派博傳思國(guó)際中心

標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁(yè)]

作者: burgeon    時(shí)間: 2025-3-21 19:29
書(shū)目名稱Artificial Intelligence and Security影響因子(影響力)




書(shū)目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名




書(shū)目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Artificial Intelligence and Security被引頻次




書(shū)目名稱Artificial Intelligence and Security被引頻次學(xué)科排名




書(shū)目名稱Artificial Intelligence and Security年度引用




書(shū)目名稱Artificial Intelligence and Security年度引用學(xué)科排名




書(shū)目名稱Artificial Intelligence and Security讀者反饋




書(shū)目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名





作者: novelty    時(shí)間: 2025-3-21 21:12
Die Elemente der FORTRAN-Sprache,TCWTs). Compared with the discrete wavelet transform, DTCWT provides multiple-directions and multiple-scales decomposition to image and also has the fast calculation capability. In the proposed method Multiple DTCWTs is incorporated to get more texture features; compare to Gabor wavelet, DTCWT has l
作者: Missile    時(shí)間: 2025-3-22 02:38

作者: Conjuction    時(shí)間: 2025-3-22 07:15
https://doi.org/10.1007/978-3-322-91101-8efore, many learning participants can perform neural network-based deep learning over a combined dataset without revealing the participants’ local data to a central server. However, this privacy-preserving deep learning system is not secure against participant-level attack. We present an effective p
作者: ARC    時(shí)間: 2025-3-22 11:02

作者: extinct    時(shí)間: 2025-3-22 16:36

作者: Individual    時(shí)間: 2025-3-22 20:32

作者: 最有利    時(shí)間: 2025-3-23 00:08
Erweiterung des Wertebereiches,study. Data collector is such a tool. Compared with the normal data collector, the Topic-focused network data collectors pay more attention to web pages related to pre-set topics. This paper designs and implements a network data collector and in order to improve the search efficiency, this paper use
作者: noxious    時(shí)間: 2025-3-23 03:23

作者: 徹底明白    時(shí)間: 2025-3-23 07:02
https://doi.org/10.1007/978-3-322-93816-9ty of key-points detection will greatly affect the performance of image registration. In this paper, we use the fully convolutional neural network to perform key-points detection and feature extraction on the image, which is applied to the registration. Experiments show that the proposed method achi
作者: Infant    時(shí)間: 2025-3-23 12:34
RNAi-Mediated Silencing of FOXO Factorsmethods based on deep neural network do not make full use of the multi-level features which extracted from low-resolution images, and do not pay attention to the high-frequency information which needs to be reconstructed in the image, so the performances are relatively poor. Aiming at these problems
作者: 環(huán)形    時(shí)間: 2025-3-23 16:15
Characterization of FOXO Acetylation to extract ground object, but lack simple and effective methods to extract ground object with distinctive features. In this paper, using rule-based object-oriented classification technology, through remote sensing image preprocessing, multi-scale segmentation, extraction rule formulation and other
作者: grieve    時(shí)間: 2025-3-23 22:06

作者: amyloid    時(shí)間: 2025-3-23 23:51

作者: Somber    時(shí)間: 2025-3-24 02:40

作者: Medicare    時(shí)間: 2025-3-24 07:44

作者: Irksome    時(shí)間: 2025-3-24 14:42

作者: Devastate    時(shí)間: 2025-3-24 17:57
https://doi.org/10.1007/978-1-4419-6339-0ion in recent years. KG embedding technology becomes one hot spot in KG research in terms of its efficiency in KG completion, relationship extraction, entity classification and resolution, etc. KG embedding is to embed KG entities and relations as vectors into the continuous spaces, aims at simplify
作者: 使無(wú)效    時(shí)間: 2025-3-24 21:04

作者: bisphosphonate    時(shí)間: 2025-3-25 01:20

作者: 有機(jī)體    時(shí)間: 2025-3-25 06:59
https://doi.org/10.1007/978-981-15-8083-3artificial intelligence; authentication; computer hardware; computer networks; computer security; compute
作者: CLAN    時(shí)間: 2025-3-25 09:28
978-981-15-8082-6Springer Nature Singapore Pte Ltd. 2020
作者: Inveterate    時(shí)間: 2025-3-25 15:29

作者: 任命    時(shí)間: 2025-3-25 19:45
Joint Generic Learning and Multi-source Domain Adaptation on Unsupervised Face Recognitionain because the distributions of both domains are different. Besides, in many cases, there is a lack of adequate supervised target domain training samples. In order to solve the mismatch between the domains and the lack of training samples, this paper proposes jointing domain adaptation and generic
作者: Trypsin    時(shí)間: 2025-3-25 20:30

作者: 使混合    時(shí)間: 2025-3-26 03:38
Intelligent Contract for Power Market Transaction Based on the BlockChainfor distributed energy. It has become a trend for the micro-grid to participate in the power market. Blockchain is a database technology with transparent distribution through a decentralization mechanism. In the blockchain, the transaction data are maintained by entire nodes in the power market. It
作者: 友好    時(shí)間: 2025-3-26 04:39
Survey on Zero-Trust Network Securityecoming more and more severe. In zero trust, no unit is fully trusted even if it passes the certification. They only have the least privilege, access to data requires authentication, these processes need to be logged. This paper performs a typical survey of the composition and key technologies of ze
作者: 小鹿    時(shí)間: 2025-3-26 11:19
A Novel Consensus Algorithm for Alliance Chaind faster settlement. There are lots of application using this technique to deal with various problems. There are three kinds of block-chain which are public blockchain, alliance block-chain, and private block-chain. From other researchers’ statements, we get that the note in the alliance chain need
作者: GEST    時(shí)間: 2025-3-26 16:17
A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithmstudy. Data collector is such a tool. Compared with the normal data collector, the Topic-focused network data collectors pay more attention to web pages related to pre-set topics. This paper designs and implements a network data collector and in order to improve the search efficiency, this paper use
作者: Spirometry    時(shí)間: 2025-3-26 17:25

作者: prosthesis    時(shí)間: 2025-3-27 00:19
A Novel Keypoints-Based Image Registration Method with Fully Convolutional Neural Networkty of key-points detection will greatly affect the performance of image registration. In this paper, we use the fully convolutional neural network to perform key-points detection and feature extraction on the image, which is applied to the registration. Experiments show that the proposed method achi
作者: 笨拙的我    時(shí)間: 2025-3-27 03:11

作者: 輕觸    時(shí)間: 2025-3-27 08:17

作者: esthetician    時(shí)間: 2025-3-27 09:28
Optimization and Parallelization of the Cosmological N-Body Simulation on Many-Core Processorsential problems, including the distribution of matter in the universe, the formation of galaxies, dark matter and dark energy, etc. [.]. Thus, the transplantation and application of the N-body simulation software on the Sunway TaihuLight platform are of great significance. In order to enhance the e
作者: Budget    時(shí)間: 2025-3-27 15:43

作者: 為現(xiàn)場(chǎng)    時(shí)間: 2025-3-27 21:36
Chinese News Data Extraction System Based on Readability Algorithmalysis industry or to meet the data needs of artificial intelligence domain model training. The purpose of this article is to build an efficient data extraction system for Chinese news data collection. First, we will introduce the development of the field of network data collection, review the previ
作者: Cpap155    時(shí)間: 2025-3-28 00:42

作者: 狗舍    時(shí)間: 2025-3-28 05:54

作者: Grating    時(shí)間: 2025-3-28 08:26

作者: daredevil    時(shí)間: 2025-3-28 12:08
A Robust Framework for High-Quality Voice Conversion with Conditional Generative Adversarial Networke of training speech data, but on a small dataset, DNN suffers from the overfitting problem, resulting in performance degradation. Recently, many generative adversarial network (GAN) based VC methods have been developed, which prove to be a promising approach. However, the quality and similarity of
作者: 欲望    時(shí)間: 2025-3-28 14:49

作者: 合適    時(shí)間: 2025-3-28 22:37

作者: ANNUL    時(shí)間: 2025-3-29 00:49
1865-0929 nce and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS...The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully rev
作者: 有發(fā)明天才    時(shí)間: 2025-3-29 06:43
Erweiterung des Wertebereiches,es related to pre-set topics. This paper designs and implements a network data collector and in order to improve the search efficiency, this paper uses annealing genetic algorithm by studying the hybrid genetic algorithm based on simulated annealing. The result indicated the hybrid algorithm can increase page coverage and crawling efficiency.
作者: mydriatic    時(shí)間: 2025-3-29 08:21
Erweiterung des Wertebereiches, this paper focuses on the security problems of fog computing in industrial Internet and proposes a model for measuring the security situation of industrial fog Internet. In this paper, ELM algorithm is adopted to verify the proposed model. The result shows the effectiveness of the model, and ELM has a good performance in the prediction effect.
作者: Crayon    時(shí)間: 2025-3-29 11:36

作者: 無(wú)脊椎    時(shí)間: 2025-3-29 18:42

作者: osteoclasts    時(shí)間: 2025-3-29 21:55
The Study of Fog Computing Security Situation Prediction in Industrial Internet this paper focuses on the security problems of fog computing in industrial Internet and proposes a model for measuring the security situation of industrial fog Internet. In this paper, ELM algorithm is adopted to verify the proposed model. The result shows the effectiveness of the model, and ELM has a good performance in the prediction effect.
作者: Morphine    時(shí)間: 2025-3-30 00:42
A Novel Keypoints-Based Image Registration Method with Fully Convolutional Neural Networkperform key-points detection and feature extraction on the image, which is applied to the registration. Experiments show that the proposed method achieves better performance and is superior to the traditional key-points based registration method.
作者: LAP    時(shí)間: 2025-3-30 05:37
Conference proceedings 2020curity, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS...The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and
作者: elucidate    時(shí)間: 2025-3-30 10:36

作者: moribund    時(shí)間: 2025-3-30 15:04
https://doi.org/10.1007/978-1-4939-8900-3celerated by MPI?+?multi-core, efficient DMA transmission, mutual concealment of communication and calculation, data reuse and other parallel optimization strategies. Experiments on Sunway platform show that the strategy proposed in this paper greatly improves the efficiency of the algorithm and the performance of the algorithm.
作者: 狂熱語(yǔ)言    時(shí)間: 2025-3-30 19:28
Maxeler Data-Flow in Computational Finance, of text data sparsity to make it more suitable for Chinese news data. The system is based on the Scrapy framework to facilitate large-scale Crawling. By comparing the basic readability algorithm with the experimental results, the improved crawling system can extract Chinese news data more accurately and efficiently.
作者: 反感    時(shí)間: 2025-3-30 23:15

作者: 割讓    時(shí)間: 2025-3-31 01:38

作者: 討人喜歡    時(shí)間: 2025-3-31 05:44
Chinese News Data Extraction System Based on Readability Algorithm of text data sparsity to make it more suitable for Chinese news data. The system is based on the Scrapy framework to facilitate large-scale Crawling. By comparing the basic readability algorithm with the experimental results, the improved crawling system can extract Chinese news data more accurately and efficiently.
作者: breadth    時(shí)間: 2025-3-31 09:36

作者: Euphonious    時(shí)間: 2025-3-31 15:10

作者: NICHE    時(shí)間: 2025-3-31 19:24
Conference proceedings 2020selected from 1064 submissions. The papers were organized in topical sections as follows:..Part I: artificial intelligence;..Part II: artificial intelligence; Internet of things; information security;..Part III: information security; big data and cloud computing; information processing..
作者: 哀悼    時(shí)間: 2025-4-1 01:10
1865-0929 cial intelligence; Internet of things; information security;..Part III: information security; big data and cloud computing; information processing..978-981-15-8082-6978-981-15-8083-3Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 碳水化合物    時(shí)間: 2025-4-1 05:39
Die Elemente der FORTRAN-Sprache,Kernel Principal Component Analysis (KPCA) is used to calculate the features from the embedding Copula model in the linear space. Experiments demonstrate that our method has fast and robust performance of texture extraction compared to the state-of-the-art methods.
作者: insert    時(shí)間: 2025-4-1 06:05
https://doi.org/10.1007/978-3-322-91101-8target domains can mutual interlace and their structures are well preserved, and we can get more discrimination information from multiple feature subspaces. Finally, the recognition is obtained by using combine strategies. The experimental results show that the recognition performance of the framework is better than that of the competitive ones.
作者: resuscitation    時(shí)間: 2025-4-1 11:17
,L?sung der linearen Gleichungssysteme,on the concepts of the blockchain. The roles of the micro-grid and the related intelligent contract technologies in the power market are also investigated in the electricity reform. Finally, a blockchain scheme for point-to-point trading is designed for future purposes.




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
山丹县| 富阳市| 图们市| 锡林浩特市| 沭阳县| 理塘县| 昂仁县| 高唐县| 诸城市| 大兴区| 甘泉县| 榕江县| 迭部县| 乌鲁木齐县| 扬中市| 清苑县| 龙陵县| 蕲春县| 安陆市| 牡丹江市| 东台市| 城固县| 克什克腾旗| 磴口县| 陕西省| 汪清县| 桐乡市| 油尖旺区| 永修县| 镇原县| 文成县| 栖霞市| 钟山县| 大理市| 徐水县| 唐山市| 开化县| 章丘市| 义马市| 封丘县| 项城市|