派博傳思國際中心

標題: Titlebook: Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021 Springer Na [打印本頁]

作者: Hemochromatosis    時間: 2025-3-21 16:19
書目名稱Artificial Intelligence and Security影響因子(影響力)




書目名稱Artificial Intelligence and Security影響因子(影響力)學科排名




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學科排名




書目名稱Artificial Intelligence and Security被引頻次




書目名稱Artificial Intelligence and Security被引頻次學科排名




書目名稱Artificial Intelligence and Security年度引用




書目名稱Artificial Intelligence and Security年度引用學科排名




書目名稱Artificial Intelligence and Security讀者反饋




書目名稱Artificial Intelligence and Security讀者反饋學科排名





作者: 平庸的人或物    時間: 2025-3-21 22:47

作者: biosphere    時間: 2025-3-22 02:45

作者: Inertia    時間: 2025-3-22 04:51
https://doi.org/10.1007/978-981-10-6811-9d with one-hot representation for word. We propose to use masked language model (MLM) as supervised task. In addition, through the text classification experiment, it is showed that accuracy of the word embeddings represented by WEGAT is higher than the current method for the same classification method.
作者: 遺留之物    時間: 2025-3-22 12:04

作者: spinal-stenosis    時間: 2025-3-22 15:18

作者: irreducible    時間: 2025-3-22 19:35

作者: 相符    時間: 2025-3-22 23:42

作者: 反饋    時間: 2025-3-23 01:42
0302-9743 and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS..The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully revi
作者: GRAVE    時間: 2025-3-23 06:07

作者: 真實的人    時間: 2025-3-23 13:42

作者: Intruder    時間: 2025-3-23 14:59
Fabrication and Characterization Methods,t although the under-sampling method slightly improves model performance, the different sampling methods do not have a substantial impact on the evaluation of immediate software defect prediction models.
作者: chassis    時間: 2025-3-23 19:05
https://doi.org/10.1007/978-3-642-33001-8 the superiority of the proposed scheme over other the traditional task computing scheme. That this scheme can effectively reduce the system energy cost and improve the solving efficiency as compared to the traditional task computing scheme, in terms of the solving efficiency.
作者: 妨礙議事    時間: 2025-3-23 23:08
https://doi.org/10.1007/978-981-10-6811-9re to improve service quality and reflect the value of data temperature. Experiments are performed to evaluate the proposed strategy, which can effectively reduce the total cost and improve data availability.
作者: 可卡    時間: 2025-3-24 06:19
https://doi.org/10.1007/978-981-10-6811-9roduces the idea of machine learning into the filtering rules of the decision tree, and uses the optimized decision tree C4.5 algorithm to predict the optimal ranking of the firewall filtering rule table attributes, which improves the efficiency of the firewall and thus the throughputs of the firewall.
作者: Euthyroid    時間: 2025-3-24 07:20
An Empirical Study on Data Sampling for Just-in-Time Defect Predictiont although the under-sampling method slightly improves model performance, the different sampling methods do not have a substantial impact on the evaluation of immediate software defect prediction models.
作者: 體貼    時間: 2025-3-24 12:06

作者: hardheaded    時間: 2025-3-24 17:00

作者: 任命    時間: 2025-3-24 19:33
Firewall Filtering Technology and Application Based on Decision Treeroduces the idea of machine learning into the filtering rules of the decision tree, and uses the optimized decision tree C4.5 algorithm to predict the optimal ranking of the firewall filtering rule table attributes, which improves the efficiency of the firewall and thus the throughputs of the firewall.
作者: 傲慢人    時間: 2025-3-24 23:21

作者: 輕而薄    時間: 2025-3-25 04:54
Research and Implementation of Dimension Reduction Algorithm in Big Data Analysiss a burden on our calculation and information acquisition. Especially in the fields of data analysis and prediction, it is about that for us to obtain the target data efficiently. Big data analysis is a technique for quickly and efficiently extracting information from multiple types of data. The dim
作者: Obituary    時間: 2025-3-25 11:25

作者: Acetaldehyde    時間: 2025-3-25 14:23
Research and Implementation of Anomaly Detection Algorithm in Data Miningrom the normal behavior pattern. In this paper, the KNN (k-Nearest Neighbor) algorithm, the Local Outlier Factor algorithm, and the Isolation Forest algorithm will be used to process the MIT-BIH arrhythmia data set. The KNN algorithm is an Anomaly detection algorithm based on distance but may divide
作者: 收藏品    時間: 2025-3-25 18:19

作者: indignant    時間: 2025-3-25 23:29

作者: Postmenopause    時間: 2025-3-26 04:08
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Rankinguld be encrypted before outsourcing to the cloud storage. However, the retrieval of the encrypted data is currently a crucial issue of medical big data security. The existing searchable encryption methods can hardly satisfy the goals of fuzzy multi-keywords search, relevance ranking, access pattern
作者: Glossy    時間: 2025-3-26 08:22
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Clwidespread attention. To enhance the isolation of containers, cloud service providers usually run containers in different virtual machines. In this environment, in-container security tools can be detected or attacked by in-container attackers, and in-VM security tools face the risk of container esca
作者: 紡織品    時間: 2025-3-26 11:12
A Computing Task Offloading Scheme for Mobile Edge Computinge quality by formulating reasonable task offloading strategies. As the number of edge users increases, the energy consumption and energy cost of the MEC are also increasing. Therefore, we investigated the task offloading problem in MEC, and proposed a computational task offloading scheme based on im
作者: 懶洋洋    時間: 2025-3-26 13:33
Security Transmission Scheme of Sensitive Data for Mobile Terminall the entire process of the generation, transmission and use of user-sensitive data within the Android system. In order to achieve resource sharing and data transmission between different applications and processes, the Android system provides a mechanism for inter-process communication based on Bin
作者: BRIDE    時間: 2025-3-26 19:48

作者: 尾隨    時間: 2025-3-26 21:00

作者: 頭盔    時間: 2025-3-27 03:10
Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Netudents, they cannot provide students with in-depth personalized services. To solve this problem, in this paper, we propose a method to personalize the recommendation of English learning based on knowledge graph and graph convolutional network. Firstly, we construct a knowledge graph containing a lar
作者: NUDGE    時間: 2025-3-27 06:44

作者: Myofibrils    時間: 2025-3-27 10:34

作者: otic-capsule    時間: 2025-3-27 15:13
Graph Attention Network for Word Embeddings words can be reflected in vector space by word embeddings. However, the current word embeddings approaches commonly do not explore the context-specific information of word deeply in the overall corpus. In this paper, we propose to use graph attention network for word embeddings. We build a large si
作者: countenance    時間: 2025-3-27 19:52
Firewall Filtering Technology and Application Based on Decision Treepensable part of people‘s lives. In the same time, network attacks have been increasing exponentially. Countries around the world have raised network security issues to the height of their national strategies, which shows the importance of network security. Firewall is an important technology for ne
作者: insolence    時間: 2025-3-28 01:26

作者: 搬運工    時間: 2025-3-28 06:02

作者: 女上癮    時間: 2025-3-28 10:09

作者: immunity    時間: 2025-3-28 11:21

作者: 輕率看法    時間: 2025-3-28 16:39

作者: 羊欄    時間: 2025-3-28 19:54

作者: Harpoon    時間: 2025-3-29 02:10
Fabrication and Characterization Methods,outside by using virtual machine introspection technology. Secondly, security analysis is performed on processes belonging to different containers in the virtual machine, and our system can perform real-time abnormal response based on the analysis results. Finally, our system can monitor container e
作者: 固執(zhí)點好    時間: 2025-3-29 05:54

作者: 拋物線    時間: 2025-3-29 09:31
https://doi.org/10.1007/978-981-10-6811-9s for data type identification and mapping, there should be several security experts to wait to write static templates, in case the data is changed. In response to the above problems, an ontology model of data knowledge for Intranet Security Monitoring is constructed, and using the computing power o
作者: 侵害    時間: 2025-3-29 13:50
https://doi.org/10.1007/978-981-10-6811-9hysical machines and virtual machines. This paper shows that the probability distribution of execution time of a piece of CPU-bound code in virtual machines has higher variance along with lower kurtosis and skewness, which make up our index system for detection. Results of Numeric simulation and rea
作者: debble    時間: 2025-3-29 16:54

作者: arousal    時間: 2025-3-29 23:34
Exploring the Informationization of Land Reserve Archives Management own archives management and actively explore corresponding strategies to meet the various challenges brought about by the information age in the light of the problems existing in the present reserve archives management work, only then can the information technology become the powerful power which p
作者: nuclear-tests    時間: 2025-3-30 01:35

作者: Chameleon    時間: 2025-3-30 06:19
Design and Implementation of Data Adapter in SWIMapter structure is proposed, and the process design methods of the two main functional modules, data transformation and service encapsulation, are proposed respectively, including data standard and service standard. Extensible Markup Language (XML) technology is a platform independent language, 90%
作者: 諷刺滑稽戲劇    時間: 2025-3-30 08:21

作者: BULLY    時間: 2025-3-30 12:27
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloutside by using virtual machine introspection technology. Secondly, security analysis is performed on processes belonging to different containers in the virtual machine, and our system can perform real-time abnormal response based on the analysis results. Finally, our system can monitor container e
作者: 虛情假意    時間: 2025-3-30 17:59
Security Transmission Scheme of Sensitive Data for Mobile Terminalcryption protection scheme for sensitive data in the Android system from generation to use throughout the life cycle, effectively preventing sensitive data from being. The threat of theft and tampering by malicious third parties guarantees the privacy and integrity of user sensitive data during the
作者: 山頂可休息    時間: 2025-3-31 00:01

作者: phlegm    時間: 2025-3-31 03:54

作者: 睨視    時間: 2025-3-31 06:41
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/162285.jpg
作者: 疏忽    時間: 2025-3-31 11:35
https://doi.org/10.1007/978-981-15-1963-5paper proposes an optimized partition method to solve the data skew problem. Firstly, the parallel cluster sampling algorithm is used to sample the intermediate data processed by each Map task to predict the data distribution. Then, the frequency of each Key is obtained according to the sampling pre
作者: CRUDE    時間: 2025-3-31 13:57

作者: conference    時間: 2025-3-31 19:39
Fabrication and Characterization Methods,The archives, as the historical records of the circulation of the Land tenure, have become an important part of the land reserve work and play an irreplaceable role in verifying it. It is a basic work in the whole land reserve undertaking, and also an important part of the National Archives System.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
安徽省| 四川省| 额敏县| 元谋县| 铜山县| 库车县| 丽水市| 齐河县| 定边县| 延安市| 兰溪市| 三门县| 乐都县| 青海省| 兴业县| 洪湖市| 绍兴县| 江津市| 钦州市| 油尖旺区| 陵川县| 南昌县| 察哈| 天台县| 咸丰县| 葫芦岛市| 德惠市| 泉州市| 班戈县| 龙海市| 盖州市| 广水市| 沈丘县| 邛崃市| 澄城县| 永靖县| 宁武县| 池州市| 汝阳县| 阳信县| 岱山县|