LEADER 01994nam 2200409 n 450 001 996384070303316 005 20200824121045.0 035 $a(CKB)1000000000589332 035 $a(EEBO)2240889000 035 $a(UnM)99836577e 035 $a(UnM)99836577 035 $a(EXLCZ)991000000000589332 100 $a19900913d1583 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe exercise of the faithfull soule$b[electronic resource] $ethat is to say, prayers and meditations for one to comfort himselfe in all maner of afflictions, and specially to strengthen himselfe in faith: set in order according to the articles of our faith, by Daniell Toussain, minister of the worde of God: with a comfortable preface of the author, vnto the poore remnant of the Church of Orlians; containing a short recitall of extreme and great afflictions which the said church hath suffered. Englished out of French, almost word for word, by Ferdenando Filding 210 $aImprinted at London $cBy Henrie Middleton for Henrie Denham$d1583 215 $a56, 338 p 300 $aA translation of: Toussain, Daniel. L'exercice de l'âme fidele, assavoir prieres et meditations pour se consoler en toutes sortes d'afflictions. 300 $aTitle page line 6: "maner". 300 $aPages 306-07, 310-11, 314-15 and 318-19 misnumbered 206-07, 210-11, 214-15 and 218-19. 300 $aSignatures: pi⁴ [par.]-3[par.] B-Y Z² [-Z2]. 300 $aPages marked and stained. 300 $aReproduction of original in the Cambridge University Library. 330 $aeebo-0021 606 $aChristian life$vEarly works to 1800 615 0$aChristian life 700 $aTossanus$b Daniel$f1541-1602.$01015122 701 $aFilding$b Ferdenando$01018959 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996384070303316 996 $aThe exercise of the faithfull soule$92399613 997 $aUNISA LEADER 12722nam 22006975 450 001 9910878050303321 005 20251225202131.0 010 $a981-9756-06-5 024 7 $a10.1007/978-981-97-5606-3 035 $a(MiAaPQ)EBC31572379 035 $a(Au-PeEL)EBL31572379 035 $a(CKB)33566330800041 035 $a(DE-He213)978-981-97-5606-3 035 $a(EXLCZ)9933566330800041 100 $a20240729d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Intelligent Computing Technology and Applications $e20th International Conference, ICIC 2024, Tianjin, China, August 5?8, 2024, Proceedings, Part IX /$fedited by De-Shuang Huang, Wei Chen, Jiayang Guo 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (511 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14870 311 08$a981-9756-05-7 327 $aIntro -- Preface -- Organization -- Contents- Part IX -- Information Security -- Non-targeted Adversarial Attacks onObject Detection Models -- 1 Introduction -- 2 Related Work -- 2.1 Adversarial Attacks Against Classification Models -- 2.2 Adversarial Attacks Against Object Detection Models -- 2.3 Targeted Attack andNon-targeted Attack -- 3 Generate Adversarial Examples -- 3.1 Overcoming theNMS Mechanism -- 3.2 UnTargeted Adversary -- 4 Experiment -- 4.1 Experiments Setup -- 4.2 Result onObject Detection Comparison withState-Of-The-Art Methods -- 4.3 The Denseness ofProposals -- 4.4 Perceptibility -- 5 Conclusion -- References -- Block Cipher Algorithms Identification Scheme Based onKFDA -- 1 Introduction -- 2 Related Work -- 3 Block Cipher Algorithm Identification Scheme -- 3.1 Block Cipher Algorithm Identification -- 3.2 Hamming Weight Based Ciphertext Feature Extraction Method -- 3.3 Data Mapping Based onKernel Fisher Discriminant Analysis -- 4 Experimental Preparation -- 4.1 Data Mapping Based onKernel Fisher Discriminant Analysis -- 4.2 Graded Result Evaluation Criteria -- 5 Evaluation andComparison ofExperimental Results -- 5.1 Experimental Results ofBlock Cipher withFixed Keys -- 5.2 Experimental Results ofBlock Cipher withRandom Keys -- 6 Conclusion -- References -- Network Traffic Intrusion Detection Strategy Based onE-GraphSAGE andLSTM -- 1 Introduction -- 2 Problem Description andMethodology -- 2.1 Problem Description -- 2.2 Framework -- 2.3 Data Processing -- 2.4 Traffic Graph Construction -- 2.5 E-GraphSAGE Layer -- 2.6 LSTM Layer -- 3 Experiments andResults Analysis -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Experimental Metrics -- 3.4 Analysis ofResults -- 3.5 Ablation Experiments -- 4 Conclusion -- References -- AState oftheArt Review onArtificial Intelligence-Enabled Cyber Security inSmart Grid. 327 $a1 Introduction -- 2 Related Works -- 2.1 Security Threats -- 2.2 Artificial Intelligence andMachine Learning -- 3 Network Security inSmart Grid -- 3.1 Security Countermeasures -- 3.2 Analyzing andComparing -- 4 AI-Based Cyber Security -- 5 Conclusion -- References -- Reversible Data Hiding Based onOctree Partitioning andArithmetic Coding inEncrypted Three-Dimensional Mesh Models -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Octree-Based Spatial Subdivision andPrediction Error Detection -- 2.3 Encryption -- 2.4 Data Embedding -- 2.5 Data Extraction andMesh Recovery -- 3 Experimental Results andAnalysis -- 3.1 Embedding Capacity Analysis -- 3.2 Performance Comparison -- 3.3 Model Restoration Quality Evaluation -- 4 Conclusion -- References -- ADifferential Privacy Federated Learning Scheme withImproved Noise Perturbation -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Differential Privacy -- 3 Our Approach -- 3.1 Adjust Gradient Norm Clip Bound -- 3.2 Improved Noise Reduction -- 3.3 Privacy Cost Analysis -- 3.4 Improved Differential Privacy Federated Learning Algorithm -- 4 Experiment -- 4.1 Experiment Details -- 4.2 Private Cost -- 4.3 Accuracy -- 5 Conclusion -- References -- U-shaped Vertical Split Learning withLocal Differential Privacy forPrivacy Preserving -- 1 Introduction -- 2 System Design -- 2.1 Threat Model -- 2.2 System Model -- 3 Experiment -- 3.1 Experimental Settings -- 3.2 Experimental Results andEvaluation -- 4 Conclusion -- References -- AnIntrusion Detection Method forIndustrial Internet Fusing Multi-Scale TCN andTransformer Network -- 1 Introduction -- 2 Methodology -- 2.1 Overview oftheProposed Model -- 2.2 Improved Multi-scale Temporal Convolutional Network -- 2.3 Multiscale Patch Integrated Transformer -- 2.4 Parallel Branch Fusion -- 3 Results andAnalysis. 327 $a3.1 Dataset Description -- 3.2 Evaluation Metrics -- 3.3 Implementation Details -- 3.4 Performance Comparison -- 3.5 Ablation Study -- 4 Conclusion -- References -- CSQF-BA: Efficient Container Query Technology forCloud Security Query Framework withBat Algorithm -- 1 Introduction -- 2 Related Work -- 2.1 Docker Applications andDocker Volume -- 2.2 Definition -- 3 Cloud Computing Security Query -- 4 Query Architecture withDocker Volume -- 5 Finding Algorithm inVolume -- 5.1 ACFA-BA, SFA-BA, andRFA-BA -- 5.2 Cloud Security Query Framework withBat Algorithm (CSQF-BA) -- 6 Experiment -- 7 Conclusion -- References -- Full Database Reconstruction: Leakage-Abuse Attacks Based onExpected Distributions -- 1 Introduction -- 2 Model -- 2.1 Adversary Model -- 2.2 Reconstruction Attack -- 2.3 Edge Domain -- 3 Attack -- 3.1 Full Ordering Reconstruction -- 3.2 Full Database Reconstruction -- 3.3 Adaptive Attack -- 4 Experiment -- 4.1 Full Ordering Reconstruction -- 4.2 Full Database Reconstruction -- 4.3 Adaptive Attack -- 5 Conclusion andFuture Work -- References -- FedURL: ABERT-based Federated Malicious URL Detection Framework -- 1 Introduction -- 2 Methodology -- 2.1 Federated Learning -- 2.2 Parameter-Efficient Fine-Tuning -- 2.3 FedURL -- 3 Experiment -- 3.1 Dataset -- 3.2 Implementation andSetup -- 3.3 Model Performance -- 3.4 Performance andNetwork Traffic ofFederated Learning withDifferent Training Parts -- 3.5 Performance Comparison withVaried Client Numbers -- 3.6 Analysis ofClient Number Impact onTraining strategy inFederated Learning -- 3.7 Performance Evaluation using Real-world Dataset -- 4 Results andDiscussion -- References -- Show Criminals' True Color: Chinese Variant Toxic Text Restoration Based onPointer-Generator Network -- 1 Introduction -- 2 Related Work -- 2.1 Variant Toxic Text Detection andRestoration. 327 $a2.2 Pointer Mechanism -- 3 Methodology -- 3.1 Sequence-To-Sequence Model -- 3.2 Pointer-Generator Networks -- 4 Experiments Settings -- 4.1 Datasets -- 4.2 Baselines -- 4.3 Evaluation Metric -- 5 Experiment Results andAnalysis -- 5.1 Data Analysis andVariant Rules Extraction -- 5.2 Evaluation ofModel Performance -- 5.3 Case Study -- 6 Conclusion -- References -- Adversarial Attacks onNetwork Intrusion Detection Systems Based onFederated Learning -- 1 Introduction -- 2 Adversarial Attack Scheme -- 2.1 Overview -- 2.2 Adversarial Sample Generation Method -- 2.3 Poisoning Attack Method -- 3 Experiment -- 3.1 Datasets andEvaluation Metrics -- 3.2 Experiment Results andAnalysis -- 4 Conclusion -- References -- AnEWMA-Based Mitigation Scheme Against Interest Flooding Attacks inNamed Data Networks -- 1 Introduction -- 2 System Model -- 3 The Proposed EBMS -- 4 Performance Evaluation -- 4.1 Impacts ofIFAs andbIFA onNetwork -- 4.2 Effectiveness ofAttack Mitigation -- 5 Conclusions -- References. -- CAKGC: AClustering Method ofCybercrime Assets Knowledge Graph Based onFeature Fusion -- 1 Introduction -- 2 Related Work -- 2.1 Detection Methods forCybercrime Websites -- 2.2 Operation Chain ofCybercrime Underground Industry -- 2.3 Knowledge Graph Embedding -- 3 Methodology -- 3.1 Construction ofCybercrime Assets Knowledge Graph -- 3.2 Clustering ofCybercrime Assets Knowledge Graph -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Comparison Algorithms -- 4.4 Experimental Results -- 5 Conclusion -- References -- Multi-texture Fusion Attack: ARobust Adversarial Camouflage inPhysical World -- 1 Introduction -- 2 Related Work -- 2.1 Physical Camouflage Attack -- 3 Method -- 3.1 The Definition ofProblem -- 3.2 Framework Overview -- 3.3 Generate Adversarial Camouflage -- 3.4 Expectation Over Transformation. 327 $a3.5 Physical Transformation -- 4 Experiment -- 4.1 Experimental Setting -- 4.2 Adversarial Attack intheDigital Space -- 4.3 Adversarial Attack inthePhysical Space -- 4.4 Ablation Studies -- 5 Conclusion -- References -- When Blockchain Meets Asynchronous Federated Learning -- 1 Introduction -- 2 Categorization Based onBlockchain Extensions -- 2.1 Blockchain Based onDirected Acyclic Graph -- 2.2 Traditional Blockchain -- 3 Categorization Based onCoupling Approaches -- 3.1 Fully Coupled BCFL -- 3.2 Flexibly Coupled BCFL -- 3.3 Loosely Coupled BCFL -- 4 Challenges andFuture Directions -- 5 Conclusion -- References -- AHigh-Dimensional Data Trust Publishing Method Based onAttention Mechanism andDifferential Privacy -- 1 Introduction -- 2 Preliminaries -- 2.1 Differential Privacy -- 2.2 Attention Mechanism -- 3 AMPriv Method -- 3.1 ACHD -- 3.2 NAS -- 3.3 NMEGreedybayes -- 3.4 NMENoisyConditionals -- 3.5 Sampling -- 4 Experiments -- 4.1 Experimental Environment andSetup -- 4.2 Method Performance Analysis -- 4.3 Data Availability Analysis -- 5 Conclusion -- References -- PTGroup: AnAutomated Penetration Testing Framework Using LLMs andMultiple Prompt Chains -- 1 Introduction -- 2 Related Work -- 2.1 Penetration Testing -- 2.2 Autonomous Agents -- 3 Methodology -- 3.1 Thought-Act-Observe Loop -- 3.2 Multi-agent Framework -- 3.3 Multiple Prompt Chains -- 4 Experiments -- 4.1 Experimental Environment -- 4.2 Results andDiscussion -- 5 Conclusion -- References -- Spammer Group Detection Approach Based onDeep Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Group Behavior-Based Approaches -- 2.2 Graph-Based Approaches -- 3 The Proposed Detection Method DRL-AE -- 3.1 Obtaining theInitial User Node Embeddings -- 3.2 Generating theCandidate Groups -- 3.3 Detecting Spammer Groups -- 4 Experiments -- 4.1 Experiments Datasets. 327 $a4.2 Evaluation Metrics. 330 $aThis 13-volume set LNCS 14862-14874 constitutes - in conjunction with the 6-volume set LNAI 14875-14880 and the two-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14870 606 $aComputational intelligence 606 $aMachine learning 606 $aComputer networks 606 $aApplication software 606 $aComputational Intelligence 606 $aMachine Learning 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aComputational intelligence. 615 0$aMachine learning. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aComputational Intelligence. 615 24$aMachine Learning. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a006.3 700 $aHuang$b De-Shuang$01732604 701 $aChen$b Wei$0636150 701 $aGuo$b Jiayang$01753328 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910878050303321 996 $aAdvanced Intelligent Computing Technology and Applications$94201722 997 $aUNINA