skip to main content
10.1007/978-3-030-62223-7guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I
2020 Proceeding
  • Editors:
  • Xiaofeng Chen,
  • Hongyang Yan,
  • Qiben Yan,
  • Xiangliang Zhang
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Machine Learning for Cyber SecurityGuangzhou, China8 October 2020
ISBN:
978-3-030-62222-0
Published:
08 October 2020

Reflects downloads up to 29 Jan 2025Bibliometrics
Abstract

No abstract available.

front-matter
Front Matter
Pages i–xxvii
back-matter
Back Matter
Article
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation
Abstract

Under the tendency of interconnection and interoperability in Industrial Internet, anomaly detection, which has been widely recognized, has achieved modest accomplishments in industrial cyber security. However, a significant issue is how to ...

Article
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations
Abstract

With the rapid development of Android platform, the number of Android malwares is growing rapidly. Due to the limitations of traditional static and runtime Android malware analysis methods, machine learning based approaches are widely adopted ...

Article
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model
Abstract

Although being isolated from the external network, the private network is still faced with some security threats, such as violations communications, malware attacks, and illegal operations. It is an attractive approach to recognize these security ...

Article
A Malware Classification Method Based on the Capsule Network
Abstract

Malware has become a serious threat to network security. Traditional static analysis methods usually cannot effectively detect packers, obfuscations, and variants. Dynamic analysis is not efficient when dealing with large amounts of malware. ...

Article
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning
Abstract

In recent years, frequent occurrence of network security incidents indicates that host security is more and more fragile. However, current protection tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they give up active defense and ...

Article
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network
Abstract

In order to improve the real-time efficiency of expressway operation monitoring and management, the anomaly detection in intelligent monitoring network (IMN) of expressway based on edge computing and deep learning is studied. The video data ...

Article
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network for Effective Cyber Intrusion Detection
Abstract

In this paper, a novel two-phase cycle training algorithm based on multi-objective genetic algorithm (MOGA) and modified back propagation neural network (MBPNN), namely TPC-MOGA-MBPNN, is proposed for effective intrusion detection based on ...

Article
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs
Abstract

Wireless sensor network is regarded as one of the ten emerging technologies that will change the world in the 21st century. The related basic theories, key technologies and application models have been widely studied in the industry and academia. ...

Article
A Scientometric Analysis of Malware Detection Research Based on CiteSpace
Abstract

In recent years, the increasing number of malicious software has led to more and more serious security threats to computers or network. The researches have been devoting significant efforts to solve the numerous challenges in malware detection and ...

Article
Malware Detection Based on Static and Dynamic Features Analysis
Abstract

Machine learning algorithms are widely used in malware detection where successful analysis on static and dynamic features plays a crucial role in process of detecting malicious samples. In this paper, the potential malicious features are ...

Article
Classification of Malware Variant Based on Ensemble Learning
Abstract

To explore the classification of malware variants, a malware variant detection method is proposed based on the code visualization method and ensemble learning model. First, malware binary data was transformed into a gray-scale image and the GIST ...

Article
Detection of Malicious Domains in APT via Mining Massive DNS Logs
Abstract

With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C&C communication has become the most ...

Article
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting
Abstract

Distributed Denial-of-Service (DDoS) attacks disrupts the availability of essential services, which are one of the most harmful threats in today’s Internet. Many DDoS detection algorithms based on machine learning technology have emerged in recent ...

Article
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network
Abstract

Cerebral microbleeds (CMBs) are important imaging and diagnostic biomarkers for cerebrovascular diseases and cognitive dysfunctions. Reliable detection of the location and amount of CMBs in brain tissue is crucial for the diagnosis, prevention and ...

Article
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network
Abstract

Accurate segmentation of liver tumors is an important guarantee for the success of liver cancer surgery, where convolutional network has been a type of popular method. However, the performance of the traditional convolutional network is limited by ...

Article
Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things
Abstract

Advancements of Internet of Things (IoT) enhance the application spectrum of smart networking and demand intelligent security measurements against cyber-attacks. Recent integration of Software Defined Networking (SDN) in IoT environments provides ...

Article
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices
Abstract

Keyword Spotting (KWS) is a significant branch of Automatic Speech Recognition (ASR), which has been widely used in edge computing devices. The goal of KWS is to provide high accuracy at a low false alarm rate (FAR) while reducing the costs of ...

Article
Machine Learning Agricultural Application Based on the Secure Edge Computing Platform
Abstract

Machine learning (ML) is fast becoming a powerful tool for increasing agricultural production, for instance, ML predicts weather and yield through satellite images. Such approaches, however, most applications are based on expensive cloud servers ...

Article
QoS Investigation for Power Network with Distributed Control Services
Abstract

In this paper, a distributed control scheme of key technologies is designed, which mainly includes QoS (quality of service) identification module and QoS routing optimization module. At the same time, a new routing method is designed to transform ...

Article
Fog Server Placement for Multimodality Data Fusion in Neuroimaging
Abstract

Since the findings of the single modality data are unable to provide sufficient sensitivity and specificity for diagnostic measures, multimodality data fusion is adopted in the neuroimaging to detect the important differences between patients and ...

Article
Event-Triggered Control for Distributed Optimal in Multi-agent Systems with External Disturbance
Abstract

In this paper, based on linear quadratic theory, the optimal control problem for multi-agent systems with external disturbances is studied. Firstly, the optimal distributed controller is designed by the performance index function without the ...

Article
Towards Privacy-Preserving Aggregated Prediction from SPDZ
Abstract

Machine learning models trained on data collected from multiple parties can offer prediction services to clients. However, it raises privacy concerns for both model owners and clients. The models may disclose the details of the training data ...

Article
A Secure Neural Network Prediction Model with Multiple Data Providers
Abstract

With the rapid development of neural network theory, the issue of privacy has attracted much attention, especially for the prediction or classification of some sensitive information, a neural network model that can protect privacy is needed. On ...

Article
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility
Abstract

While we enjoy high-quality social network services, image privacy is also under great privacy threats. With the development of deep learning-driven face recognition technologies, traditional protection methods are facing challenges. How to ...

Article
A Novel Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks and DNA Sequence Operations
Abstract

The powerful storage function and convenient service function of cloud computing attract more and more users to save their digit image on the cloud server. However, the insecure data transmission process of cloud computing may lead to the ...

Article
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks
Abstract

Machine learning is more closely linked to data privacy and has obtained rapid development in recent years. As for data privacy, searchable encryption (SE) is widely used as a ciphertext search technology, protecting the privacy of users. However, ...

Article
Deep Learning Algorithms Design and Implementation Based on Differential Privacy
Abstract

Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential Privacy-Stochastic Gradient ...

Article
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning
Abstract

Covert channel is an important way to transmit covert message and implement covert communication through the network. However, the existing research on covert channel cannot meet the security requirements of covert communication in the complex ...

Contributors
  • Xidian University
  • Guangzhou University
  • University of Nebraska–Lincoln
  • University of Notre Dame
Index terms have been assigned to the content through auto-classification.

Recommendations