You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The fields of Artificial Intelligence (AI) and Machine Learning (ML) have grown dramatically in recent years, with an increasingly impressive spectrum of successful applications. This book represents a key reference for anybody interested in the intersection between mathematics and AI/ML and provides an overview of the current research streams. Engineering Mathematics and Artificial Intelligence: Foundations, Methods, and Applications discusses the theory behind ML and shows how mathematics can be used in AI. The book illustrates how to improve existing algorithms by using advanced mathematics and offers cutting-edge AI technologies. The book goes on to discuss how ML can support mathematical modeling and how to simulate data by using artificial neural networks. Future integration between ML and complex mathematical techniques is also highlighted within the book. This book is written for researchers, practitioners, engineers, and AI consultants.
Expanding upon presentations at last year’s SUEMA (Supervised and Unsupervised Ensemble Methods and Applications) meeting, this volume explores recent developments in the field. Useful examples act as a guide for practitioners in computational intelligence.
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative perfo...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
This book constitutes the refereed proceedings of the 10th International Workshop on Multiple Classifier Systems, MCS 2011, held in Naples, Italy, in June 2011. The 36 revised papers presented together with two invited papers were carefully reviewed and selected from more than 50 submissions. The contributions are organized into sessions dealing with classifier ensembles; trees and forests; one-class classifiers; multiple kernels; classifier selection; sequential combination; ECOC; diversity; clustering; biometrics; and computer security.
This book constitutes the refereed proceedings of the 12th International Workshop on Multiple Classifier Systems, MCS 2015, held in Günzburg, Germany, in June/July 2015. The 19 revised papers presented were carefully reviewed and selected from 25 submissions. The papers address issues in multiple classifier systems and ensemble methods, including pattern recognition, machine learning, neural network, data mining and statistics. They are organized in topical sections on theory and algorithms and application and evaluation.
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social networks, and other major cyber applications—it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy. Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cyber...
Tremendous advances in all disciplines including engineering, science, health care, business, avionics, management, and so on, can also be attributed to the development of artificial intelligence paradigms. In fact, researchers are always interested in desi- ing machines which can mimic the human behaviour in a limited way. Therefore, the study of neural information processing paradigms have generated great interest among researchers, in that machine learning, borrowing features from human intelligence and applying them as algorithms in a computer friendly way, involves not only Mathem- ics and Computer Science but also Biology, Psychology, Cognition and Philosophy (among many other discipli...
The three volume proceedings LNAI 11906 – 11908 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2019, held in Würzburg, Germany, in September 2019. The total of 130 regular papers presented in these volumes was carefully reviewed and selected from 733 submissions; there are 10 papers in the demo track. The contributions were organized in topical sections named as follows: Part I: pattern mining; clustering, anomaly and outlier detection, and autoencoders; dimensionality reduction and feature selection; social networks and graphs; decision trees, interpretability, and causality; strings and streams; privacy...