No abstract available.
Front Matter
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation
Under the tendency of interconnection and interoperability in Industrial Internet, anomaly detection, which has been widely recognized, has achieved modest accomplishments in industrial cyber security. However, a significant issue is how to ...
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations
With the rapid development of Android platform, the number of Android malwares is growing rapidly. Due to the limitations of traditional static and runtime Android malware analysis methods, machine learning based approaches are widely adopted ...
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model
Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive approach to recognize these security ...
A Malware Classification Method Based on the Capsule Network
Malware has become a serious threat to network security. Traditional static analysis methods usually cannot effectively detect packers, obfuscations, and variants. Dynamic analysis is not efficient when dealing with large amounts of malware. ...
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning
In recent years, frequent occurrence of network security incidents indicates that host security is more and more fragile. However, current protection tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they give up active defense and ...
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network
In order to improve the real-time efficiency of expressway operation monitoring and management, the anomaly detection in intelligent monitoring network (IMN) of expressway based on edge computing and deep learning is studied. The video data ...
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network for Effective Cyber Intrusion Detection
In this paper, a novel two-phase cycle training algorithm based on multi-objective genetic algorithm (MOGA) and modified back propagation neural network (MBPNN), namely TPC-MOGA-MBPNN, is proposed for effective intrusion detection based on ...
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs
Wireless sensor network is regarded as one of the ten emerging technologies that will change the world in the 21st century. The related basic theories, key technologies and application models have been widely studied in the industry and academia. ...
A Scientometric Analysis of Malware Detection Research Based on CiteSpace
In recent years, the increasing number of malicious software has led to more and more serious security threats to computers or network. The researches have been devoting significant efforts to solve the numerous challenges in malware detection and ...
Malware Detection Based on Static and Dynamic Features Analysis
Machine learning algorithms are widely used in malware detection where successful analysis on static and dynamic features plays a crucial role in process of detecting malicious samples. In this paper, the potential malicious features are ...
Classification of Malware Variant Based on Ensemble Learning
To explore the classification of malware variants, a malware variant detection method is proposed based on the code visualization method and ensemble learning model. First, malware binary data was transformed into a gray-scale image and the GIST ...
Detection of Malicious Domains in APT via Mining Massive DNS Logs
With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C&C communication has become the most ...
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting
Distributed Denial-of-Service (DDoS) attacks disrupts the availability of essential services, which are one of the most harmful threats in today’s Internet. Many DDoS detection algorithms based on machine learning technology have emerged in recent ...
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network
Cerebral microbleeds (CMBs) are important imaging and diagnostic biomarkers for cerebrovascular diseases and cognitive dysfunctions. Reliable detection of the location and amount of CMBs in brain tissue is crucial for the diagnosis, prevention and ...
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network
Accurate segmentation of liver tumors is an important guarantee for the success of liver cancer surgery, where convolutional network has been a type of popular method. However, the performance of the traditional convolutional network is limited by ...
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things
Advancements of Internet of Things (IoT) enhance the application spectrum of smart networking and demand intelligent security measurements against cyber-attacks. Recent integration of Software Defined Networking (SDN) in IoT environments provides ...
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices
Keyword Spotting (KWS) is a significant branch of Automatic Speech Recognition (ASR), which has been widely used in edge computing devices. The goal of KWS is to provide high accuracy at a low false alarm rate (FAR) while reducing the costs of ...
Machine Learning Agricultural Application Based on the Secure Edge Computing Platform
Machine learning (ML) is fast becoming a powerful tool for increasing agricultural production, for instance, ML predicts weather and yield through satellite images. Such approaches, however, most applications are based on expensive cloud servers ...
QoS Investigation for Power Network with Distributed Control Services
In this paper, a distributed control scheme of key technologies is designed, which mainly includes QoS (quality of service) identification module and QoS routing optimization module. At the same time, a new routing method is designed to transform ...
Fog Server Placement for Multimodality Data Fusion in Neuroimaging
Since the findings of the single modality data are unable to provide sufficient sensitivity and specificity for diagnostic measures, multimodality data fusion is adopted in the neuroimaging to detect the important differences between patients and ...
Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance
In this paper, based on linear quadratic theory, the optimal control problem for multi-agent systems with external disturbances is studied. Firstly, the optimal distributed controller is designed by the performance index function without the ...
Towards Privacy-Preserving Aggregated Prediction from SPDZ
Machine learning models trained on data collected from multiple parties can offer prediction services to clients. However, it raises privacy concerns for both model owners and clients. The models may disclose the details of the training data ...
A Secure Neural Network Prediction Model with Multiple Data Providers
With the rapid development of neural network theory, the issue of privacy has attracted much attention, especially for the prediction or classification of some sensitive information, a neural network model that can protect privacy is needed. On ...
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility
While we enjoy high-quality social network services, image privacy is also under great privacy threats. With the development of deep learning-driven face recognition technologies, traditional protection methods are facing challenges. How to ...
A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations
The powerful storage function and convenient service function of cloud computing attract more and more users to save their digit image on the cloud server. However, the insecure data transmission process of cloud computing may lead to the ...
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, ...
Deep Learning Algorithms Design and Implementation Based on Differential Privacy
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential Privacy-Stochastic Gradient ...
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning
Covert channel is an important way to transmit covert message and implement covert communication through the network. However, the existing research on covert channel cannot meet the security requirements of covert communication in the complex ...
Index Terms
- Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I