Filters








10,664 Hits in 3.3 sec

Symmetry-Adapted Machine Learning for Information Security

Jong Hyuk Park
2020 Symmetry  
Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas.  ...  The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis of data to identify hidden patterns of data  ...  Symmetry-Adapted Machine Learning for Information Security Symmetry-Adapted Machine Learning for Information Security delivers successfully accepted submissions [1] [2] [3] [4] [5] [6] [7] [8] [9] [10  ... 
doi:10.3390/sym12061044 fatcat:dury4tukzre7hblsusdxcg4zee

Special issue on 2020 international conference on machine learning and big data analytics for IoT security and privacy (SPIoT-2020)

Jinghua Zhao, Qingyuan Zhou
2021 Neural computing & applications (Print)  
The guest editors also would like to thank journal editor Rachel Moriarty, Deepika Sureshkumar, and Rashmi Jenna for their help on submission and publication.  ...  The guest editors would like to thank the reviewers for their high-quality reviews, which provided insightful and constructive  ...  This special issue includes selected papers (with no less than 60% new content of the journal version) from the 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security  ... 
doi:10.1007/s00521-021-05784-3 fatcat:nd723np4azebfjwclb2x3jbsde

Content

2020 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)  
CONVERTERS AND INVERTERS AND OTHERS Information Security and Organisational Agility in the Digital Era: Exploring the Role of IT Alignment 0831 SESSION 28: MACHINE LEARNING, INFORMATION RETRIEVAL AND OTHERS  ...  10.5 1570682209 Prediction of Defaulters Using Machine Learning on Azure ML 0320 11.1 1570677703 Deep Learning for Information Extraction in Finance Documents - Corporate Loan Operations  ... 
doi:10.1109/iemcon51383.2020.9284848 fatcat:4ltdf33yerce3avsxsgjlcb7iy

Guest Editorial: AI and Machine Learning Solution Cyber Intelligence Technologies: New Methodologies and Applications

Ke Yan, Lu Liu, Yong Xiang, Qun Jin
2020 IEEE Transactions on Industrial Informatics  
IEEE CLOUD COMPUT- ING, and Information Sciences (Elsevier), and served as a general chair and program chair for many international conferences.  ...  , cyber-enabled applications in healthcare, and computing for well-being.  ...  Guest Editorial: AI and Machine Learning Solution Cyber Intelligence Technologies: New Methodologies and Applications With the recent development of machine learning (ML), artificial intelligence (AI)  ... 
doi:10.1109/tii.2020.2988944 fatcat:h7wqymdnybdnxcmllm75pxynge

Advances in Future Internet and the Industrial Internet of Things

Jong Park
2019 Symmetry  
IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years.  ...  IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions.  ...  Manufacturers should be able to guarantee the safety of users and provide for preventive or corrective Symmetry 2019, 11, 244; doi:10.3390/sym11020244 www.mdpi.com/journal/symmetry measures when safety  ... 
doi:10.3390/sym11020244 fatcat:ri26tke6sjcvpotr2nut4yreme

Deploying DNS and the Turing Machine using Sophi

2019 International Journal of Engineering and Advanced Technology  
Homogeneous symmetries and DNS have accumulated magnificent eagerness from both security masters and futurists over the latest a significant extended period of time.  ...  We show a checked device for replicating 802.11b (Sophi), exhibiting that journaling record structures can be made unpredictable, virtual, and social  ...  Oppositely, dynamic frameworks alone can fulfill the prerequisite for self-learning information. Unfortunately, this course of action is loaded with inconvenience, as it were, as a result of Scheme.  ... 
doi:10.35940/ijeat.f1030.0886s219 fatcat:umdg5c535rft7i6ctluqrw72iq

ISCIT 2019 Papers by Title

2019 2019 19th International Symposium on Communications and Information Technologies (ISCIT)  
Hand Gestures Based On Machine Learning Model R A B C D E F G H I J K M N O P R S T U V Radar Fingerprint Feature Extraction Based on VMD Recursive Least Adaptive Threshold Nonlinear Errors -Regressor  ...  Application Implemented Through NI USRP-2932 Classification Electroencephalography Using Machine Learning Community-based Random Access Scheme for M2M Communications in LTE Networks Comparison of BICM-ID  ... 
doi:10.1109/iscit.2019.8905192 fatcat:miv6hv3yozeexe3e7sfptzv6ci

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
., +, TIFS 2020 1513- 1524 Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets.  ...  Sham- sabadi, A.S., +, TIFS 2020 3819-3831 Data analysis Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets.  ...  G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

Table of contents

2020 IEEE Internet of Things Journal  
Hierarchical Machine Learning Tasks Distribution for IIoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Mocskos 2129 Resource Allocation for Ultradense Networks With Machine-Learning-Based Interference Graph Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J.  ... 
doi:10.1109/jiot.2020.2977444 fatcat:zrsdjrwoi5b2bourvbpjoiibfe

Table of contents

2020 IEEE Transactions on Information Forensics and Security  
Study of Repackaging Malware for Evading Machine-Learning Detection .............................. ............................................. X. Chen, C. Li, D. Wang, S. Wen, J. Zhang, S.  ...  Liu 1723 Meta-Learning for Fast Classifier Adaptation to New Users of Signature Verification Systems .......................... .........................................................................  ... 
doi:10.1109/tifs.2019.2940362 fatcat:7ieq2gue2ndr5b3pa5suaba4ke

Table of contents

2019 IEEE Communications Letters  
COMMUNICATION AND INFORMATION SECURITY A New Lower Bound Based Secure Beamforming in MISO Communication Networks ................................... ....................................................  ...  Su 1524 MACHINE LEARNING Classification of Spectrally Efficient Constant Envelope Modulations Based on Radial Basis Function Network and Deep Learning ..................................................  ... 
doi:10.1109/lcomm.2019.2936058 fatcat:634t3zppnnhnbev45tdatfnfeu

Machine Learning Emulation in Nature-inspired Computation Systems

Jianhao Tan, Jing Zhang, Fu Guo
2009 Computer and Information Science  
The result shows that machine learning makes nature_inspired computation systems be able to gain know; edge automatically, their quality improved, their intelligent level advanced, and machine learning  ...  The whole frame of nature_inspired computation systems is inquired into, the characteristics of machine learning in nature_inspired computation systems are researched, and a particular scheme on machine  ...  Machine learning will have a significant impact on the storage mode, information input mode and architecture of nature_inspired computation systems.  ... 
doi:10.5539/cis.v2n3p15 fatcat:ntwk43w6frhdhon6kjqwil6x4u

Intelligence plays dice: Stochasticity is essential for machine learning [article]

Mert R. Sabuncu
2020 arXiv   pre-print
In this perspective article, we argue that stochasticity plays a fundamentally different role in machine learning (ML) and is likely a critical ingredient of intelligent systems.  ...  I would like to thank Zhilu Zhang and Meenakshi Khosla for their valuable input. The illustrations include several icons obtained from www.flaticon.com.  ...  A review of stochasticity in machine learning Now, let us return to the field of machine learning.  ... 
arXiv:2008.07496v1 fatcat:4jipc2rhnnf7hogndzqyqjione

Computer Highlights Society Magazines

2020 Computer  
applications and machine intelligence to visualization and microchip design.  ...  The IEEE Computer Society's lineup of 12 peer-reviewed technical magazines covers cutting-edge topics ranging from software design and computer graphics to Internet computing and security, from scientific  ...  MLPerf: An Industry Standard Benchmark Suite for Machine Learning Performance In this article from the March/April 2020 issue of IEEE Micro, the authors describe the design choices behind MLPerf, a machine  ... 
doi:10.1109/mc.2020.2990777 fatcat:yjvft2o6nrhydgfj3xchtpijra

Study on Inside Threats Based on Analytic Hierarchy Process

Sang Seo, Dohoon Kim
2020 Symmetry  
for security protection measures.  ...  In addition, a quantitative process and decision-making tool were developed for insider threats by establishing various internal information leakage scenarios.  ...  Based on this information, we plan to make precise and active security measures easier for organizations through machine learning.  ... 
doi:10.3390/sym12081255 fatcat:rbxwvykdyzhhtpagkd7klhyiua
« Previous Showing results 1 — 15 out of 10,664 results