skip to main content
Show Results with: Show Results with:

Machine learning for cyber security : second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings / Xiaofeng Chen, Xinyi Huang, Jun Zhang (eds.).

ML4CS (Conference) (2nd : 2019 : Xi'an Shi, China)

Cham, Switzerland : Springer, 2019.

Online access

  • Title:
    Machine learning for cyber security : second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings / Xiaofeng Chen, Xinyi Huang, Jun Zhang (eds.).
  • Author: ML4CS (Conference) (2nd : 2019 : Xi'an Shi, China)
  • Contributor: Xiaofeng Chen 1976- editor.;
    Xinyi Huang (Computer scientist), editor.;
    Jun Zhang editor.
  • Other Titles: Variant Title: ML4CS 2019
  • Subjects: Machine learning -- Congresses; Computer security -- Congresses; Internet -- Security measures -- Congresses; Electronic books;
    Dewey: 006.3/1
  • Rights: Terms governing use: Copyright.
    Access restrictions: NON_PRINT_LEGAL_DEPOSIT
  • Publication Details: Cham, Switzerland : Springer, 2019.
  • Language: English
  • Description: Contents: Network Data Collection, Fusion,
    Contents: Mining and Analytics for Cyber Security.- Malicious Web Request Detection Using Character-level CNN.- A LBP Texture Analysis Based Liveness Detection for Face Authentication.- A Survey on Deep Learning Techniques for Privacy-Preserving.- Quantifiable Network Security Measurement: A Study Based on an Index System.- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.- Password Guessing via Neural Language Modeling.- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing.- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment.- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones.- An Enumeration-like Vector Sampling Method for Solving Approximate SVP.- Secure Multiparty Learning from Aggregation of Locally Trained Models.- Data-Driven Android Malware
    Contents: Intelligence: A Survey.- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing.- Content Recognition of Network Traffic Using Wavelet Transform and CNN.- Compositional Information Flow Verification for Inter Application Communications in Android System.- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System.- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms.- Interpretable Encrypted Searchable Neural Networks.- Game Theory Based Dynamic Defense Mechanism for SDN.- A Visualization-based Analysis on Classifying Android Malware.- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming.- A fair and efficient secret sharing scheme based on cloud assisting.- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data.- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users'
    Contents: Awareness.
  • Identifier: ISBN 9783030306199 (electronic bk.); ISBN 3030306194 (electronic bk.); ISBN (print)
    10.1007/978-3-030-30619-9 doi; BNB GBB9G3450; System number: 019544409
  • Notes: International conference proceedings.
    Includes author index.
  • Physical Description: 1 online resource (xiii, 398 pages) : illustrations (some color).
  • Series: Lecture notes in computer science ; 11806
    LNCS sublibrary. SL 4, Security and cryptology
  • Shelfmark(s): General Reference Collection DRT ELD.DS.456345
  • UIN: BLL01019544409

Searching Remote Databases, Please Wait