses. 500-510 - Meihui Lan, Wei Gao

:
Vulnerability Variants and Matching in Networks. 511-518 - Xiangxiang Jiang, Yuxi Ma, Gang Zhao, Xiaohui Kuang, Yuanzhang Li, Ruyun Zhang:

A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline. 519-529 - Xiang Li, Xinyang Deng, Wen Jiang:

A Novel Method of Network Security Situation Assessment Based on Evidential Network. 530-539 - Yanli Wang, Ying Zheng, Fengyin Li:

Research and Application of Digital Signature Technology. 540-546 - Hui Dou, Yuling Chen, Yangyang Long, Yuanchao Tu:

A Low Energy-Consuming Security Data Aggregation Protocol. 547-557 - Xinying Yu, Rui Ge, Fengyin Li:

Research on Blockchain-Based Identity Authentication Scheme in Social Networks. 558-565 - Xinyu Zhang, YuJun Liu, Yuling Chen, Zhan Wang:

A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy. 566-577 - Haining Yang

, Ye Su
, Jing Qin
, Jinhua Ma
, Huaxiong Wang
:
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. 578-592 - Wei Tang

, Yu-Ling Chen, Yun Yang:
A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold. 593-606 - Jiming Wang, Xueshuo Xie, Yaozheng Fang, Ye Lu, Tao Li, Guiling Wang

:
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing. 607-622 - Bing Zhang, Zhiyong Guo, Yangdan Ni, Meng Yang, Ruiying Cheng, Yu Xiao:

A Secure and Moderate Data Synchronization Method Based on Network Isolation. 623-633 - Shuai Zhang, Fuyou Miao:

Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring. 634-643

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














