派博傳思國際中心

標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁]

作者: 去是公開    時間: 2025-3-21 19:48
書目名稱Artificial Intelligence and Security影響因子(影響力)




書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Artificial Intelligence and Security被引頻次




書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名




書目名稱Artificial Intelligence and Security年度引用




書目名稱Artificial Intelligence and Security年度引用學(xué)科排名




書目名稱Artificial Intelligence and Security讀者反饋




書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名





作者: pellagra    時間: 2025-3-21 23:34
FM8501: A formal specification,are the legal members without exposing their identities. Some identity-based cryptographic solutions have been proposed for anonymous communications. However, these approaches assume that a centralized trust authority is in charge of the private key generation, so the communications are not anonymou
作者: Fibrinogen    時間: 2025-3-22 04:04
FM8501: A Verified Microprocessorommunication protocol. There is a correspondence between the Single photon and the Bell-states. The participants both are honest. Through this protocol participants can obtain the secret key. The secret key is generated by half of participants’ key, the reason for the secret key is generated by this
作者: hypnotic    時間: 2025-3-22 05:40
FM8501: A Verified Microprocessor = .(|0.0.> + |1.1.>) or |Ψ.> = .(|0.1.> + |1.0.>) to resist collective rotation noise. With the anti-noise quantum states, Alice encode her information. She keep the first qubit and send the second qubit to Bob. Bob can choose to measure which means measure the second qubit by the basis {|0.>, |1.>
作者: 小爭吵    時間: 2025-3-22 11:08
https://doi.org/10.1007/3-540-57960-5he consensus algorithm is the core of the BC and many researchers make efforts for its improvement. The performamce of these consensus algorithms receive better improvement by making optimization for them. Besides, combining two or more consensus algorithms could apply to specific occasions. This pa
作者: glisten    時間: 2025-3-22 16:24
The FM8501 hardware interpreter,eural network in many fields. In order to improve the validity and accuracy of network intrusion detection. A new intrusion detection method based on deep neural network is proposed to detect the characteristics of kdd99 dataset. This model adopts deep learning technology, including relu, full conne
作者: TATE    時間: 2025-3-22 18:45
FM8501: A conventional description,prove the tracking module in the traditional tracking learning detection (TLD) algorithm. By introduced oriented fast and rotated brief (ORB) feature points and keep the original uniform distribution point to improve the robustness and speed up execution of tracking. The experiment shows that the im
作者: Exploit    時間: 2025-3-23 00:41

作者: 察覺    時間: 2025-3-23 04:10

作者: facetious    時間: 2025-3-23 08:19
Numeric definitions and operations,ta and covers a large amount of false information. How to extract key information from the information published on the Internet is the content of this paper. Since the accuracy of the factual information provided by the encyclopedic text on the Internet is higher than other texts, and for the resum
作者: 生銹    時間: 2025-3-23 12:38
Lecture Notes in Computer Science is the security issues brought by firmware. The threat posed by firmware vulnerabilities is fatal. Researching firmware vulnerability mining technology is a way to effectively protect embedded systems. However, it’s not easy to move the software’s vulnerability mining methods to firmware. The exist
作者: 短程旅游    時間: 2025-3-23 14:46

作者: ARM    時間: 2025-3-23 20:33
From action systems to modular systems,rk technology, industrial control systems are constantly integrating with the Internet, evolving into an open system, which also brings numerous threats to the industrial control systems. As an important security protection technology, many scholars have conducted a lot of research on industrial con
作者: 遠(yuǎn)地點(diǎn)    時間: 2025-3-24 00:10
Jonathan P. Bowen,Michael G. Hincheyoring text captcha, the user experience has been greatly improved, so slide puzzle captcha has gradually replaced the text-based captcha on many large platforms.In this paper, we divided slide puzzle captcha cracking into three steps: identifying the gap position, generating the sliding track, and i
作者: athlete’s-foot    時間: 2025-3-24 04:07

作者: insightful    時間: 2025-3-24 07:30

作者: 敘述    時間: 2025-3-24 11:35

作者: barium-study    時間: 2025-3-24 17:41

作者: 乏味    時間: 2025-3-24 20:07
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/162274.jpg
作者: 辯論的終結(jié)    時間: 2025-3-24 23:16
Artificial Intelligence and Security978-981-15-8101-4Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 否認(rèn)    時間: 2025-3-25 04:32

作者: sundowning    時間: 2025-3-25 10:42

作者: hereditary    時間: 2025-3-25 12:56

作者: BRAVE    時間: 2025-3-25 17:33
A New Pairing-Based Scheme for Anonymous Communication Systemare the legal members without exposing their identities. Some identity-based cryptographic solutions have been proposed for anonymous communications. However, these approaches assume that a centralized trust authority is in charge of the private key generation, so the communications are not anonymou
作者: 多樣    時間: 2025-3-25 23:32

作者: 問到了燒瓶    時間: 2025-3-26 03:34
Fault-Tolerant Semi-quantum Secure Direct Communication Scheme in Noisy Environment = .(|0.0.> + |1.1.>) or |Ψ.> = .(|0.1.> + |1.0.>) to resist collective rotation noise. With the anti-noise quantum states, Alice encode her information. She keep the first qubit and send the second qubit to Bob. Bob can choose to measure which means measure the second qubit by the basis {|0.>, |1.>
作者: 一美元    時間: 2025-3-26 06:47

作者: Largess    時間: 2025-3-26 09:44
A New Network Intrusion Detection Method Based on Deep Neural Networkeural network in many fields. In order to improve the validity and accuracy of network intrusion detection. A new intrusion detection method based on deep neural network is proposed to detect the characteristics of kdd99 dataset. This model adopts deep learning technology, including relu, full conne
作者: mitten    時間: 2025-3-26 13:05
Improved Single Target Tracking Learning Detection Algorithmprove the tracking module in the traditional tracking learning detection (TLD) algorithm. By introduced oriented fast and rotated brief (ORB) feature points and keep the original uniform distribution point to improve the robustness and speed up execution of tracking. The experiment shows that the im
作者: Keratin    時間: 2025-3-26 18:18

作者: ELUDE    時間: 2025-3-26 23:32
Adversarial Examples Generation System Based on Gradient Shielding of Restricted Regionbility of neural networks. As a result, security of neural networks is drawing more research attention than before and a large number of attack methods have been proposed to generate adversarial examples to evaluate the robustness of neural networks. Furthermore, adversarial examples can be widely a
作者: Outspoken    時間: 2025-3-27 04:17
Attribute Value Extraction Based on Rule Matchingta and covers a large amount of false information. How to extract key information from the information published on the Internet is the content of this paper. Since the accuracy of the factual information provided by the encyclopedic text on the Internet is higher than other texts, and for the resum
作者: 說不出    時間: 2025-3-27 08:55
Research on Automated Vulnerability Mining of Embedded System Firmware is the security issues brought by firmware. The threat posed by firmware vulnerabilities is fatal. Researching firmware vulnerability mining technology is a way to effectively protect embedded systems. However, it’s not easy to move the software’s vulnerability mining methods to firmware. The exist
作者: Cryptic    時間: 2025-3-27 13:14
Attacking Naive Bayes Journal Recommendation Systemstness of such systems against malicious attacks has been studied in recent years. In this paper, we build a journal recommendation system based on the Naive Bayesian algorithm which helps recommend suitable journals for the authors. Since journal recommendation systems may also suffer from various a
作者: 繼而發(fā)生    時間: 2025-3-27 14:48
Research on Intrusion Detection Technology of Industrial Control Systemsrk technology, industrial control systems are constantly integrating with the Internet, evolving into an open system, which also brings numerous threats to the industrial control systems. As an important security protection technology, many scholars have conducted a lot of research on industrial con
作者: Immortal    時間: 2025-3-27 20:56
Resnet-Based Slide Puzzle Captcha Automatic Response Systemoring text captcha, the user experience has been greatly improved, so slide puzzle captcha has gradually replaced the text-based captcha on many large platforms.In this paper, we divided slide puzzle captcha cracking into three steps: identifying the gap position, generating the sliding track, and i
作者: 生命    時間: 2025-3-27 23:41

作者: 狗舍    時間: 2025-3-28 05:34
A General Framework of Smart Contract Vulnerability Mining Based on Control Flow Graph Matchingcreate potential security vulnerabilities and can result in huge economic losses. Therein, detecting potential vulnerabilities in smart contracts plays an important role in maintaining the security of the blockchain. There are a series of schemes work on finding bugs in smart contracts, such as Oyen
作者: scrutiny    時間: 2025-3-28 09:23
Placement and Routing Optimization Problem for Service Function Chain: State of Art and Future Oppors can be represented by a service function chain which contains a set of virtualized network functions in a specified order. From the perspective of network performance optimization, the challenges of deploying service chain in network is twofold: 1) the location of placing virtualized network funct
作者: esculent    時間: 2025-3-28 12:22
DDoS Attack Detection Based on One-Class SVM in SDN flexible management. However, security problems in SDN are also inevitable. DDoS attack belongs to one of the most serious attack types, which is fairly common for today’s Internet. In SDN security fields, DDoS attack detection research has been received more and more attention. In this paper, a DD
作者: bypass    時間: 2025-3-28 16:56
FM8501: A formal specification,ation solutions for communications system. In our scheme, users can self-choose their private keys and they can also prove that they are the legal members of one group. Our approach is simple and feasible and it can be applied to some anonymous services.
作者: 遺傳學(xué)    時間: 2025-3-28 18:53

作者: 鄙視    時間: 2025-3-29 01:50
A proof environment for concurrent programs,viations in the training data could lead to poor recommendation accuracy. We also conduct extensive experiments and the results show that the recommendation accuracy could be dramatically reduced under such attacks.
作者: Vaginismus    時間: 2025-3-29 05:15

作者: 起來了    時間: 2025-3-29 07:47

作者: Conspiracy    時間: 2025-3-29 12:04

作者: Postulate    時間: 2025-3-29 19:18

作者: 放肆的你    時間: 2025-3-29 20:41

作者: 制造    時間: 2025-3-30 03:33

作者: Cacophonous    時間: 2025-3-30 05:22

作者: 矛盾心理    時間: 2025-3-30 11:41
Identity-Checking for Provable Data Possession Without Privacy Leakagesitive as the user can be identified when it requests integrity checking. In this paper, we employ zero-knowledge undeniable signature to RDIC to tackle the privacy leakage. There is no evidence to show the user checking, thus the user privacy is protected.
作者: 雇傭兵    時間: 2025-3-30 16:10
1865-0929 cial intelligence; Internet of things; information security;..Part III: information security; big data and cloud computing; information processing..978-981-15-8100-7978-981-15-8101-4Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 是他笨    時間: 2025-3-30 17:31
Lecture Notes in Computer Sciencelarge-scale data. The other is for individuals. Generally, the amount of personal data access is relatively small, but the operation is frequent, so the frequent encryption and decryption of small-scale data should be solved. The protocols are designed to make the data can only been attach by the one who hold them.
作者: deactivate    時間: 2025-3-31 00:30

作者: 助記    時間: 2025-3-31 03:42
The FM8501 hardware interpreter,le generation system for image classification. We proposed a novel method called gradient mask to generate adversarial examples that have a high attack success rate and small disturbances. The experimental results also validated the method’s performance.
作者: MOAN    時間: 2025-3-31 07:02
Numeric definitions and operations, on the rule matching mode and the method of extracting attribute values by the language technology platform tool of Harbin Institute of Technology. The experimental results prove the feasibility and accuracy of the extraction effect.
作者: Irascible    時間: 2025-3-31 11:11

作者: Adulate    時間: 2025-3-31 17:12
From action systems to modular systems,by the current research on the different classification methods of intrusion detection technology to summarize, classify and compare the existing research. Finally, it summarizes and looks forward to intrusion detection technology of industrial control system.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
深泽县| 楚雄市| 寻乌县| 克拉玛依市| 武穴市| 鞍山市| 怀宁县| 固始县| 沽源县| 中江县| 闻喜县| 蒙山县| 北川| 临汾市| 泽州县| 清水县| 宣汉县| 偃师市| 诸暨市| 曲水县| 永城市| 黎城县| 名山县| 新巴尔虎右旗| 全州县| 邹平县| 阿尔山市| 阳朔县| 亳州市| 天水市| 汉川市| 峨边| 景谷| 绥滨县| 芦山县| 安龙县| 贵德县| 子长县| 乌兰县| 汕尾市| 安岳县|