LEADER 01320nam2 22003613i 450 001 PUV0414516 005 20251003044313.0 010 $a0521560691$bhardback 010 $a0521789877$bpaperback 100 $a20081029d1999 ||||0itac50 ba 101 | $aeng 102 $agb 181 1$6z01$ai $bxxxe 182 1$6z01$an 183 1$6z01$anc$2RDAcarrier 200 0 $a2$fRichard P. Stanley 210 $aCambridge [etc.]$cCambridge university press$d1999 215 $aXII, 581 p.$d24 cm. 225 | $aCambridge studies in advanced mathematics$v62 410 0$1001MIL0023655$12001 $aCambridge studies in advanced mathematics$v62 461 1$1001TO00312850$12001 $aEnumerative combinatorics$fRichard P. Stanley$v2 606 $aAnalisi combinatoria$2FIR$3CFIC068825$9E 676 $a511$9Principi generali della matematica$v14 676 $a511.62$9ANALISI COMBINATORIA. ENUMERAZIONE$v22 696 $aCombinatoria 699 $aAnalisi combinatoria$yCombinatoria 801 3$aIT$bIT-000000$c20081029 850 $aIT-BN0095 912 $aPUV0414516 950 2$aBiblioteca Centralizzata di Ateneo$cv. 2$d 01SALA DING 511 STA.en$e 0102 0000035205 VMA A4(0002 v. 2$fY $h20000920$i20000920 977 $a 01 996 $a2$961340 997 $aUNISANNIO LEADER 04594nam 22005415 450 001 9910491030803321 005 20251225175035.0 010 $a3-030-73671-7 024 7 $a10.1007/978-3-030-73671-2 035 $a(CKB)4100000011979008 035 $a(MiAaPQ)EBC6675895 035 $a(Au-PeEL)EBL6675895 035 $a(OCoLC)1260344216 035 $a(PPN)257358021 035 $a(BIP)80809704 035 $a(BIP)79431503 035 $a(DE-He213)978-3-030-73671-2 035 $a(EXLCZ)994100000011979008 100 $a20210706d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Safety and Security $e12th International Symposium, CSS 2020, Haikou, China, December 1?3, 2020, Proceedings /$fedited by Jieren Cheng, Xiangyan Tang, Xiaozhang Liu 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (342 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12653 311 08$a3-030-73670-9 327 $aCamdar-adv: Method for generating adversarial patches on 3D object -- Universal Adversarial Perturbations of Malware -- A Semi-Supervised Learning Approach for High Dimensional Android Malware Classification -- Kernel Optimization in SVM for Defense Against Adversarial Attacks -- An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability -- A Case Study of Hainan Province -- Reliability Optimization of Composite Wing based on Sparse PC Method -- Malware Variants Detection Based on Feature Fusion -- Robust GAN Based on Attention Mechanism -- Training Aggregation in Federated Learning -- A robust digital watermarking for medical images based on PHTs-DCT -- A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT -- HOUGH-DCT Based Robust Watermarking for Medical Image -- The Blind Separation of Cockpit Mixed Signals Based On Fast Independent Component Analysis -- A Zero-Watermarking Algorithm for Medical Images Based on Gabor-DCT -- Analysis on the influencing factors of electricity sales -- "Analysis on the Strategies of Information Technology to Improve Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled Learning -- Algorithm for One-Class Classification of Remote Sensing Data -- SDSBT: A Secure Multi-Party Data Sharing Platform Based on Blockchain and TEE* -- BID-HCP: Blockchain Identifier based Health Certificate Passport System.-Research on global map construction and location of intelligent vehicles based on lidar* -- On the strengthening effect of problem-driven discussion teaching method on the learning of ?data structure? -- The Detection and segmentation of pulmonary nodules based on U-net* -- Research on Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload -- Analysis on the training willingness of new vocational farmers based on structural equation model -- a case study of Hainan Province -- The application of bibliometric and graphanalysis in document data mining: A case study on the cultivation of new type professional farmers Movie scoring algorithm based on deep neural network -- Research on a Malicious Code Detection -- Method Based on Convolutional Neural Network in a Domestic Sandbox Environment -- Electricity Sales Forecasting Based on Model Fusion and Prophet Model -- Research on Electricity Sales Forecast Model Based on Big Data. 330 $aThe LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020. The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12653 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aCheng$b Jieren 702 $aTang$b Xiangyan 702 $aLiu$b Xiaozhang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910491030803321 996 $aCyberspace Safety and Security$92174991 997 $aUNINA