標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁] 作者: 去是公開 時間: 2025-3-21 19:48
書目名稱Artificial Intelligence and Security影響因子(影響力)
書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence and Security被引頻次
書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Security年度引用
書目名稱Artificial Intelligence and Security年度引用學(xué)科排名
書目名稱Artificial Intelligence and Security讀者反饋
書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名
作者: pellagra 時間: 2025-3-21 23:34
FM8501: A formal specification,are the legal members without exposing their identities. Some identity-based cryptographic solutions have been proposed for anonymous communications. However, these approaches assume that a centralized trust authority is in charge of the private key generation, so the communications are not anonymou作者: Fibrinogen 時間: 2025-3-22 04:04
FM8501: A Verified Microprocessorommunication protocol. There is a correspondence between the Single photon and the Bell-states. The participants both are honest. Through this protocol participants can obtain the secret key. The secret key is generated by half of participants’ key, the reason for the secret key is generated by this作者: hypnotic 時間: 2025-3-22 05:40
FM8501: A Verified Microprocessor = .(|0.0.> + |1.1.>) or |Ψ.> = .(|0.1.> + |1.0.>) to resist collective rotation noise. With the anti-noise quantum states, Alice encode her information. She keep the first qubit and send the second qubit to Bob. Bob can choose to measure which means measure the second qubit by the basis {|0.>, |1.>作者: 小爭吵 時間: 2025-3-22 11:08
https://doi.org/10.1007/3-540-57960-5he consensus algorithm is the core of the BC and many researchers make efforts for its improvement. The performamce of these consensus algorithms receive better improvement by making optimization for them. Besides, combining two or more consensus algorithms could apply to specific occasions. This pa作者: glisten 時間: 2025-3-22 16:24
The FM8501 hardware interpreter,eural network in many fields. In order to improve the validity and accuracy of network intrusion detection. A new intrusion detection method based on deep neural network is proposed to detect the characteristics of kdd99 dataset. This model adopts deep learning technology, including relu, full conne作者: TATE 時間: 2025-3-22 18:45
FM8501: A conventional description,prove the tracking module in the traditional tracking learning detection (TLD) algorithm. By introduced oriented fast and rotated brief (ORB) feature points and keep the original uniform distribution point to improve the robustness and speed up execution of tracking. The experiment shows that the im作者: Exploit 時間: 2025-3-23 00:41 作者: 察覺 時間: 2025-3-23 04:10 作者: facetious 時間: 2025-3-23 08:19
Numeric definitions and operations,ta and covers a large amount of false information. How to extract key information from the information published on the Internet is the content of this paper. Since the accuracy of the factual information provided by the encyclopedic text on the Internet is higher than other texts, and for the resum作者: 生銹 時間: 2025-3-23 12:38
Lecture Notes in Computer Science is the security issues brought by firmware. The threat posed by firmware vulnerabilities is fatal. Researching firmware vulnerability mining technology is a way to effectively protect embedded systems. However, it’s not easy to move the software’s vulnerability mining methods to firmware. The exist作者: 短程旅游 時間: 2025-3-23 14:46 作者: ARM 時間: 2025-3-23 20:33
From action systems to modular systems,rk technology, industrial control systems are constantly integrating with the Internet, evolving into an open system, which also brings numerous threats to the industrial control systems. As an important security protection technology, many scholars have conducted a lot of research on industrial con作者: 遠(yuǎn)地點(diǎn) 時間: 2025-3-24 00:10
Jonathan P. Bowen,Michael G. Hincheyoring text captcha, the user experience has been greatly improved, so slide puzzle captcha has gradually replaced the text-based captcha on many large platforms.In this paper, we divided slide puzzle captcha cracking into three steps: identifying the gap position, generating the sliding track, and i作者: athlete’s-foot 時間: 2025-3-24 04:07 作者: insightful 時間: 2025-3-24 07:30 作者: 敘述 時間: 2025-3-24 11:35 作者: barium-study 時間: 2025-3-24 17:41 作者: 乏味 時間: 2025-3-24 20:07
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/162274.jpg作者: 辯論的終結(jié) 時間: 2025-3-24 23:16
Artificial Intelligence and Security978-981-15-8101-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 否認(rèn) 時間: 2025-3-25 04:32 作者: sundowning 時間: 2025-3-25 10:42 作者: hereditary 時間: 2025-3-25 12:56 作者: BRAVE 時間: 2025-3-25 17:33
A New Pairing-Based Scheme for Anonymous Communication Systemare the legal members without exposing their identities. Some identity-based cryptographic solutions have been proposed for anonymous communications. However, these approaches assume that a centralized trust authority is in charge of the private key generation, so the communications are not anonymou作者: 多樣 時間: 2025-3-25 23:32 作者: 問到了燒瓶 時間: 2025-3-26 03:34
Fault-Tolerant Semi-quantum Secure Direct Communication Scheme in Noisy Environment = .(|0.0.> + |1.1.>) or |Ψ.> = .(|0.1.> + |1.0.>) to resist collective rotation noise. With the anti-noise quantum states, Alice encode her information. She keep the first qubit and send the second qubit to Bob. Bob can choose to measure which means measure the second qubit by the basis {|0.>, |1.>作者: 一美元 時間: 2025-3-26 06:47 作者: Largess 時間: 2025-3-26 09:44
A New Network Intrusion Detection Method Based on Deep Neural Networkeural network in many fields. In order to improve the validity and accuracy of network intrusion detection. A new intrusion detection method based on deep neural network is proposed to detect the characteristics of kdd99 dataset. This model adopts deep learning technology, including relu, full conne作者: mitten 時間: 2025-3-26 13:05
Improved Single Target Tracking Learning Detection Algorithmprove the tracking module in the traditional tracking learning detection (TLD) algorithm. By introduced oriented fast and rotated brief (ORB) feature points and keep the original uniform distribution point to improve the robustness and speed up execution of tracking. The experiment shows that the im作者: Keratin 時間: 2025-3-26 18:18 作者: ELUDE 時間: 2025-3-26 23:32
Adversarial Examples Generation System Based on Gradient Shielding of Restricted Regionbility of neural networks. As a result, security of neural networks is drawing more research attention than before and a large number of attack methods have been proposed to generate adversarial examples to evaluate the robustness of neural networks. Furthermore, adversarial examples can be widely a作者: Outspoken 時間: 2025-3-27 04:17
Attribute Value Extraction Based on Rule Matchingta and covers a large amount of false information. How to extract key information from the information published on the Internet is the content of this paper. Since the accuracy of the factual information provided by the encyclopedic text on the Internet is higher than other texts, and for the resum作者: 說不出 時間: 2025-3-27 08:55
Research on Automated Vulnerability Mining of Embedded System Firmware is the security issues brought by firmware. The threat posed by firmware vulnerabilities is fatal. Researching firmware vulnerability mining technology is a way to effectively protect embedded systems. However, it’s not easy to move the software’s vulnerability mining methods to firmware. The exist作者: Cryptic 時間: 2025-3-27 13:14
Attacking Naive Bayes Journal Recommendation Systemstness of such systems against malicious attacks has been studied in recent years. In this paper, we build a journal recommendation system based on the Naive Bayesian algorithm which helps recommend suitable journals for the authors. Since journal recommendation systems may also suffer from various a作者: 繼而發(fā)生 時間: 2025-3-27 14:48
Research on Intrusion Detection Technology of Industrial Control Systemsrk technology, industrial control systems are constantly integrating with the Internet, evolving into an open system, which also brings numerous threats to the industrial control systems. As an important security protection technology, many scholars have conducted a lot of research on industrial con作者: Immortal 時間: 2025-3-27 20:56
Resnet-Based Slide Puzzle Captcha Automatic Response Systemoring text captcha, the user experience has been greatly improved, so slide puzzle captcha has gradually replaced the text-based captcha on many large platforms.In this paper, we divided slide puzzle captcha cracking into three steps: identifying the gap position, generating the sliding track, and i作者: 生命 時間: 2025-3-27 23:41 作者: 狗舍 時間: 2025-3-28 05:34
A General Framework of Smart Contract Vulnerability Mining Based on Control Flow Graph Matchingcreate potential security vulnerabilities and can result in huge economic losses. Therein, detecting potential vulnerabilities in smart contracts plays an important role in maintaining the security of the blockchain. There are a series of schemes work on finding bugs in smart contracts, such as Oyen作者: scrutiny 時間: 2025-3-28 09:23
Placement and Routing Optimization Problem for Service Function Chain: State of Art and Future Oppors can be represented by a service function chain which contains a set of virtualized network functions in a specified order. From the perspective of network performance optimization, the challenges of deploying service chain in network is twofold: 1) the location of placing virtualized network funct作者: esculent 時間: 2025-3-28 12:22
DDoS Attack Detection Based on One-Class SVM in SDN flexible management. However, security problems in SDN are also inevitable. DDoS attack belongs to one of the most serious attack types, which is fairly common for today’s Internet. In SDN security fields, DDoS attack detection research has been received more and more attention. In this paper, a DD作者: bypass 時間: 2025-3-28 16:56
FM8501: A formal specification,ation solutions for communications system. In our scheme, users can self-choose their private keys and they can also prove that they are the legal members of one group. Our approach is simple and feasible and it can be applied to some anonymous services.作者: 遺傳學(xué) 時間: 2025-3-28 18:53 作者: 鄙視 時間: 2025-3-29 01:50
A proof environment for concurrent programs,viations in the training data could lead to poor recommendation accuracy. We also conduct extensive experiments and the results show that the recommendation accuracy could be dramatically reduced under such attacks.作者: Vaginismus 時間: 2025-3-29 05:15 作者: 起來了 時間: 2025-3-29 07:47 作者: Conspiracy 時間: 2025-3-29 12:04 作者: Postulate 時間: 2025-3-29 19:18 作者: 放肆的你 時間: 2025-3-29 20:41 作者: 制造 時間: 2025-3-30 03:33 作者: Cacophonous 時間: 2025-3-30 05:22 作者: 矛盾心理 時間: 2025-3-30 11:41
Identity-Checking for Provable Data Possession Without Privacy Leakagesitive as the user can be identified when it requests integrity checking. In this paper, we employ zero-knowledge undeniable signature to RDIC to tackle the privacy leakage. There is no evidence to show the user checking, thus the user privacy is protected.作者: 雇傭兵 時間: 2025-3-30 16:10
1865-0929 cial intelligence; Internet of things; information security;..Part III: information security; big data and cloud computing; information processing..978-981-15-8100-7978-981-15-8101-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 是他笨 時間: 2025-3-30 17:31
Lecture Notes in Computer Sciencelarge-scale data. The other is for individuals. Generally, the amount of personal data access is relatively small, but the operation is frequent, so the frequent encryption and decryption of small-scale data should be solved. The protocols are designed to make the data can only been attach by the one who hold them.作者: deactivate 時間: 2025-3-31 00:30 作者: 助記 時間: 2025-3-31 03:42
The FM8501 hardware interpreter,le generation system for image classification. We proposed a novel method called gradient mask to generate adversarial examples that have a high attack success rate and small disturbances. The experimental results also validated the method’s performance.作者: MOAN 時間: 2025-3-31 07:02
Numeric definitions and operations, on the rule matching mode and the method of extracting attribute values by the language technology platform tool of Harbin Institute of Technology. The experimental results prove the feasibility and accuracy of the extraction effect.作者: Irascible 時間: 2025-3-31 11:11 作者: Adulate 時間: 2025-3-31 17:12
From action systems to modular systems,by the current research on the different classification methods of intrusion detection technology to summarize, classify and compare the existing research. Finally, it summarizes and looks forward to intrusion detection technology of industrial control system.