派博傳思國(guó)際中心

標(biāo)題: Titlebook: Artificial Intelligence and Security; 8th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2022 The Editor( [打印本頁(yè)]

作者: Cataplexy    時(shí)間: 2025-3-21 17:28
書(shū)目名稱(chēng)Artificial Intelligence and Security影響因子(影響力)




書(shū)目名稱(chēng)Artificial Intelligence and Security影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Artificial Intelligence and Security被引頻次




書(shū)目名稱(chēng)Artificial Intelligence and Security被引頻次學(xué)科排名




書(shū)目名稱(chēng)Artificial Intelligence and Security年度引用




書(shū)目名稱(chēng)Artificial Intelligence and Security年度引用學(xué)科排名




書(shū)目名稱(chēng)Artificial Intelligence and Security讀者反饋




書(shū)目名稱(chēng)Artificial Intelligence and Security讀者反饋學(xué)科排名





作者: Inflated    時(shí)間: 2025-3-22 00:08
Montage miniaturisierter Bauteileis first necessary to extract the defined software method body from the source code. We build an abstract syntax tree for the method to form a statement set; then, the variable names, function names, and strings in the method are replaced. Each statement in the code is given a number to construct a
作者: Ballad    時(shí)間: 2025-3-22 00:36

作者: armistice    時(shí)間: 2025-3-22 04:49
H. J. Warnecke,K. Lange,G. Pritschowcation, and the results of the initial discrimination are input into DNN for secondary classification to obtain the final results. The experimental results on NSL-KDD dataset show that the intrusion model proposed in this paper shows good real-time performance and high detection rate.
作者: 大門(mén)在匯總    時(shí)間: 2025-3-22 11:10

作者: Malfunction    時(shí)間: 2025-3-22 16:21

作者: 宴會(huì)    時(shí)間: 2025-3-22 21:01
https://doi.org/10.1007/978-3-642-50233-0creen out irrational offer users and increase the execution efficiency of the sensing task. A Softmax regression algorithm is used to implement miners’ verification of the quality grade of sensing data, and the value of data is calculated by the quality grade of user offers and data to encourage use
作者: ingestion    時(shí)間: 2025-3-22 23:38

作者: 遭遇    時(shí)間: 2025-3-23 03:01
FTK ’88, Fertigungstechnisches KolloquiumPAWSN). This algorithm optimizes the clustering process, selects multiple cluster head nodes for clusters with high communication pressure, and at the same time, designs a new path probability selection model for ant movement, which fully considers the remaining energy of cluster head nodes close to
作者: milligram    時(shí)間: 2025-3-23 07:05

作者: 狂熱文化    時(shí)間: 2025-3-23 13:15

作者: BLUSH    時(shí)間: 2025-3-23 14:39
A Method of Data Distribution and Traceability Based on Blockchain It ensures the safe transmission of power data and the traceability of data, and realizes the effective supervision of data sender and data receiver, so as to ensure the integrity of data distribution.
作者: nocturia    時(shí)間: 2025-3-23 19:44
A Vulnerability Detection Algorithm Based on Transformer Modelis first necessary to extract the defined software method body from the source code. We build an abstract syntax tree for the method to form a statement set; then, the variable names, function names, and strings in the method are replaced. Each statement in the code is given a number to construct a
作者: Confound    時(shí)間: 2025-3-24 00:43
Research on Video Falsity Detection Based on Publisher and Publishing Environment Featuresrecision and F1 score, and the experimental results have better recall rate. The research in this paper provides an effective technical means for video-based false information governance in cyberspace.
作者: OVERT    時(shí)間: 2025-3-24 04:36
Intrusion Detection Model Based on KNN-AE-DNNcation, and the results of the initial discrimination are input into DNN for secondary classification to obtain the final results. The experimental results on NSL-KDD dataset show that the intrusion model proposed in this paper shows good real-time performance and high detection rate.
作者: transdermal    時(shí)間: 2025-3-24 09:23

作者: 民間傳說(shuō)    時(shí)間: 2025-3-24 11:15

作者: cipher    時(shí)間: 2025-3-24 16:11
Blockchain-Based Efficient Incentive Mechanism in Crowdsensingcreen out irrational offer users and increase the execution efficiency of the sensing task. A Softmax regression algorithm is used to implement miners’ verification of the quality grade of sensing data, and the value of data is calculated by the quality grade of user offers and data to encourage use
作者: Endearing    時(shí)間: 2025-3-24 19:56
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenariosccess permissions more finely without losing the comprehensibility of the system, we propose BFAC-CS, a blockchain-based access control scheme combining RBAC and ABAC, using smart contracts as a means to implement its entire framework. We designed three contracts to manage user’s role, attributes an
作者: isotope    時(shí)間: 2025-3-25 00:11

作者: heckle    時(shí)間: 2025-3-25 03:37

作者: dithiolethione    時(shí)間: 2025-3-25 11:29
A Survey on Ethereum Illicit Detectionereum transaction data, using general detection methods; the other is for specific types of illicit transactions detection (Including Ponzi schemes and honeypot contracts). For each transaction type, summarized relevant research ideas, model establishment and evaluation effects. Finally, the paper a
作者: enlist    時(shí)間: 2025-3-25 13:31
Research on Offense and Defense of DDos Based on Evolutionary Game Theoryy related to national security. DDos attacks exploit protocol vulnerabilities and use malicious traffic from multiple sources to attack networks and network services, have caused huge economic losses to users and service providers. Based on the evolutionary game theory, this paper models both the of
作者: exorbitant    時(shí)間: 2025-3-25 16:05

作者: 樂(lè)章    時(shí)間: 2025-3-25 22:46
Data Provenance in Large-Scale Distribution collaborative data analysis. To ensure the safety and legal use of data, the company needs to record and track the use of data to establish a reasonable accountability and protection mechanism. In fact, the rapid growth of data scale and the complexity of the environment pose serious challenges to
作者: 弓箭    時(shí)間: 2025-3-26 00:53
A Vulnerability Detection Algorithm Based on Transformer Modeluter or mobile phone and on the hardware. In order to meet people’s various daily needs, developers need to continuously develop new software and firmware. The software development process requires the reuse of shared codes and the realization of the middle-station module codes. These reusable codes
作者: 相容    時(shí)間: 2025-3-26 06:31

作者: infinite    時(shí)間: 2025-3-26 09:07

作者: Preamble    時(shí)間: 2025-3-26 13:19

作者: 場(chǎng)所    時(shí)間: 2025-3-26 19:05

作者: jumble    時(shí)間: 2025-3-26 22:49
A Rational Hierarchical Quantum State Sharing Protocolith . high-power players and . low-power players through (.?+?.?+?1)-particle cluster states. The high-power players and low-players have different authorities to reconstruct the quantum state. In detail, when a high-power player reconstructs the quantum state, he needs the help of the other high-po
作者: Ganglion-Cyst    時(shí)間: 2025-3-27 03:25
Blockchain-Based Efficient Incentive Mechanism in Crowdsensingspots. The incentive mechanism is an important issue in the research of Crowdsensing. The existing incentive mechanism usually relies on the bank-like trustworthy center, but the trustworthy center has the problem of system trust deficiency because of its opaque control and vulnerable to attack. Blo
作者: 有特色    時(shí)間: 2025-3-27 05:42

作者: THE    時(shí)間: 2025-3-27 12:06

作者: 聯(lián)想記憶    時(shí)間: 2025-3-27 14:01
Multi-objective Dual-Route Planning Algorithm for Grid Communication Networkneration of comprehensive defense system of power grid security. In this paper, we aim to design a multi-objective dual-route planning algorithm for grid communication network. Firstly, we consider the network structure, site level and service load in the node and link risk model. On this basis, we
作者: nocturnal    時(shí)間: 2025-3-27 19:30

作者: Infirm    時(shí)間: 2025-3-28 01:40
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony St medical and other fields. Because of the characteristics of wireless sensor networks, traditional network routing protocols are not applicable in wireless sensor networks. In recent research, many wireless sensor network routing algorithms have been proposed. Among these algorithms, the cluster rou
作者: ALLAY    時(shí)間: 2025-3-28 05:55

作者: muffler    時(shí)間: 2025-3-28 06:30

作者: 肉體    時(shí)間: 2025-3-28 13:28

作者: 諂媚于人    時(shí)間: 2025-3-28 14:58

作者: Interdict    時(shí)間: 2025-3-28 19:55
978-3-031-06790-7The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
作者: 系列    時(shí)間: 2025-3-29 00:17

作者: Measured    時(shí)間: 2025-3-29 06:16
Introduction to FTIR Microspectroscopy,hnology in power system, including data distribution based on encryption technology in different storage modes and traceability mechanism suitable for different leak scenarios, so as to improve the traditional data distribution centralized degree, unclear rights allocation, low distribution efficien
作者: Kinetic    時(shí)間: 2025-3-29 08:40
Introduction to FTIR Microspectroscopy, collaborative data analysis. To ensure the safety and legal use of data, the company needs to record and track the use of data to establish a reasonable accountability and protection mechanism. In fact, the rapid growth of data scale and the complexity of the environment pose serious challenges to
作者: 失望未來(lái)    時(shí)間: 2025-3-29 12:02
Montage miniaturisierter Bauteileuter or mobile phone and on the hardware. In order to meet people’s various daily needs, developers need to continuously develop new software and firmware. The software development process requires the reuse of shared codes and the realization of the middle-station module codes. These reusable codes
作者: 罐里有戒指    時(shí)間: 2025-3-29 19:15
Taylor und die Fertigungstechnik von morgenf short videos in recent years, watching short videos has become one of people‘s daily habits, and therefore the harm of false videos is becoming more and more significant. In this paper, we study the falsity identification of videos through the characteristics of both video publishers and video pub
作者: esthetician    時(shí)間: 2025-3-29 20:00
H. J. Warnecke,K. Lange,G. Pritschowitive rate, low detection rate, slow processing response and high data feature dimension of traditional intrusion detection algorithms. In order to solve these problems, an intrusion detection model KNN-AE-DNN based on K-NearestNeighbor (KNN), Dense Neural Network and auto encoder network (AE) is pr
作者: 疏忽    時(shí)間: 2025-3-30 01:56

作者: indubitable    時(shí)間: 2025-3-30 08:08

作者: Estrogen    時(shí)間: 2025-3-30 10:36

作者: LURE    時(shí)間: 2025-3-30 12:50
https://doi.org/10.1007/978-3-642-50233-0spots. The incentive mechanism is an important issue in the research of Crowdsensing. The existing incentive mechanism usually relies on the bank-like trustworthy center, but the trustworthy center has the problem of system trust deficiency because of its opaque control and vulnerable to attack. Blo
作者: 障礙物    時(shí)間: 2025-3-30 18:23

作者: 美色花錢(qián)    時(shí)間: 2025-3-30 22:48
Auftragssteuerung in einem CIM-Konzeptwork security problem has become increasingly apparent, too. By analyzing the characteristics of honeypot and raspberry pi, this paper will introduce how to build a honeypot on raspberry pi and the difference between it and building on PC, demonstrate cyber attacks on honeypots, put forward some ide
作者: DEAF    時(shí)間: 2025-3-31 03:06
FTK ’88, Fertigungstechnisches Kolloquiumneration of comprehensive defense system of power grid security. In this paper, we aim to design a multi-objective dual-route planning algorithm for grid communication network. Firstly, we consider the network structure, site level and service load in the node and link risk model. On this basis, we
作者: 魔鬼在游行    時(shí)間: 2025-3-31 06:53

作者: BANAL    時(shí)間: 2025-3-31 09:25

作者: Left-Atrium    時(shí)間: 2025-3-31 14:10
https://doi.org/10.1007/978-3-642-48058-4m. The purpose of studying intrusion detection algorithm is to improve the detection rate of abnormal attacks and reduce the false positive rate. Deep learning is the first mock exam to deal with network data traffic. It does not make full use of the unique characteristics of network data when solvi
作者: 該得    時(shí)間: 2025-3-31 20:54

作者: strdulate    時(shí)間: 2025-4-1 00:30
https://doi.org/10.1007/978-3-642-48058-4ockchain, Ethereum has been seen as the mainstream smart contract development and operation platform, which attracted the attention of criminals. Many Ethereum financial crimes have occurred from time to time, making the Ethereum trading environment facing serious security problems. The safety super
作者: Horizon    時(shí)間: 2025-4-1 05:49
Conference proceedings 2022e and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022.. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
作者: 偽書(shū)    時(shí)間: 2025-4-1 06:46
Artificial Intelligence and Security978-3-031-06791-4Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 顧客    時(shí)間: 2025-4-1 13:59





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
本溪市| 延吉市| 县级市| 上高县| 鲁甸县| 新巴尔虎右旗| 南靖县| 正阳县| 江门市| 隆回县| 新干县| 凭祥市| 义乌市| 固阳县| 汉沽区| 奉节县| 五寨县| 平安县| 临沧市| 教育| 周口市| 荃湾区| 东港市| 诏安县| 靖西县| 台中县| 图们市| 南丰县| 成武县| 织金县| 洛浦县| 怀安县| 南澳县| 呈贡县| 岑巩县| 江都市| 双流县| 垦利县| 石屏县| 丰城市| 兰坪|