Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV048687751
    Format: 1 Online-Ressource (xvii, 625 Seiten) , 212 Illustrationen, 142 in Farbe
    ISBN: 9783031200991
    Series Statement: Lecture notes in computer science 13656
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20098-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20100-4
    Language: English
    Keywords: Datensicherung ; Kryptologie ; Computerkriminalität ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_30312010X
    Format: 168 S. , 8"
    Note: Philadelphia, Univ., Diss., 1922
    Language: English
    Keywords: Hochschulschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_BV048687751
    Format: 1 Online-Ressource (xvii, 625 Seiten) : , 212 Illustrationen, 142 in Farbe.
    ISBN: 978-3-031-20099-1
    Series Statement: Lecture notes in computer science 13656
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20098-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20100-4
    Language: English
    Keywords: Datensicherung ; Kryptologie ; Computerkriminalität ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949435618302882
    Format: XVII, 625 p. 212 illus., 142 illus. in color. , online resource.
    Edition: 1st ed. 2023.
    ISBN: 9783031200991
    Series Statement: Lecture Notes in Computer Science, 13656
    Content: The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.
    Note: AMAD: Improving Adversarial Robustness Without Reducing Accuracy -- Multi-Party Secure Sharing and Comparison of Strings Based on Outsourced Computation -- Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain -- Overview of DDoS Attack Research under SDN -- A medical image segmentation method based on Residual network and channel attention mechanism -- Performance improvement of classification model based on Chinese adversarial samples generation -- Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning -- Federated Community Detection in Social Networks -- A Textual Adversarial Attack Scheme for Domain-Specific Models -- An improved Conv-LSTM method for gear fault detection -- Extracting Random Secret Key Scheme for One-time Pad under Intelligent Connected Vehicle -- Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization -- Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part I -- Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network -- Dynamic Momentum for Deep Learning with Differential Privacy -- An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP -- PCB Defect Detection Method Based on Improved RetinaNet -- A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning -- Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province -- Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection -- DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection -- A Lattice-Based Aggregate Signature Based on Revocable Identity -- Research and design of an emergency supply assurance monitoring system in the post-epidemic context -- Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion -- Optimal Revenue Analysis of the Stubborn Mining based on Markov Decision Process -- Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II -- Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks -- Overlapping community discovery algorithm based on three-level neighbor node influence -- Content-Aware Deep Feature Matching -- F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps -- An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model -- A Certificateless-Based Blind Signature Scheme with Message Recovery -- Fault Detection of Rolling Bearings by Using A Combination Network Model -- zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs -- Research on influential factors of online learning behavior based on big data -- Short speech key generation technology based on deep learning -- Domain Adversarial Interaction Network for Cross-domain Fault Diagnosis -- A Vehicle Data Publishing System with Privacy-awares in VANETs Based on Blockchain -- Highsimb: A Concrete Blockchain High Simulation With Contract Vulnerability Detection For Ethereum and Hyperledger Fabric -- Research on key technologies for the trusted perception of network information for big data -- Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network -- Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm -- Towards Differentially Private Contrastive Learning -- Two-stage High Precision Membership Inference Attack -- Secure Storage Method for Network Resources of professional Works Based on Decision Tree Algorithm -- Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis -- A Broad Learning System Based on the Idea of Vertical Federated Learning -- PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency -- Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application -- A Event Extraction Method of Document-level based on the Self-attention Mechanism.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031200984
    Additional Edition: Printed edition: ISBN 9783031201004
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 30302710x?
Did you mean 303120185?
Did you mean 30312072x?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages