Machine Learning for Cyber Security
Machine Learning for Cyber Security
6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024, Proceedings
Xiang, Yang; Shen, Jian
Springer Nature Switzerland AG
05/2025
436
Mole
Inglês
9789819645657
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC.
.- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature.
.- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network.
.- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning.
.- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid.
.- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin.
.- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS.
.- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning.
.- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning.
.- Automatic Software Vulnerability Detection in Binary Code.
.- Malicious Code Detection Based On Generative Adversarial Model.
.- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought.
.- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms.
.- A Malicious Websites Classifier Based on an Improved Relation Network.
.- Unknown Category Malicious Traffic Detection Based on Contrastive Learning.
.- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning.
.- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models.
.- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection.
.- Provable Data Auditing Scheme from Trusted Execution Environment.
.- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints.
.- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection.
.- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks.
.- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps.
.- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning.
.- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning.
.- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks.
.- YOLO-LiteMax: An Improved Model for UAV Small Object Detection.
.- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection.
.- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.
.- Efficient Two-Party Privacy-Preserving Ridge and Lasso Regression via SMPC.
.- A Decentralized Bitcoin Mixing Scheme Based on Multi-signature.
.- Decentralized Continuous Group Key Agreement for UAV Ad-hoc Network.
.- Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning.
.- Blockchain-Aided Revocable Threshold Group Signature Scheme for Smart Grid.
.- Privacy-preserving Three-factors Authentication and Key Agreement for Federated Learnin.
.- Blockchain-Based Anonymous Authentication Scheme with Traceable Pseudonym Management in ITS.
.- Multi-keyword Searchable Data Auditing for Cloud-based Machine Learning.
.- A Flexible Keyword-Based PIR Scheme with Customizable Data Scales for Multi-Server Learning.
.- Automatic Software Vulnerability Detection in Binary Code.
.- Malicious Code Detection Based On Generative Adversarial Model.
.- Construction of an AI Code Defect Detection and Repair Dataset Based on Chain of Thought.
.- Backdoor Attack on Android Malware Classifiers Based on Genetic Algorithms.
.- A Malicious Websites Classifier Based on an Improved Relation Network.
.- Unknown Category Malicious Traffic Detection Based on Contrastive Learning.
.- SoftPromptAttack: Research on Backdoor Attacks in Language Models Based on Prompt Learning.
.- Removing Regional Steering Vectors to Achieve Knowledge Domain Forgetting in Large Language Models.
.- A Novel and Efficient Multi-scale Spatio-temporal Residual Network for Multi-Class Instrusion Detection.
.- Provable Data Auditing Scheme from Trusted Execution Environment.
.- Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput without Client Hints.
.- A Two-stage Image Blind Inpainting Algorithm Based on Gated Residual Connection.
.- GAN-based Adaptive Trigger Generation and Target Gradient Alignment in Vertical Federated Learning Backdoor Attacks.
.- Weakly Supervised Waste Classification with Adaptive Loss and Enhanced Class Activation Maps.
.- A Vehicle Asynchronous Communication Scheme Based on Federated Deep Reinforcement Learning.
.- A Vehicles Scheduling Algorithm Based on Clustering based Federated Learning.
.- A Cooperative Caching Strategy Based on Deep Q-Network for Mobile Edge Networks.
.- YOLO-LiteMax: An Improved Model for UAV Small Object Detection.
.- LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection.
.- Rule Learning-Based Target Prediction for Efficient and Flexible Private Information Retrieval.