標(biāo)題: Titlebook: Artificial Intelligence Security and Privacy; First International Jaideep Vaidya,Moncef Gabbouj,Jin Li Conference proceedings 2024 The Edi [打印本頁] 作者: 自由才謹(jǐn)慎 時(shí)間: 2025-3-21 19:31
書目名稱Artificial Intelligence Security and Privacy影響因子(影響力)
書目名稱Artificial Intelligence Security and Privacy影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence Security and Privacy網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence Security and Privacy網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence Security and Privacy被引頻次
書目名稱Artificial Intelligence Security and Privacy被引頻次學(xué)科排名
書目名稱Artificial Intelligence Security and Privacy年度引用
書目名稱Artificial Intelligence Security and Privacy年度引用學(xué)科排名
書目名稱Artificial Intelligence Security and Privacy讀者反饋
書目名稱Artificial Intelligence Security and Privacy讀者反饋學(xué)科排名
作者: Circumscribe 時(shí)間: 2025-3-21 21:57
Next-Gen Negligence and Technologyowever, the excellent performance brought by SSL does not transfer well to the task of class imbalance. The reason is that the class bias of pseudo-labelling further misleads the decision boundary. To solve this problem, we propose a new plug-and-play approach to handle the class imbalance problem b作者: 核心 時(shí)間: 2025-3-22 01:10
Next-Gen Negligence and Free Expressione impact of the epidemic has brought new challenges to online education, and the effect of online teaching has sparked extensive research. Why online learning has not received satisfying learning effect? And how to improve the quality of online education have become the focus of research. To address作者: sclera 時(shí)間: 2025-3-22 07:36 作者: Asperity 時(shí)間: 2025-3-22 09:13 作者: 上坡 時(shí)間: 2025-3-22 13:47 作者: Nibble 時(shí)間: 2025-3-22 17:23 作者: IRS 時(shí)間: 2025-3-23 00:53
Exploring Advanced Features in C#ttle the issues in secondary vocational courses, such as the lack of motivation and initiative in learning. In this paper, we present the design and application of micro videos in Premiere Software course based on eye tracking technology. Specifically, we investigate the feasibility of incorporating作者: Estrogen 時(shí)間: 2025-3-23 02:36 作者: 舔食 時(shí)間: 2025-3-23 08:18
https://doi.org/10.1057/9781137527578e risk and mortality of gastric cancer. However, expensive and time-consuming manual annotations result in insufficient endoscopic image datasets to support the training of deep learning models. Prototypical network is the foundational model in few-shot learning and routinely is used to overcome ins作者: commute 時(shí)間: 2025-3-23 12:09 作者: 松軟無力 時(shí)間: 2025-3-23 15:00 作者: Mercurial 時(shí)間: 2025-3-23 20:15 作者: Yag-Capsulotomy 時(shí)間: 2025-3-24 01:31
David H. Kelley,Eugene F. Milonee widespread proliferation of the internet and the rapid evolution of information technology, network intrusions have become increasingly commonplace and intricate, underscoring the growing significance of network intrusion detection. In order to enhance the performance of network intrusion detectio作者: Oafishness 時(shí)間: 2025-3-24 02:25
David H. Kelley,Eugene F. Miloness imbalance within intrusion detection datasets hampers the classifier’s performance on minority classes. To simultaneously improve detection precision while maintaining efficiency, we introduce an innovative approach for addressing class imbalance in extensive datasets, denoted as SGE (SMOTE-Gauss作者: 幻想 時(shí)間: 2025-3-24 09:42
Observational Methods and Problemsical value in preventing and managing events such as traffic congestion and accidents. However, effectively distributing beacon messages in complex and dynamic traffic environments presents a major challenge. Therefore, this paper introduces VANETs, where the strategy for communication link duration作者: Institution 時(shí)間: 2025-3-24 11:24 作者: 多嘴多舌 時(shí)間: 2025-3-24 17:08 作者: Agronomy 時(shí)間: 2025-3-24 21:58
David H. Kelley,Eugene F. Milone in learning the anomaly information. At the same time, the current mainstream detection methods all need help with the problems of limited feature learning ability and weak model generalization ability. Therefore, this paper proposes a multi-module combination of anomaly detection and localization 作者: habitat 時(shí)間: 2025-3-25 02:47
https://doi.org/10.1007/978-981-99-9788-6Machine learning; Adversarial machine learning; Malware detection and analysis; Privacy-preserving data作者: Increment 時(shí)間: 2025-3-25 06:43 作者: gimmick 時(shí)間: 2025-3-25 08:49 作者: 容易做 時(shí)間: 2025-3-25 13:03
Artificial Intelligence Security and Privacy978-981-99-9788-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 解凍 時(shí)間: 2025-3-25 18:25
,A Study of?Adaptive Algorithm for?Dynamic Adjustment of?Transmission Power and?Contention Window, involves improving transmission range by increasing transmission power. However, under dense traffic conditions, boosting transmission power may lead to high interference levels and increased network overhead. Consequently, dynamic adjustment of power based on varying traffic density has become a common strategy.作者: 煉油廠 時(shí)間: 2025-3-25 22:17 作者: Insatiable 時(shí)間: 2025-3-26 03:48
0302-9743 Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3–5, 2023..The 40 regular papers and 23 workshop papers presented in this? two-volume set were carefully reviewed and selected from 115 submissions.. .Topics of interest include, e.g., attacks and defence on AI systems; adv作者: Conquest 時(shí)間: 2025-3-26 06:55 作者: 爆炸 時(shí)間: 2025-3-26 11:07
Exploring Advanced Features in C#on is conducted after a semester of course learning. The evaluate results demonstrate that the micro videos based course teaching is effective to arouse learning interest of secondary vocational students, and further improve efficiency in their Premiere Software learning.作者: 龍蝦 時(shí)間: 2025-3-26 13:17 作者: depreciate 時(shí)間: 2025-3-26 17:48
https://doi.org/10.1057/9781137527578recommendations for users. While ensuring user privacy preservation, our proposed model demonstrates superior performance over state-of-the-art baselines in session-based recommendations (SBRs), as indicated by the experimental results on two benchmark datasets.作者: FOR 時(shí)間: 2025-3-26 22:10 作者: 代理人 時(shí)間: 2025-3-27 01:34
David H. Kelley,Eugene F. Milonelity. In addition, the low-cost attention modules acquire global information from multiple perspectives and augment essential features to enhance the feature learning capability. The superiority of the method in this paper is demonstrated in the MVTec anomaly detection dataset.作者: Matrimony 時(shí)間: 2025-3-27 08:55
,Using Micro Videos to?Optimize Premiere Software Course Teaching,on is conducted after a semester of course learning. The evaluate results demonstrate that the micro videos based course teaching is effective to arouse learning interest of secondary vocational students, and further improve efficiency in their Premiere Software learning.作者: heterogeneous 時(shí)間: 2025-3-27 10:10 作者: 瑪瑙 時(shí)間: 2025-3-27 13:42
Secure Position-Aware Graph Neural Networks for Session-Based Recommendation,recommendations for users. While ensuring user privacy preservation, our proposed model demonstrates superior performance over state-of-the-art baselines in session-based recommendations (SBRs), as indicated by the experimental results on two benchmark datasets.作者: 根除 時(shí)間: 2025-3-27 18:16 作者: Herd-Immunity 時(shí)間: 2025-3-27 23:21
,An Anomaly Detection and?Localization Method Based on?Feature Fusion and?Attention,lity. In addition, the low-cost attention modules acquire global information from multiple perspectives and augment essential features to enhance the feature learning capability. The superiority of the method in this paper is demonstrated in the MVTec anomaly detection dataset.作者: Organization 時(shí)間: 2025-3-28 02:22 作者: 平靜生活 時(shí)間: 2025-3-28 06:39 作者: 征兵 時(shí)間: 2025-3-28 10:41 作者: hemoglobin 時(shí)間: 2025-3-28 16:36 作者: Androgen 時(shí)間: 2025-3-28 19:28 作者: Intellectual 時(shí)間: 2025-3-29 00:44 作者: extract 時(shí)間: 2025-3-29 06:30
,Rethinking Distribution Alignment for?Inter-class Fairness,can significantly improve performance in class imbalance tasks in terms of both accuracy and recall metrics when integrated with advanced SSL algorithms. Although the idea of BTDA is not complex, it can show advanced performance on datasets such as CIFAR and SVHN.作者: locus-ceruleus 時(shí)間: 2025-3-29 08:35
,Online Learning Behavior Analysis and?Achievement Prediction with?Explainable Machine Learning,chieved, we gain reasonable explanation on the influence factors hander the learning achievement, and predict the learning achievements with the explainable machine learning models. Finally, some suggestions are put forward to improve students’ learning behaviors, aiming to promote the quality of on作者: 航海太平洋 時(shí)間: 2025-3-29 11:29 作者: 母豬 時(shí)間: 2025-3-29 16:37
A Graph-Based Vertical Federation Broad Learning System,randomly generated during the initial graph establishment phase. There is no guidance for extracting features, and the quality of the extracted features is not guaranteed. Therefore, this paper introduces the extreme learning auto-encoder into the graph-based vertical federation broad learning syste作者: 貿(mào)易 時(shí)間: 2025-3-29 23:10 作者: CBC471 時(shí)間: 2025-3-30 02:14 作者: Left-Atrium 時(shí)間: 2025-3-30 06:50
An Improved Prototypical Network for Endoscopic Grading of Intestinal Metaplasia,m support sets. Then, the average value of features is calculated as the prototype of each category. Third, the features of the query set images are extracted using the pre-trained ViT as well. After the distances between them and prototypes are calculated for predicting the category. Finally, we co作者: 小官 時(shí)間: 2025-3-30 09:08
,Research on?ALSTM-SVR Based Traffic Flow Prediction Adaptive Beacon Message Joint Control,tion and normalization. By employing an LSTM model with an improved attention mechanism and denormalization, accurate predictions of traffic flow can be achieved. The predicted parameters are then utilized for the joint control of beacon message transmission. Simulation results demonstrate that the 作者: 靦腆 時(shí)間: 2025-3-30 13:21 作者: 橡子 時(shí)間: 2025-3-30 19:56 作者: GOAD 時(shí)間: 2025-3-30 21:05 作者: vasculitis 時(shí)間: 2025-3-31 01:05
Next-Gen Negligence and Technologycan significantly improve performance in class imbalance tasks in terms of both accuracy and recall metrics when integrated with advanced SSL algorithms. Although the idea of BTDA is not complex, it can show advanced performance on datasets such as CIFAR and SVHN.作者: 大漩渦 時(shí)間: 2025-3-31 05:33 作者: 依法逮捕 時(shí)間: 2025-3-31 10:52
Negligence and the Right to an Education of face recognition in the ciphertext domain based on homomorphic encryption. We analyze the security, accuracy, and acceleration of this approach. Ultimately, we verify that this approach achieves recognition accuracy close to plaintext and significant efficiency improvement.作者: OTTER 時(shí)間: 2025-3-31 15:49
Negligence and the Right to an Educationrandomly generated during the initial graph establishment phase. There is no guidance for extracting features, and the quality of the extracted features is not guaranteed. Therefore, this paper introduces the extreme learning auto-encoder into the graph-based vertical federation broad learning syste作者: Generator 時(shí)間: 2025-3-31 19:50
Next-Gen Negligence and Free Expressionel trained in plaintext. The Security of the protocols is analyzed, thereby demonstrating that EPoLORE meets the security requirements. The corresponding experiments show the effectiveness of the proposed scheme and the comparison of model accuracy with the regular training model.作者: 不成比例 時(shí)間: 2025-4-1 01:03 作者: 巨頭 時(shí)間: 2025-4-1 05:31