Knowledge Science, Engineering and Management: Lecture Notes in Computer Science, cartea 14886
Editat de Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wangen Limba Engleză Paperback – 27 iul 2024
The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections:
Volume I: Knowledge Science with Learning and AI (KSLA)
Volume II: Knowledge Engineering Research and Applications (KERA)
Volume III: Knowledge Management with Optimization and Security (KMOS)
Volume IV: Emerging Technology
Volume V: Special Tracks
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (5) | 466.50 lei 43-57 zile | |
| Springer – 27 iul 2024 | 466.50 lei 43-57 zile | |
| Springer – 26 iul 2024 | 467.73 lei 43-57 zile | |
| Springer – 27 iul 2024 | 467.91 lei 43-57 zile | |
| Springer – 26 iul 2024 | 468.53 lei 43-57 zile | |
| Springer – 27 iul 2024 | 955.30 lei 43-57 zile |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 466.50 lei
Preț vechi: 583.13 lei
-20%
Puncte Express: 700
Preț estimativ în valută:
82.49€ • 95.33$ • 71.26£
82.49€ • 95.33$ • 71.26£
Carte tipărită la comandă
Livrare economică 04-18 mai
Specificații
ISBN-13: 9789819754977
ISBN-10: 9819754976
Pagini: 440
Ilustrații: X, 440 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2024
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
ISBN-10: 9819754976
Pagini: 440
Ilustrații: X, 440 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2024
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
Cuprins
.- Knowledge Management with Optimization and Security (KMOS).
.- Knowledge Enhanced Zero-Shot Visual Relationship Detection.
.- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments.
.- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment.
.- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective.
.- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education.
.- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation.
.- Optimize rule mining based on constraint learning in knowledge graph.
.- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting.
.- An improved YOLOv7 based prohibited item detection model in X-ray images.
.- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.
.- Meta learning based Rumor Detection by Awareness of Social Bot.
.- Financial FAQ Question-Answering System Based on Question Semantic Similarity.
.- An illegal website family discovery method based on association graph clustering.
.- Different Attack and Defense Types for AI Cybersecurity.
.-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel.
.- A Belief Evolution Model with Non-Axiomatic Logic.
.- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models.
.- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks.
.- KEEN: Knowledge Graph-enabled Governance System for Biological Assets.
.- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat.
.- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.
.- Logits Poisoning Attack in Federated Distillation.
.- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information.
.- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection.
.- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism.
.- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning.
.- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility.
.- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network.
.- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition.
.- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models.
.- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition.
.- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.
.- Knowledge Enhanced Zero-Shot Visual Relationship Detection.
.- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments.
.- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment.
.- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective.
.- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education.
.- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation.
.- Optimize rule mining based on constraint learning in knowledge graph.
.- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting.
.- An improved YOLOv7 based prohibited item detection model in X-ray images.
.- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.
.- Meta learning based Rumor Detection by Awareness of Social Bot.
.- Financial FAQ Question-Answering System Based on Question Semantic Similarity.
.- An illegal website family discovery method based on association graph clustering.
.- Different Attack and Defense Types for AI Cybersecurity.
.-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel.
.- A Belief Evolution Model with Non-Axiomatic Logic.
.- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models.
.- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks.
.- KEEN: Knowledge Graph-enabled Governance System for Biological Assets.
.- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat.
.- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.
.- Logits Poisoning Attack in Federated Distillation.
.- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information.
.- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection.
.- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism.
.- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning.
.- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility.
.- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network.
.- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition.
.- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models.
.- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition.
.- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.