소장자료

>>
소장자료
>
000 nam5i
001 2210080934612
003 DE-He213
005 20250321105417
007 cr nn 008mamaa
008 240726s2024 si | s |||| 0|eng d
020 a97898197549849978-981-97-5498-4
024 a10.1007/978-981-97-5498-42doi
040 a221008
050 aQ334-342
050 aTA347.A78
072 aUYQ2bicssc
072 aCOM0040002bisacsh
072 aUYQ2thema
082 a006.3223
245 00 aKnowledge Science, Engineering and Managementh[electronic resource] :b17th International Conference, KSEM 2024, Birmingham, UK, August 16–18, 2024, Proceedings, Part III /cedited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang.
250 a1st ed. 2024.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2024.
300 aXIV, 424 p. 108 illus., 93 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aLecture Notes in Artificial Intelligence,x2945-9141 ;v14886
505 a -- Knowledge Management with Optimization and Security (KMOS). -- Knowledge Enhanced Zero-Shot Visual Relationship Detection. -- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. -- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment. -- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. -- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. -- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. -- Optimize rule mining based on constraint learning in knowledge graph. -- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. -- An improved YOLOv7 based prohibited item detection model in X-ray images. -- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. -- Meta learning based Rumor Detection by Awareness of Social Bot. -- Financial FAQ Question-Answering System Based on Question Semantic Similarity. -- An illegal website family discovery method based on association graph clustering. -- Different Attack and Defense Types for AI Cybersecurity. .-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. -- A Belief Evolution Model with Non-Axiomatic Logic. -- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models. -- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. -- KEEN: Knowledge Graph-enabled Governance System for Biological Assets. -- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat. -- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. -- Logits Poisoning Attack in Federated Distillation. -- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. -- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection. -- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism. -- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. -- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility. -- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. -- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition. -- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models. -- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition. -- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.
520 aThe five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16–18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks.
650 aArtificial intelligence.
650 aComputer engineering.
650 aComputer networks .
650 aComputers.
650 aInformation technologyxManagement.
650 aSocial sciencesxData processing.
650 aApplication software.
650 aArtificial Intelligence.
650 aComputer Engineering and Networks.
650 aComputing Milieux.
650 aComputer Application in Administrative Data Processing.
650 aComputer Application in Social and Behavioral Sciences.
650 aComputer and Information Systems Applications.
700 aCao, Cungeng.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aChen, Huajun.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aZhao, Liang.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aArshad, Junaid.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aAsyhari, Taufiq.eeditor.0(orcid)0000-0002-3023-82851https://orcid.org/0000-0002-3023-82854edt4http://id.loc.gov/vocabulary/relators/edt
700 aWang, Yonghao.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819754977
776 iPrinted edition:z9789819754991
830 aLecture Notes in Artificial Intelligence,x2945-9141 ;v14886
856 uhttps://doi.org/10.1007/978-981-97-5498-4
912 aZDB-2-SCS
912 aZDB-2-SXCS
912 aZDB-2-LNC
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Knowledge Science, Engineering and Management[electronic resource] :17th International Conference, KSEM 2024, Birmingham, UK, August 16–18, 2024, Proceedings, Part III /edited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang
종류
전자책
서명
Knowledge Science, Engineering and Management[electronic resource] :17th International Conference, KSEM 2024, Birmingham, UK, August 16–18, 2024, Proceedings, Part III /edited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang
판 사항
1st ed. 2024.
형태사항
XIV, 424 p 108 illus, 93 illus in color online resource.
주기사항
The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16–18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks.
내용주기
/ Knowledge Management with Optimization and Security (KMOS). / Knowledge Enhanced Zero-Shot Visual Relationship Detection. / WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. / Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment. / VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. / LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. / DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. / Optimize rule mining based on constraint learning in knowledge graph. / GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. / An improved YOLOv7 based prohibited item detection model in X-ray images. / Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. / Meta learning based Rumor Detection by Awareness of Social Bot. / Financial FAQ Question-Answering System Based on Question Semantic Similarity. / An illegal website family discovery method based on association graph clustering. / Different Attack and Defense Types for AI Cybersecurity. .-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. / A Belief Evolution Model with Non-Axiomatic Logic. / Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models. / Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. / KEEN: Knowledge Graph-enabled Governance System for Biological Assets. / Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat. / DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. / Logits Poisoning Attack in Federated Distillation. / DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. / Prompt Based CVAE Data Augmentation for Few-shot Intention Detection. / Reentrancy Vulnerability Detection Based On Improved Attention Mechanism. / Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. / AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility. / Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. / Adversarial examples for Preventing Diffusion Models from Malicious Image Edition. / ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models. / Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition. / New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기