Linked e-resources
Details
Table of Contents
Intro
Preface
Organization
Contents
Camdar-Adv: Method for Generating Adversarial Patches on 3D Object
1 Introduction
2 Related Work
2.1 Attacks Against LiDAR-Based System
2.2 OIS-Based Target Detectors
2.3 Mono Camera and LiDAR Fusion Technology
3 The Projection from 2D to 3D
3.1 Preparation
3.2 Projection
4 Conclusion and Prospect
References
Universal Adversarial Perturbations of Malware
1 Introduction
2 Related Work
3 Algorithm
4 Experiment
4.1 Dataset
4.2 Target Models
4.3 Experimental Results
5 Conclusion
References
A Semi-supervised Learning Approach for High Dimensional Android Malware Classification
1 Introduction
2 Proposed Approach
2.1 Random Projection
2.2 Confidence Analysis and Nearest Neighbor Clustering
2.3 SGD-Based SVM with Adapted Sampling
3 Experiment
3.1 Data Preparation
3.2 Confidence and Nearest Neighbor Clustering Analysis
3.3 Prediction of SGD-Based SVM with Adapted Sampling
4 Conclusion
References
Kernel Optimization in SVM for Defense Against Adversarial Attacks
1 Introduction
2 Preliminary
2.1 Support Vector Machine
2.2 Attack Strategy
3 The Defense Based on Kernel Optimization
4 Experimental Results
5 Discussion and Conclusion
References
An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability
A Case Study of Hainan Province
1 Introduction
2 Description and Statistics
3 Reliability and Validity Test
4 Related Analysis
5 Structural Equation Model
6 Conclusion
References
Reliability Optimization and Trust Computing of Composite Wing Based on Sparse PC Method
1 Introduction
2 Description of Reliability Optimization Problem for Composite Wing
2.1 Finite Element Analysis Modeling and Parameterization
2.2 Mathematical Model of Reliability Optimization
3 Sparse PC Method
4 Results and Analysis
5 Conclusion
References
Malware Variants Detection Based on Feature Fusion
1 Introduction
2 Related Work
2.1 Malware Detection Based on Feature Analysis
2.2 Malware Detection Based on Visualization Technology
2.3 Malware Detection Based on Deep Learning
3 Features and Models
3.1 Gray Image Feature Extraction Based on DCNN
3.2 Important Opcode Features Extraction Based on IG
3.3 Malware Detection Model Based on Feature Fusion
4 Experimental Evaluation
4.1 Dataset and Experimental Settings
4.2 Experimental Results
5 Conclusion
References
Robust GAN Based on Attention Mechanism
1 Introduction
2 Materials and Methods
2.1 Problem Definition
2.2 The Atten-Rob-GAN Framework
2.3 The Method of Generating Adversarial Examples Datasets
2.4 Implementation
3 Results and Discussion
3.1 Robustness of Discriminator
3.2 Quality of Generator
4 Conclusion
References
Training Aggregation in Federated Learning
1 Introduction
Preface
Organization
Contents
Camdar-Adv: Method for Generating Adversarial Patches on 3D Object
1 Introduction
2 Related Work
2.1 Attacks Against LiDAR-Based System
2.2 OIS-Based Target Detectors
2.3 Mono Camera and LiDAR Fusion Technology
3 The Projection from 2D to 3D
3.1 Preparation
3.2 Projection
4 Conclusion and Prospect
References
Universal Adversarial Perturbations of Malware
1 Introduction
2 Related Work
3 Algorithm
4 Experiment
4.1 Dataset
4.2 Target Models
4.3 Experimental Results
5 Conclusion
References
A Semi-supervised Learning Approach for High Dimensional Android Malware Classification
1 Introduction
2 Proposed Approach
2.1 Random Projection
2.2 Confidence Analysis and Nearest Neighbor Clustering
2.3 SGD-Based SVM with Adapted Sampling
3 Experiment
3.1 Data Preparation
3.2 Confidence and Nearest Neighbor Clustering Analysis
3.3 Prediction of SGD-Based SVM with Adapted Sampling
4 Conclusion
References
Kernel Optimization in SVM for Defense Against Adversarial Attacks
1 Introduction
2 Preliminary
2.1 Support Vector Machine
2.2 Attack Strategy
3 The Defense Based on Kernel Optimization
4 Experimental Results
5 Discussion and Conclusion
References
An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability
A Case Study of Hainan Province
1 Introduction
2 Description and Statistics
3 Reliability and Validity Test
4 Related Analysis
5 Structural Equation Model
6 Conclusion
References
Reliability Optimization and Trust Computing of Composite Wing Based on Sparse PC Method
1 Introduction
2 Description of Reliability Optimization Problem for Composite Wing
2.1 Finite Element Analysis Modeling and Parameterization
2.2 Mathematical Model of Reliability Optimization
3 Sparse PC Method
4 Results and Analysis
5 Conclusion
References
Malware Variants Detection Based on Feature Fusion
1 Introduction
2 Related Work
2.1 Malware Detection Based on Feature Analysis
2.2 Malware Detection Based on Visualization Technology
2.3 Malware Detection Based on Deep Learning
3 Features and Models
3.1 Gray Image Feature Extraction Based on DCNN
3.2 Important Opcode Features Extraction Based on IG
3.3 Malware Detection Model Based on Feature Fusion
4 Experimental Evaluation
4.1 Dataset and Experimental Settings
4.2 Experimental Results
5 Conclusion
References
Robust GAN Based on Attention Mechanism
1 Introduction
2 Materials and Methods
2.1 Problem Definition
2.2 The Atten-Rob-GAN Framework
2.3 The Method of Generating Adversarial Examples Datasets
2.4 Implementation
3 Results and Discussion
3.1 Robustness of Discriminator
3.2 Quality of Generator
4 Conclusion
References
Training Aggregation in Federated Learning
1 Introduction