LEADER 00775nam0-2200241 --450 001 9910229660303321 005 20171204095902.0 100 $a20171204d1891----km y0itay50 ba 101 0 $aita 102 $aIT 105 $ay 001yy 200 1 $aPoeti napoletani della prima metà del secolo$econferenza tenuta nel circolo filologico addì 26 di aprile 1891$fFederico Persico 210 $aNapoli$cRiccardo Marghieri$d1891 215 $a31 p.$d24 cm 610 0 $aPoeti dialettali napoletani$aSec. 19. 700 1$aPersico,$bFederico$0104591 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910229660303321 952 $aII 82$b0925/21$fDINED 959 $aDINED 996 $aPoeti napoletani della prima metà del secolo$91534151 997 $aUNINA LEADER 04594nam 22005415 450 001 9910491030803321 005 20251225175035.0 010 $a3-030-73671-7 024 7 $a10.1007/978-3-030-73671-2 035 $a(CKB)4100000011979008 035 $a(MiAaPQ)EBC6675895 035 $a(Au-PeEL)EBL6675895 035 $a(OCoLC)1260344216 035 $a(PPN)257358021 035 $a(BIP)80809704 035 $a(BIP)79431503 035 $a(DE-He213)978-3-030-73671-2 035 $a(EXLCZ)994100000011979008 100 $a20210706d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Safety and Security $e12th International Symposium, CSS 2020, Haikou, China, December 1?3, 2020, Proceedings /$fedited by Jieren Cheng, Xiangyan Tang, Xiaozhang Liu 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (342 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12653 311 08$a3-030-73670-9 327 $aCamdar-adv: Method for generating adversarial patches on 3D object -- Universal Adversarial Perturbations of Malware -- A Semi-Supervised Learning Approach for High Dimensional Android Malware Classification -- Kernel Optimization in SVM for Defense Against Adversarial Attacks -- An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability -- A Case Study of Hainan Province -- Reliability Optimization of Composite Wing based on Sparse PC Method -- Malware Variants Detection Based on Feature Fusion -- Robust GAN Based on Attention Mechanism -- Training Aggregation in Federated Learning -- A robust digital watermarking for medical images based on PHTs-DCT -- A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT -- HOUGH-DCT Based Robust Watermarking for Medical Image -- The Blind Separation of Cockpit Mixed Signals Based On Fast Independent Component Analysis -- A Zero-Watermarking Algorithm for Medical Images Based on Gabor-DCT -- Analysis on the influencing factors of electricity sales -- "Analysis on the Strategies of Information Technology to Improve Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled Learning -- Algorithm for One-Class Classification of Remote Sensing Data -- SDSBT: A Secure Multi-Party Data Sharing Platform Based on Blockchain and TEE* -- BID-HCP: Blockchain Identifier based Health Certificate Passport System.-Research on global map construction and location of intelligent vehicles based on lidar* -- On the strengthening effect of problem-driven discussion teaching method on the learning of ?data structure? -- The Detection and segmentation of pulmonary nodules based on U-net* -- Research on Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload -- Analysis on the training willingness of new vocational farmers based on structural equation model -- a case study of Hainan Province -- The application of bibliometric and graphanalysis in document data mining: A case study on the cultivation of new type professional farmers Movie scoring algorithm based on deep neural network -- Research on a Malicious Code Detection -- Method Based on Convolutional Neural Network in a Domestic Sandbox Environment -- Electricity Sales Forecasting Based on Model Fusion and Prophet Model -- Research on Electricity Sales Forecast Model Based on Big Data. 330 $aThe LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020. The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12653 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aCheng$b Jieren 702 $aTang$b Xiangyan 702 $aLiu$b Xiaozhang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910491030803321 996 $aCyberspace Safety and Security$92174991 997 $aUNINA