You are here

Back to top

Machine Learning for Cyber Security: Second International Conference, Ml4cs 2019, Xi'an, China, September 19-21, 2019, Proceedings (Paperback)

Machine Learning for Cyber Security: Second International Conference, Ml4cs 2019, Xi'an, China, September 19-21, 2019, Proceedings Cover Image
By Xiaofeng Chen (Editor), Xinyi Huang (Editor), Jun Zhang (Editor)
$71.49
Usually Ships in 1-5 Days

Description


Network Data Collection, Fusion, Mining and Analytics for Cyber Security.- Malicious Web Request Detection Using Character-level CNN.- A LBP Texture Analysis Based Liveness Detection for Face Authentication.- A Survey on Deep Learning Techniques for Privacy-Preserving.- Quantifiable Network Security Measurement: A Study Based on an Index System.- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.- Password Guessing via Neural Language Modeling.- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing.- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment.- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones.- An Enumeration-like Vector Sampling Method for Solving Approximate SVP.- Secure Multiparty Learning from Aggregation of Locally Trained Models.- Data-Driven Android Malware Intelligence: A Survey.- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing.- Content Recognition of Network Traffic Using Wavelet Transform and CNN.- Compositional Information Flow Verification for Inter Application Communications in Android System.- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System.- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms.- Interpretable Encrypted Searchable Neural Networks.- Game Theory Based Dynamic Defense Mechanism for SDN.- A Visualization-based Analysis on Classifying Android Malware.- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming.- A fair and efficient secret sharing scheme based on cloud assisting.- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data.- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness.

Product Details
ISBN: 9783030306182
ISBN-10: 3030306186
Publisher: Springer
Publication Date: September 12th, 2019
Pages: 398
Language: English
Series: Lecture Notes in Computer Science