skip to main content
10.1007/978-3-030-62460-6guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II
2020 Proceeding
  • Editors:
  • Xiaofeng Chen,
  • Hongyang Yan,
  • Qiben Yan,
  • Xiangliang Zhang
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Machine Learning for Cyber SecurityGuangzhou, China8 October 2020
ISBN:
978-3-030-62459-0
Published:
08 October 2020

Reflects downloads up to 01 Feb 2025Bibliometrics
Abstract

No abstract available.

front-matter
Front Matter
Pages i–xv
back-matter
Back Matter
Article
Vulnerability Variants and Path Factors in Networks
Abstract

The vulnerability of the network is one of the core contents of network security research, and there are several variables to test the network vulnerability from the perspective of network structure. For example, toughness, isolated toughness and ...

Article
A Variant of Sun Toughness and the Existence of Path Factors in Networks
Abstract

Among several parameters in computer networks to measure its vulnerability, toughness is the most important one which has raised widespread concern from mathematicians and computer scientists. Starting from the requirements of network security, ...

Article
Network Adjacency Condition for Fractional -Critical Covered Graphs
Abstract

In resource scheduling network, the availability of resource scheduling can be converted into the existing the fractional factor of the related network graph. The study of the existence of fractional factors in specific graph structure is helpful ...

Article
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System
Abstract

The critical asset data of the Space Tracking Telemetry and Command (TT&C) System plays an important role in fulfilling space missions. According to analyze the current storing methods and disaster recovery requirements of the data, the remote ...

Article
Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain
Abstract

In the era of big data, how to extract unrestricted type of entity relations from open domain text is a challenging topic. In order to further understand related deep issues, this paper summarized the latest progress in the field of English entity ...

Article
A SEU Immune Flip-Flop with Low Overhead
Abstract

In nano-scale CMOS technologies, storage cells such as flip-flops are becoming increasingly sensitive to soft errors caused by harsh radiation effects. This paper proposes a radiation-hardened flip-flop with single event upset (SEU) immunity and ...

Article
An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks
Abstract

Using UAV to Simultaneous Wireless Information and Power Transfer (SWIPT) can effectively solve sensor energy problems in Wireless Rechargeable Sensor Networks (WRSN). Among current charging techniques, radio frequency (RF) remote charging with a ...

Article
Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error
Abstract

In view of the problem that the channel resources cannot be allocated optimally in Vehicular Ad Hoc NETwork (VANET) with nodes sending information at fixed power, we propose an adaptive VANET power control algorithm. The algorithm calculates the ...

Article
Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model
Abstract

A novel 3-dimensional (3D) non-stationary geometry-based deterministic model (GBDM) is proposed in this paper to analyze the effective scatters for the Hyperloop train-to-ground wireless communication. Different from the stochastic models, the ...

Article
Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements
Abstract

In order to solve the problem of flocking for multi-agent systems with external disturbances, this paper studies the finite-time consensus of second-order multi-agent systems with external disturbances. Based on the disturbance estimations of ...

Article
A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication
Abstract

The three typical business scenarios of 5G are Enhanced Mobile Broadband, Massive Machine Type Communication, and Ultra-Reliable Low Latency Communication. Among them, Ultra-Reliable Low Latency Communication is one of the key application ...

Article
Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities
Abstract

This article selects male and female college students from 5 colleges and universities in Dongguan, Guangdong Province as the research object, using the theoretical background of college students’ participation in sports activities and the ...

Article
Group Movement of Multi-agent Systems with Diverse Delays
Abstract

Wireless sensor network, which is an important part of Cyber-physical systems, has been widely applied in the fields of artificial intelligence. However, there exist communication delays between nodes in wireless communication network, which may ...

Article
Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control
Abstract

Mobile crowdsensing (MCS) harnesses the sensing capabilities of sensors built into a large number of smart devices to collect and analyze data, which can be used by a large number of mobile participants to perform numerous sensing tasks. Stability ...

Article
Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing
Abstract

Mobile Crowdsensing (MCS) has become a new paradigm of collecting and merging a large number of sensory data by using rich sensor-equipped mobile terminals. Existing studies focusing on multi-task allocation with the objective of maximizing the ...

Article
Research on High Reliable Wireless Channel Data Cleaning Method
Abstract

Recent developments in the 5th generation wireless communication system have heightened the need for the propagation characteristics and modeling of wireless channels. As the propagation characteristics and variation rules of radio waves in ...

Article
A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions
Abstract

The monitoring information of the Lithium-ion batteries is influenced by variable operation conditions. Many health assessment approaches acquire the battery monitoring information to assess the battery health status. However, these approaches ...

Article
Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm
Abstract

With the wide application of lithium ion batteries in various fields, the safety and reliability of lithium ion batteries have been put forward higher requirements, and the health evaluation of lithium ion batteries is very important. In this ...

Article
Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm
Abstract

Unmanned Aerial Vehicles (UAVs) have been widely used in data collection, tracking and monitoring in wireless sensor networks (WSNs). By considering the three factors of sensor coverage, energy consumption and Quality of Service (QoS), the WSNs ...

Article
Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization
Abstract

The Coronavirus Disease 2019 has a huge impact on countries all over the world. The analysis of public opinions during this period is conducive to the government timely understanding and solving the difficulties faced by the people. In this paper, ...

Article
A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search
Abstract

With the popularity of Internet technology, e-commerce enterprises have rapidly developed. Orders need to be collected before delivery, and vehicles are waiting in the warehouse for most enterprises. This paper considers a capacitated vehicle ...

Article
An Adaptive Data Protection Scheme for Optimizing Storage Space
Abstract

Data is the main driving factor of artificial intelligence represented by machine learning, and how to ensure data security is one of the severe challenges. In many traditional methods, a single snapshot strategy is used to protect data. In order ...

Article
The Thinned Rectangular Array Based on Modified Interger Genetic Algorithm
Abstract

Aiming at the optimization of peak sidelobe levels (PSLL) of rectangular thinned arrays with fixed thinned rate and array aperture constraints. This paper proposes a new coding mapping model and an improved integer genetic algorithm (MIGA). ...

Article
A Novel Method to Classify Videos Based VBR Trace
Abstract

Video classification research has been studied for many years. Traditional video classification methods are based on text, sound, and visual content. However, all these approaches require that the video content can be inspected. If the video ...

Article
Research on Friendvertising-Counter Technology in Big Data
Abstract

In today’s society, the Internet is rapidly developing, Internet merchants can use the user information they have mastered to analyze consumer preferences. Then they conduct product recommendations to maximize profits. The accumulation of data on ...

Article
A Survey of Researches on Personalized Bundle Recommendation Techniques
Abstract

The recommender system is widely used in various fields such as movies, music, and products. It has been an effective method to handle the preference matching problem by retrieving the most relevant information and services from a large amount of ...

Article
Estimation of Motor Imagination Based on Consumer-Grade EEG Device
Abstract

Nowadays, classifying electroencephalogram (EEG) signals based motor imagery tasks is extensively used to control brain-computer interface applications, as a communication bridge between humans and computers. In this paper, we propose signal-to-...

Article
An Overview of Key Technologies and Challenges of 6G
Abstract

Significant increase has been witnessed in data usage and users over the years for communication. Development of technology is a necessity hence 5G (5th generation) system is about to launch commercially however over a few years even that won’t be ...

Contributors
  • Xidian University
  • Guangzhou University
  • University of Nebraska–Lincoln
  • University of Notre Dame
Index terms have been assigned to the content through auto-classification.

Recommendations