default search action
3rd ML4CS 2020: Guangzhou, China
- Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang:
Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12487, Springer 2020, ISBN 978-3-030-62459-0 - Linli Zhu, Haci Mehmet Baskonus, Wei Gao:
Vulnerability Variants and Path Factors in Networks. 1-11 - Linli Zhu, Haci Mehmet Baskonus, Wei Gao:
A Variant of Sun Toughness and the Existence of Path Factors in Networks. 12-19 - Yu Pan, Haci Mehmet Baskonus, Wei Gao:
Network Adjacency Condition for Fractional (g, f, n', m)-Critical Covered Graphs. 20-30 - Weijie Han, Jingfeng Xue, Fuquan Zhang, Zhonghui Sun:
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System. 31-41 - Jian Xu, Xianming Yao, Jianhou Gan, Yu Sun:
Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain. 42-55 - Zhengfeng Huang, Xiandong Li, Shangjie Pan, Min Wang, Tianming Ni:
A SEU Immune Flip-Flop with Low Overhead. 56-65 - Zhi Li, Jifeng Feng, Jian Li, Xu Gou:
An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks. 66-78 - Meng Wang, Guanxiang Yin, Fei Du, Juan Wang, Yuejin Zhang:
Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error. 79-86 - Jiachi Zhang, Liu Liu, Kai Wang, Botao Han, Zheyan Piao, Dong Wang:
Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model. 87-97 - Yuling Li, Hongyong Yang, Yize Yang, Yuanshan Liu:
Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements. 98-111 - Mingju Yuan, Dongxiang Song, Bing Li:
A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication. 112-124 - Guan Li, Xin Xin Huang:
Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities. 125-136 - Yize Yang, Hongyong Yang, Fei Liu, Li Liu:
Group Movement of Multi-agent Systems with Diverse Delays. 137-146 - Jiaang Duan, Shasha Yang, Jianfeng Lu, Wenchao Jiang, Haibo Liu, Shuo Zhang:
Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control. 147-163 - Shasha Yang, Wenchao Jiang, Jiaang Duan, Zhengjie Huang, Jianfeng Lu:
Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing. 164-179 - Lingfan Zhuang, Liu Liu, Shuoshuo Dong, Yuanyuan Fan, Jiachi Zhang:
Research on High Reliable Wireless Channel Data Cleaning Method. 180-189 - Sheng Hong, Yining Zeng:
A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions. 190-200 - Sheng Hong, Tianyu Yue:
Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm. 201-213 - Xueqiang Li, Ming Tao:
Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm. 214-223 - Li Chen, Xin Huang, Hao Zhang, Ben Niu:
Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization. 224-234 - Ling Liu, Sen Liu, Ben Niu, Hui Tan:
A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search. 235-249 - Meng Ming, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang:
An Adaptive Data Protection Scheme for Optimizing Storage Space. 250-260 - Qingling Liu, Ding Yuan, Shubin Wang:
The Thinned Rectangular Array Based on Modified Interger Genetic Algorithm. 261-269 - Xiaojie Yu, Min Qiu, Lizhi Peng:
A Novel Method to Classify Videos Based VBR Trace. 270-282 - Pei Ren, Hui Liu, Fengyin Li:
Research on Friendvertising-Counter Technology in Big Data. 283-289 - Miao Li, Xuguang Bao, Liang Chang, Zhoubo Xu, Long Li:
A Survey of Researches on Personalized Bundle Recommendation Techniques. 290-304 - Zhenzhen Luo, Zhongyi Hu, Zuoyong Li:
Estimation of Motor Imagination Based on Consumer-Grade EEG Device. 305-314 - Qingling Liu, Shahid Sarfraz, Shubin Wang:
An Overview of Key Technologies and Challenges of 6G. 315-326 - Ben Niu, Bowen Xue:
Q-Learning-Based Adaptive Bacterial Foraging Optimization. 327-337 - Nwaike Kelechi, Shuang Geng:
Counterfactual Retrieval for Augmentation and Decisions. 338-346 - Jing Wang, Fuqi Song, Aihua Yin, Hui Chen:
Firefly Algorithm Based on Dynamic Step Change Strategy. 347-355 - Yuqin Zhu, Jiaxin Yang, Bingjie Shao, Liang Wang, Zhaohui Yuan:
Earthquakes Detection Scheme by Dynamic Time Warping on Smartphones. 356-369 - Qingping Cao, Yuqin Zhu, Mei He, Zhaohui Yuan:
Towards Accurate Seismic Events Detection Using Motion Sensors on Smartphones. 370-383 - Dejiang Wang, Yafeng Sun, Ji Song, Ying Huang:
A SEIR Model Optimization Using the Differential Evolution. 384-392 - Haibo Liu, Wenchao Jiang, Shasha Yang, Jianfeng Lu, Dongjun Ning:
Multi-term Multi-task Allocation for Mobile Crowdsensing with Weighted Max-Min Fairness. 393-404 - Wen-Na Zhang, Yun-Xia Liu, Jin Zhou, Yang Yang, Ngai-Fong Law:
An Improved Sensor Pattern Noise Estimation Method Based on Edge Guided Weighted Averaging. 405-415 - Dexin Wu, Jian Xu, Heng Liu:
Analysis of the Influence of Stylized-CIFAR10 Dataset on ResNet. 416-426 - Ying Wu, Zibo Qi, Ling Jiang, Changsheng Zhang, Jian Xu:
A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance Strategy. 427-435 - Weiwei Zhou:
Education for Bilingual Children in the Age of Artificial Intelligence. 436-442 - Fenghang Zhang, Linze Li, Yuxuan Jiang, Zhunan Zhou, Xiuli Wang:
Application of Fuzzy Comprehensive Evaluation in Environmental Adaptability of Poultry House. 443-451 - Min Lv, Cong Lin, Tianran Ma, Sheng Hong:
Performance Evaluation of Multirotor UAV by Considering the Balanced Pattern. 452-462 - Zifei Zhang, Kai Qiao, Lingyun Jiang, Linyuan Wang, Jian Chen, Bin Yan:
AdvJND: Generating Adversarial Examples with Just Noticeable Difference. 463-478 - Yan Gan, Tao Xiang, Mao Ye:
Squeeze Criterion GANs: Double Adversarial Learning Method. 479-493 - Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang:
A Feature-Based Detection System of Adversarial Sample Attack. 494-500 - Jintao Zhang, Zhenghao Liu, Liren Wu, Liwen Wu, Qing Duan, Junhui Liu:
GF-Attack: A Strategy to Improve the Performance of Adversarial Example. 501-513 - Zhaoxia Yin, Hua Wang, Jie Wang:
War: An Efficient Pre-processing Method for Defending Adversarial Attacks. 514-524 - Lulu Wang, Xiaoyu Zhang, Yi Xie, Xu Ma, Meixia Miao:
A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption. 525-539 - Yong Ding, Wenyao Liu, Yi Qin, Yujue Wang:
Smart Watchdog: A Lightweight Defending Mechanism Against Adversarial Transfer Learning. 540-549 - Yunhao Yang, Long Li, Liang Chang, Tianlong Gu:
A Poisoning Attack Against the Recognition Model Trained by the Data Augmentation Method. 550-561 - Gang Ma, Lingyun Shi, Zhitao Guan:
Adversarial Text Generation via Probability Determined Word Saliency. 562-571 - Huali Ren, Teng Huang:
Adversarial Example Attacks in the Physical World. 572-582 - Kanghua Mo, Teng Huang, Xiaoyu Xiang:
Querying Little Is Enough: Model Inversion Attack via Latent Information. 583-591 - Na Pang, Sheng Hong, Yang Pan, Yuqi Ji:
Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System. 592-602
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.