


default search action
3rd ML4CS 2020: Guangzhou, China
- Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:

Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12487, Springer 2020, ISBN 978-3-030-62459-0 - Linli Zhu

, Haci Mehmet Baskonus
, Wei Gao
:
Vulnerability Variants and Path Factors in Networks. 1-11 - Linli Zhu

, Haci Mehmet Baskonus
, Wei Gao
:
A Variant of Sun Toughness and the Existence of Path Factors in Networks. 12-19 - Yu Pan, Haci Mehmet Baskonus

, Wei Gao
:
Network Adjacency Condition for Fractional (g, f, n', m)-Critical Covered Graphs. 20-30 - Weijie Han

, Jingfeng Xue, Fuquan Zhang, Zhonghui Sun:
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System. 31-41 - Jian Xu, Xianming Yao, Jianhou Gan, Yu Sun:

Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain. 42-55 - Zhengfeng Huang

, Xiandong Li
, Shangjie Pan
, Min Wang
, Tianming Ni
:
A SEU Immune Flip-Flop with Low Overhead. 56-65 - Zhi Li, Jifeng Feng, Jian Li, Xu Gou:

An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks. 66-78 - Meng Wang, Guanxiang Yin, Fei Du, Juan Wang, Yuejin Zhang:

Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error. 79-86 - Jiachi Zhang, Liu Liu, Kai Wang, Botao Han, Zheyan Piao, Dong Wang:

Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model. 87-97 - Yuling Li, Hongyong Yang, Yize Yang, Yuanshan Liu:

Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements. 98-111 - Mingju Yuan

, Dongxiang Song
, Bing Li
:
A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication. 112-124 - Guan Li, Xin Xin Huang:

Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities. 125-136 - Yize Yang

, Hongyong Yang
, Fei Liu
, Li Liu
:
Group Movement of Multi-agent Systems with Diverse Delays. 137-146 - Jiaang Duan, Shasha Yang

, Jianfeng Lu, Wenchao Jiang, Haibo Liu, Shuo Zhang:
Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control. 147-163 - Shasha Yang

, Wenchao Jiang, Jiaang Duan, Zhengjie Huang, Jianfeng Lu:
Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing. 164-179 - Lingfan Zhuang, Liu Liu, Shuoshuo Dong, Yuanyuan Fan, Jiachi Zhang:

Research on High Reliable Wireless Channel Data Cleaning Method. 180-189 - Sheng Hong, Yining Zeng:

A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions. 190-200 - Sheng Hong, Tianyu Yue:

Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm. 201-213 - Xueqiang Li

, Ming Tao
:
Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm. 214-223 - Li Chen, Xin Huang, Hao Zhang, Ben Niu:

Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization. 224-234 - Ling Liu

, Sen Liu
, Ben Niu, Hui Tan
:
A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search. 235-249 - Meng Ming, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang:

An Adaptive Data Protection Scheme for Optimizing Storage Space. 250-260 - Qingling Liu, Ding Yuan, Shubin Wang:

The Thinned Rectangular Array Based on Modified Interger Genetic Algorithm. 261-269 - Xiaojie Yu, Min Qiu, Lizhi Peng:

A Novel Method to Classify Videos Based VBR Trace. 270-282 - Pei Ren, Hui Liu, Fengyin Li:

Research on Friendvertising-Counter Technology in Big Data. 283-289 - Miao Li

, Xuguang Bao, Liang Chang, Zhoubo Xu, Long Li:
A Survey of Researches on Personalized Bundle Recommendation Techniques. 290-304 - Zhenzhen Luo, Zhongyi Hu, Zuoyong Li:

Estimation of Motor Imagination Based on Consumer-Grade EEG Device. 305-314 - Qingling Liu, Shahid Sarfraz, Shubin Wang:

An Overview of Key Technologies and Challenges of 6G. 315-326 - Ben Niu, Bowen Xue:

Q-Learning-Based Adaptive Bacterial Foraging Optimization. 327-337 - Nwaike Kelechi, Shuang Geng:

Counterfactual Retrieval for Augmentation and Decisions. 338-346 - Jing Wang

, Fuqi Song, Aihua Yin, Hui Chen:
Firefly Algorithm Based on Dynamic Step Change Strategy. 347-355 - Yuqin Zhu

, Jiaxin Yang, Bingjie Shao
, Liang Wang
, Zhaohui Yuan
:
Earthquakes Detection Scheme by Dynamic Time Warping on Smartphones. 356-369 - Qingping Cao

, Yuqin Zhu
, Mei He
, Zhaohui Yuan
:
Towards Accurate Seismic Events Detection Using Motion Sensors on Smartphones. 370-383 - Dejiang Wang, Yafeng Sun, Ji Song, Ying Huang:

A SEIR Model Optimization Using the Differential Evolution. 384-392 - Haibo Liu, Wenchao Jiang, Shasha Yang, Jianfeng Lu, Dongjun Ning:

Multi-term Multi-task Allocation for Mobile Crowdsensing with Weighted Max-Min Fairness. 393-404 - Wen-Na Zhang, Yun-Xia Liu, Jin Zhou, Yang Yang, Ngai-Fong Law:

An Improved Sensor Pattern Noise Estimation Method Based on Edge Guided Weighted Averaging. 405-415 - Dexin Wu, Jian Xu, Heng Liu:

Analysis of the Influence of Stylized-CIFAR10 Dataset on ResNet. 416-426 - Ying Wu, Zibo Qi, Ling Jiang, Changsheng Zhang, Jian Xu:

A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance Strategy. 427-435 - Weiwei Zhou

:
Education for Bilingual Children in the Age of Artificial Intelligence. 436-442 - Fenghang Zhang, Linze Li, Yuxuan Jiang, Zhunan Zhou, Xiuli Wang:

Application of Fuzzy Comprehensive Evaluation in Environmental Adaptability of Poultry House. 443-451 - Min Lv, Cong Lin, Tianran Ma, Sheng Hong:

Performance Evaluation of Multirotor UAV by Considering the Balanced Pattern. 452-462 - Zifei Zhang, Kai Qiao, Lingyun Jiang, Linyuan Wang, Jian Chen, Bin Yan:

AdvJND: Generating Adversarial Examples with Just Noticeable Difference. 463-478 - Yan Gan, Tao Xiang

, Mao Ye
:
Squeeze Criterion GANs: Double Adversarial Learning Method. 479-493 - Fangwei Wang

, Yuanyuan Lu
, Qingru Li
, Changguang Wang
:
A Feature-Based Detection System of Adversarial Sample Attack. 494-500 - Jintao Zhang, Zhenghao Liu, Liren Wu, Liwen Wu, Qing Duan, Junhui Liu:

GF-Attack: A Strategy to Improve the Performance of Adversarial Example. 501-513 - Zhaoxia Yin

, Hua Wang
, Jie Wang
:
War: An Efficient Pre-processing Method for Defending Adversarial Attacks. 514-524 - Lulu Wang, Xiaoyu Zhang, Yi Xie

, Xu Ma, Meixia Miao:
A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption. 525-539 - Yong Ding, Wenyao Liu

, Yi Qin, Yujue Wang:
Smart Watchdog: A Lightweight Defending Mechanism Against Adversarial Transfer Learning. 540-549 - Yunhao Yang, Long Li, Liang Chang, Tianlong Gu:

A Poisoning Attack Against the Recognition Model Trained by the Data Augmentation Method. 550-561 - Gang Ma, Lingyun Shi, Zhitao Guan:

Adversarial Text Generation via Probability Determined Word Saliency. 562-571 - Huali Ren, Teng Huang

:
Adversarial Example Attacks in the Physical World. 572-582 - Kanghua Mo, Teng Huang, Xiaoyu Xiang:

Querying Little Is Enough: Model Inversion Attack via Latent Information. 583-591 - Na Pang, Sheng Hong, Yang Pan, Yuqi Ji:

Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System. 592-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














