語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyberspace Safety and Security = 12t...
~
Cheng, Jieren.
Cyberspace Safety and Security = 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyberspace Safety and Security/ edited by Jieren Cheng, Xiangyan Tang, Xiaozhang Liu.
其他題名:
12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /
其他作者:
Liu, Xiaozhang.
面頁冊數:
XIII, 330 p. 79 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-3-030-73671-2
ISBN:
9783030736712
Cyberspace Safety and Security = 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /
Cyberspace Safety and Security
12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /[electronic resource] :edited by Jieren Cheng, Xiangyan Tang, Xiaozhang Liu. - 1st ed. 2021. - XIII, 330 p. 79 illus.online resource. - Security and Cryptology ;12653. - Security and Cryptology ;9241.
Camdar-adv: Method for generating adversarial patches on 3D object -- Universal Adversarial Perturbations of Malware -- A Semi-Supervised Learning Approach for High Dimensional Android Malware Classification -- Kernel Optimization in SVM for Defense Against Adversarial Attacks -- An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability -- A Case Study of Hainan Province -- Reliability Optimization of Composite Wing based on Sparse PC Method -- Malware Variants Detection Based on Feature Fusion -- Robust GAN Based on Attention Mechanism -- Training Aggregation in Federated Learning -- A robust digital watermarking for medical images based on PHTs-DCT -- A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT -- HOUGH-DCT Based Robust Watermarking for Medical Image -- The Blind Separation of Cockpit Mixed Signals Based On Fast Independent Component Analysis -- A Zero-Watermarking Algorithm for Medical Images Based on Gabor-DCT -- Analysis on the influencing factors of electricity sales -- "Analysis on the Strategies of Information Technology to Improve Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled Learning -- Algorithm for One-Class Classification of Remote Sensing Data -- SDSBT: A Secure Multi-Party Data Sharing Platform Based on Blockchain and TEE* -- BID-HCP: Blockchain Identifier based Health Certificate Passport System.-Research on global map construction and location of intelligent vehicles based on lidar* -- On the strengthening effect of problem-driven discussion teaching method on the learning of “data structure” -- The Detection and segmentation of pulmonary nodules based on U-net* -- Research on Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload -- Analysis on the training willingness of new vocational farmers based on structural equation model -- a case study of Hainan Province -- The application of bibliometric and graph analysis in document data mining: A case study on the cultivation of new type professional farmers Movie scoring algorithm based on deep neural network -- Research on a Malicious Code Detection -- Method Based on Convolutional Neural Network in a Domestic Sandbox Environment -- Electricity Sales Forecasting Based on Model Fusion and Prophet Model -- Research on Electricity Sales Forecast Model Based on Big Data.
The LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020. The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
ISBN: 9783030736712
Standard No.: 10.1007/978-3-030-73671-2doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyberspace Safety and Security = 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /
LDR
:04388nam a22004215i 4500
001
1046965
003
DE-He213
005
20210826145044.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030736712
$9
978-3-030-73671-2
024
7
$a
10.1007/978-3-030-73671-2
$2
doi
035
$a
978-3-030-73671-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Cyberspace Safety and Security
$h
[electronic resource] :
$b
12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /
$c
edited by Jieren Cheng, Xiangyan Tang, Xiaozhang Liu.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XIII, 330 p. 79 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12653
505
0
$a
Camdar-adv: Method for generating adversarial patches on 3D object -- Universal Adversarial Perturbations of Malware -- A Semi-Supervised Learning Approach for High Dimensional Android Malware Classification -- Kernel Optimization in SVM for Defense Against Adversarial Attacks -- An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability -- A Case Study of Hainan Province -- Reliability Optimization of Composite Wing based on Sparse PC Method -- Malware Variants Detection Based on Feature Fusion -- Robust GAN Based on Attention Mechanism -- Training Aggregation in Federated Learning -- A robust digital watermarking for medical images based on PHTs-DCT -- A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT -- HOUGH-DCT Based Robust Watermarking for Medical Image -- The Blind Separation of Cockpit Mixed Signals Based On Fast Independent Component Analysis -- A Zero-Watermarking Algorithm for Medical Images Based on Gabor-DCT -- Analysis on the influencing factors of electricity sales -- "Analysis on the Strategies of Information Technology to Improve Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled Learning -- Algorithm for One-Class Classification of Remote Sensing Data -- SDSBT: A Secure Multi-Party Data Sharing Platform Based on Blockchain and TEE* -- BID-HCP: Blockchain Identifier based Health Certificate Passport System.-Research on global map construction and location of intelligent vehicles based on lidar* -- On the strengthening effect of problem-driven discussion teaching method on the learning of “data structure” -- The Detection and segmentation of pulmonary nodules based on U-net* -- Research on Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload -- Analysis on the training willingness of new vocational farmers based on structural equation model -- a case study of Hainan Province -- The application of bibliometric and graph analysis in document data mining: A case study on the cultivation of new type professional farmers Movie scoring algorithm based on deep neural network -- Research on a Malicious Code Detection -- Method Based on Convolutional Neural Network in a Domestic Sandbox Environment -- Electricity Sales Forecasting Based on Model Fusion and Prophet Model -- Research on Electricity Sales Forecast Model Based on Big Data.
520
$a
The LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020. The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Computer security.
$3
557122
700
1
$a
Liu, Xiaozhang.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1350568
700
1
$a
Tang, Xiangyan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1350567
700
1
$a
Cheng, Jieren.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1350566
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030736705
776
0 8
$i
Printed edition:
$z
9783030736729
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-73671-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入