001454071 000__ 07277cam\a2200649\i\4500 001454071 001__ 1454071 001454071 003__ OCoLC 001454071 005__ 20230314003459.0 001454071 006__ m\\\\\o\\d\\\\\\\\ 001454071 007__ cr\cn\nnnunnun 001454071 008__ 230120s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001454071 019__ $$a1359336581$$a1361717144 001454071 020__ $$a9783031201028$$q(electronic bk.) 001454071 020__ $$a3031201027$$q(electronic bk.) 001454071 020__ $$z9783031201011 001454071 020__ $$z3031201019 001454071 0247_ $$a10.1007/978-3-031-20102-8$$2doi 001454071 035__ $$aSP(OCoLC)1362867960 001454071 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dAU@$$dEBLCP 001454071 049__ $$aISEA 001454071 050_4 $$aQ325.5 001454071 08204 $$a006.3/1$$223/eng/20230120 001454071 1112_ $$aInternational Conference on Machine Learning for Cyber Security$$n(4th :$$d2022 :$$cGuangzhou, China). 001454071 24510 $$aMachine learning for cyber security :$$b4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, proceedings.$$nPart III /$$cYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li (eds.). 001454071 24630 $$aML4CS 2022 001454071 264_1 $$aCham :$$bSpringer,$$c[2023] 001454071 264_4 $$c©2023 001454071 300__ $$a1 online resource (xvii, 691 pages) :$$billustrations (some color). 001454071 336__ $$atext$$btxt$$2rdacontent 001454071 337__ $$acomputer$$bc$$2rdamedia 001454071 338__ $$aonline resource$$bcr$$2rdacarrier 001454071 347__ $$atext file$$bPDF$$2rda 001454071 4901_ $$aLecture notes in computer science ;$$v13657 001454071 500__ $$aSelected conference papers. 001454071 500__ $$aIncludes author index. 001454071 5050_ $$aDesign of Active Defense System for Railway Communication Network Based on Deep Neural Network -- Human Resource Network Information Recommendation Method Based on Machine Learning -- Machine Learning Based Abnormal Flow Analysis of University Course Teaching Network -- A Learned Multi-objective Bacterial Foraging Optimization Algorithm With Continuous Deep Q-learning -- Webpage Text Detection Based on Improved Faster-RCNN Model -- Turbo: A High-Performance and Secure Off-chain Payment Hub -- A Complete Information Detection Method for Vehicle CAN Network Gateway Based on Neural Network -- Optimization of Data Transmission Efficiency of Wireless Communication Network for Chemical Energy Monitoring -- Deep Spatio-Temporal Decision Fusion Network for Facial Expression Recognition -- A Tabu-based Multi-Objective Particle Swarm Optimization for Irregular Flight Recovery Problem -- A Robot Foreign Object Inspection Algorithm for Transmission Line Based on Improved YOLOv5 -- Path Planning Algorithm based on A_star Algorithm and Q-learning Algorithm -- Belief x2 Divergence-based Dynamical Complexity Analysis for Biological Systems -- Local Feature Acquisition Method of Multi-Layer Vision Network Image Based on Virtual Reality -- Channel Selection for EEG Emotion Recognition via An Enhanced Firefly Algorithm with Brightness-distance Attraction -- Security Risk Assessment Method of High Voltage Power Communication Network Based on Fuzzy Clustering -- Trimodal fusion network combined global-local feature extraction strategy and spatial-frequency fusion strategy -- Data Security Risk Prediction of Labor Relationship Rights Protection Network Platform Based on Machine Learning -- Research on LSTM based Traffic Flow prediction adaptive beacon Transmission period and Power joint control -- Construction of Color Network Model of Folk Painting Based on Machine Learning.-Research on Intrusion Prevention Optimization Algorithm Of Power UAV Network Communication Based on Artificial Intelligence -- Design of Network Big Data Anti Attack System for Carbon Emission Measurement Based on Deep Learning -- An Efficient Particle YOLO Detector for Urine Sediment Detection -- Evolutionary Factor-Driven Concise Bacterial Foraging Optimization Algorithm for Solving Customer Clustering Problems -- Brain Storm Optimization Algorithm with Multiple Generation Strategies for Patient Data Clustering -- TGPFM: An Optimized Framework for Ordering and Transporting Raw Materials for Production -- Visual Analysis of Facial Expression Recognition Research Based on Knowledge Graph -- Brainstorming-based Large Scale Neighborhood Search for Vehicle Routing with Real Travel Time -- A SAR Image Preprocessing Algorithm Based on Improved Homomorphic Wavelet Transform and Retinex -- Medical data clustering based on multi-objective clustering algorithm -- Self-supervised Visual-Semantic Embedding Network Based on Local Label Optimization -- A New Deep Network Model for Stock Price Prediction -- A Method for Residual Network Image Classification with Multi-scale Feature Fusion -- Face morphing detection based on a two-stream network with channel attention and residual of multiple color spaces -- DU-Net: A Novel Architecture for Retinal Vessels Segmentation -- Sub-pixel level edge extraction technology for industrial parts for smart manufacturing -- USDSE: A Novel Method to Improve Service Reputation based on Double-Side Evaluation -- Morphology-based Soft Label Smoothing Strategy For Fine-grained Domain Adaptationming -- MOOC Performance Prediction and Online Design Instructional Suggestions Based on LightGBM -- MOOC Dropout Prediction Based on Bayesian Network -- Knowledge Enhanced BERT based on Corpus Associate Generation -- Multi-objective Particle Swarm Optimization based on Archive Control Strategy -- A Hybrid Multi-Objective Genetic-Particle Swarm Optimization Algorithm for Airline Crew Rostering Problem with Fairness and Satisfaction -- Plant Leaf Area Measurement Using 3D Imaging: A Comparative Study between Dynamic Structured Light Stereo and Time-of-Flight -- Subgraph matching based on Path adaptation for large-scale graph -- Photovoltaic Panel Intelligent Management and Identification Detection System based on YOLOv5. 001454071 506__ $$aAccess limited to authorized users. 001454071 520__ $$aThe three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 24, 2022, held in Guangzhou, China. The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions. 001454071 588__ $$aDescription based on print version record. 001454071 650_0 $$aMachine learning$$vCongresses. 001454071 650_0 $$aComputer security$$vCongresses. 001454071 655_0 $$aElectronic books. 001454071 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001454071 655_7 $$aConference papers and proceedings.$$2lcgft 001454071 7001_ $$aXu, Yuan,$$eeditor. 001454071 7001_ $$aYan, Hongyang,$$eeditor. 001454071 7001_ $$aTeng, Huang,$$eeditor. 001454071 7001_ $$aCai, Jun,$$eeditor. 001454071 7001_ $$aLi, Jin$$c(Computer scientist),$$eeditor. 001454071 77608 $$iPrint version:$$aInternational Conference on Machine Learning for Cyber Security (4th : 2022 : Guangzhou, China), creator.$$tMachine learning for cyber security : Part III.$$dCham : Springer Nature Switzerland, 2022$$z9783031201011$$w(OCoLC)1346938687 001454071 830_0 $$aLecture notes in computer science ;$$v13657. 001454071 852__ $$bebk 001454071 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-20102-8$$zOnline Access$$91397441.1 001454071 909CO $$ooai:library.usi.edu:1454071$$pGLOBAL_SET 001454071 980__ $$aBIB 001454071 980__ $$aEBOOK 001454071 982__ $$aEbook 001454071 983__ $$aOnline 001454071 994__ $$a92$$bISE