LEADER 02347nam 2200469 n 450 001 996396388503316 005 20221108095925.0 035 $a(CKB)4330000000334307 035 $a(EEBO)2240862626 035 $a(UnM)9927975300971 035 $a(UnM)99828820 035 $a(EXLCZ)994330000000334307 100 $a19950509d1679 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA testimony to the Lord's power and blessed appearance in and amongst children$b[electronic resource] $ewherein is expressed the great love of God to them, who, as young and tender, have tasted of his good word & heavenly life. Published for the use of Friends, and to prevent various reports, that they may have a true account in the following testimonies, given forth by faithful witnesses. Here are also added to what was before printed, several pretious testimonies and epistles, which are as the effects of the appearance and opperation of that great power & wisdom of God in and amongst them 210 $a[London $cs.n.]$dPrinted in the year 1679 215 $a71, [1] p 300 $aIntroductory and final letters signed: Frances Taylor. 300 $aIncludes testimonials and letters from C[hristopher]. T[aylor]., J[ohn]. M[atern]., A. Paterson, and a number of Quaker students. 300 $aAttributed by Wing (2nd ed.) to Paterson; also attributed to Christopher Taylor (cf. Smith). 300 $aPlace of publication from Wing. 300 $aCopy annotated in MS. below imprint: Taylor (Christopher) Member of the Soc. of Friends; and (Frances). 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aQuakers$zEngland$vEarly works to 1800 606 $aWitness bearing (Christianity)$vEarly works to 1800 615 0$aQuakers 615 0$aWitness bearing (Christianity) 700 $aTaylor$b Frances$fd. 1685.$01020894 702 $aPaterson$b A.$cQuaker,$4aut 702 $aTaylor$b Christopher$fca. 1615-1686,$4aut 702 $aMatern$b John$f1639 or 40-1680.$4aut 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bUk-ES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996396388503316 996 $aA testimony to the Lord's power and blessed appearance in and amongst children$92416633 997 $aUNISA LEADER 01119nam 2200385 450 001 9910164204703321 005 20230809222722.0 010 $a1-4988-1635-5 035 $a(CKB)3710000001057627 035 $a(MiAaPQ)EBC4802887 035 $a(EXLCZ)993710000001057627 100 $a20170303h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aOnchocerciasis $eglobal status /$fStephen Berger, MD 210 1$aLos Angeles, California :$cGideon Informatics, Inc.,$d2017. 210 4$dİ2017 215 $a1 online resource (82 pages) $cillustrations, photographs 320 $aIncludes bibliographical references at the end of each chapters. 606 $aOnchocerciasis 606 $aOnchocerciasis$vStatistics 615 0$aOnchocerciasis. 615 0$aOnchocerciasis 676 $a616.9 700 $aBerger$b Stephen$01210032 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910164204703321 996 $aOnchocerciasis$93414593 997 $aUNINA LEADER 04212nam 22007575 450 001 9910488713403321 005 20251113185454.0 010 $a981-336-726-1 024 7 $a10.1007/978-981-33-6726-5 035 $a(CKB)4100000011979650 035 $a(MiAaPQ)EBC6676429 035 $a(Au-PeEL)EBL6676429 035 $a(OCoLC)1259623724 035 $a(PPN)260302511 035 $a(DE-He213)978-981-33-6726-5 035 $a(EXLCZ)994100000011979650 100 $a20210702d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Meets Machine Learning /$fedited by Xiaofeng Chen, Willy Susilo, Elisa Bertino 205 $a1st ed. 2021. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (168 pages) 311 08$a981-336-725-3 327 $aChapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning. 330 $aMachine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations. 606 $aData protection 606 $aMachine learning 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aDatabase management 606 $aComputer networks 606 $aApplication software 606 $aData and Information Security 606 $aMachine Learning 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aDatabase Management System 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aMachine learning. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aDatabase management. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aMachine Learning. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aDatabase Management System. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a006.31 700 $aChen$b Xiaofeng$0850517 702 $aSusilo$b Willy 702 $aBertino$b Elisa 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910488713403321 996 $aCyber security meets machine learning$92814028 997 $aUNINA