標題: Titlebook: Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021 Springer Na [打印本頁] 作者: Hemochromatosis 時間: 2025-3-21 16:19
書目名稱Artificial Intelligence and Security影響因子(影響力)
書目名稱Artificial Intelligence and Security影響因子(影響力)學科排名
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學科排名
書目名稱Artificial Intelligence and Security被引頻次
書目名稱Artificial Intelligence and Security被引頻次學科排名
書目名稱Artificial Intelligence and Security年度引用
書目名稱Artificial Intelligence and Security年度引用學科排名
書目名稱Artificial Intelligence and Security讀者反饋
書目名稱Artificial Intelligence and Security讀者反饋學科排名
作者: 平庸的人或物 時間: 2025-3-21 22:47 作者: biosphere 時間: 2025-3-22 02:45 作者: Inertia 時間: 2025-3-22 04:51
https://doi.org/10.1007/978-981-10-6811-9d with one-hot representation for word. We propose to use masked language model (MLM) as supervised task. In addition, through the text classification experiment, it is showed that accuracy of the word embeddings represented by WEGAT is higher than the current method for the same classification method.作者: 遺留之物 時間: 2025-3-22 12:04 作者: spinal-stenosis 時間: 2025-3-22 15:18 作者: irreducible 時間: 2025-3-22 19:35 作者: 相符 時間: 2025-3-22 23:42 作者: 反饋 時間: 2025-3-23 01:42
0302-9743 and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS..The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully revi作者: GRAVE 時間: 2025-3-23 06:07 作者: 真實的人 時間: 2025-3-23 13:42 作者: Intruder 時間: 2025-3-23 14:59
Fabrication and Characterization Methods,t although the under-sampling method slightly improves model performance, the different sampling methods do not have a substantial impact on the evaluation of immediate software defect prediction models.作者: chassis 時間: 2025-3-23 19:05
https://doi.org/10.1007/978-3-642-33001-8 the superiority of the proposed scheme over other the traditional task computing scheme. That this scheme can effectively reduce the system energy cost and improve the solving efficiency as compared to the traditional task computing scheme, in terms of the solving efficiency.作者: 妨礙議事 時間: 2025-3-23 23:08
https://doi.org/10.1007/978-981-10-6811-9re to improve service quality and reflect the value of data temperature. Experiments are performed to evaluate the proposed strategy, which can effectively reduce the total cost and improve data availability.作者: 可卡 時間: 2025-3-24 06:19
https://doi.org/10.1007/978-981-10-6811-9roduces the idea of machine learning into the filtering rules of the decision tree, and uses the optimized decision tree C4.5 algorithm to predict the optimal ranking of the firewall filtering rule table attributes, which improves the efficiency of the firewall and thus the throughputs of the firewall.作者: Euthyroid 時間: 2025-3-24 07:20
An Empirical Study on Data Sampling for Just-in-Time Defect Predictiont although the under-sampling method slightly improves model performance, the different sampling methods do not have a substantial impact on the evaluation of immediate software defect prediction models.作者: 體貼 時間: 2025-3-24 12:06 作者: hardheaded 時間: 2025-3-24 17:00 作者: 任命 時間: 2025-3-24 19:33
Firewall Filtering Technology and Application Based on Decision Treeroduces the idea of machine learning into the filtering rules of the decision tree, and uses the optimized decision tree C4.5 algorithm to predict the optimal ranking of the firewall filtering rule table attributes, which improves the efficiency of the firewall and thus the throughputs of the firewall.作者: 傲慢人 時間: 2025-3-24 23:21 作者: 輕而薄 時間: 2025-3-25 04:54
Research and Implementation of Dimension Reduction Algorithm in Big Data Analysiss a burden on our calculation and information acquisition. Especially in the fields of data analysis and prediction, it is about that for us to obtain the target data efficiently. Big data analysis is a technique for quickly and efficiently extracting information from multiple types of data. The dim作者: Obituary 時間: 2025-3-25 11:25 作者: Acetaldehyde 時間: 2025-3-25 14:23
Research and Implementation of Anomaly Detection Algorithm in Data Miningrom the normal behavior pattern. In this paper, the KNN (k-Nearest Neighbor) algorithm, the Local Outlier Factor algorithm, and the Isolation Forest algorithm will be used to process the MIT-BIH arrhythmia data set. The KNN algorithm is an Anomaly detection algorithm based on distance but may divide作者: 收藏品 時間: 2025-3-25 18:19 作者: indignant 時間: 2025-3-25 23:29 作者: Postmenopause 時間: 2025-3-26 04:08
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Rankinguld be encrypted before outsourcing to the cloud storage. However, the retrieval of the encrypted data is currently a crucial issue of medical big data security. The existing searchable encryption methods can hardly satisfy the goals of fuzzy multi-keywords search, relevance ranking, access pattern 作者: Glossy 時間: 2025-3-26 08:22
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Clwidespread attention. To enhance the isolation of containers, cloud service providers usually run containers in different virtual machines. In this environment, in-container security tools can be detected or attacked by in-container attackers, and in-VM security tools face the risk of container esca作者: 紡織品 時間: 2025-3-26 11:12
A Computing Task Offloading Scheme for Mobile Edge Computinge quality by formulating reasonable task offloading strategies. As the number of edge users increases, the energy consumption and energy cost of the MEC are also increasing. Therefore, we investigated the task offloading problem in MEC, and proposed a computational task offloading scheme based on im作者: 懶洋洋 時間: 2025-3-26 13:33
Security Transmission Scheme of Sensitive Data for Mobile Terminall the entire process of the generation, transmission and use of user-sensitive data within the Android system. In order to achieve resource sharing and data transmission between different applications and processes, the Android system provides a mechanism for inter-process communication based on Bin作者: BRIDE 時間: 2025-3-26 19:48 作者: 尾隨 時間: 2025-3-26 21:00 作者: 頭盔 時間: 2025-3-27 03:10
Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Netudents, they cannot provide students with in-depth personalized services. To solve this problem, in this paper, we propose a method to personalize the recommendation of English learning based on knowledge graph and graph convolutional network. Firstly, we construct a knowledge graph containing a lar作者: NUDGE 時間: 2025-3-27 06:44 作者: Myofibrils 時間: 2025-3-27 10:34 作者: otic-capsule 時間: 2025-3-27 15:13
Graph Attention Network for Word Embeddings words can be reflected in vector space by word embeddings. However, the current word embeddings approaches commonly do not explore the context-specific information of word deeply in the overall corpus. In this paper, we propose to use graph attention network for word embeddings. We build a large si作者: countenance 時間: 2025-3-27 19:52
Firewall Filtering Technology and Application Based on Decision Treepensable part of people‘s lives. In the same time, network attacks have been increasing exponentially. Countries around the world have raised network security issues to the height of their national strategies, which shows the importance of network security. Firewall is an important technology for ne作者: insolence 時間: 2025-3-28 01:26 作者: 搬運工 時間: 2025-3-28 06:02 作者: 女上癮 時間: 2025-3-28 10:09 作者: immunity 時間: 2025-3-28 11:21 作者: 輕率看法 時間: 2025-3-28 16:39 作者: 羊欄 時間: 2025-3-28 19:54 作者: Harpoon 時間: 2025-3-29 02:10
Fabrication and Characterization Methods,outside by using virtual machine introspection technology. Secondly, security analysis is performed on processes belonging to different containers in the virtual machine, and our system can perform real-time abnormal response based on the analysis results. Finally, our system can monitor container e作者: 固執(zhí)點好 時間: 2025-3-29 05:54 作者: 拋物線 時間: 2025-3-29 09:31
https://doi.org/10.1007/978-981-10-6811-9s for data type identification and mapping, there should be several security experts to wait to write static templates, in case the data is changed. In response to the above problems, an ontology model of data knowledge for Intranet Security Monitoring is constructed, and using the computing power o作者: 侵害 時間: 2025-3-29 13:50
https://doi.org/10.1007/978-981-10-6811-9hysical machines and virtual machines. This paper shows that the probability distribution of execution time of a piece of CPU-bound code in virtual machines has higher variance along with lower kurtosis and skewness, which make up our index system for detection. Results of Numeric simulation and rea作者: debble 時間: 2025-3-29 16:54 作者: arousal 時間: 2025-3-29 23:34
Exploring the Informationization of Land Reserve Archives Management own archives management and actively explore corresponding strategies to meet the various challenges brought about by the information age in the light of the problems existing in the present reserve archives management work, only then can the information technology become the powerful power which p作者: nuclear-tests 時間: 2025-3-30 01:35 作者: Chameleon 時間: 2025-3-30 06:19
Design and Implementation of Data Adapter in SWIMapter structure is proposed, and the process design methods of the two main functional modules, data transformation and service encapsulation, are proposed respectively, including data standard and service standard. Extensible Markup Language (XML) technology is a platform independent language, 90% 作者: 諷刺滑稽戲劇 時間: 2025-3-30 08:21 作者: BULLY 時間: 2025-3-30 12:27
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloutside by using virtual machine introspection technology. Secondly, security analysis is performed on processes belonging to different containers in the virtual machine, and our system can perform real-time abnormal response based on the analysis results. Finally, our system can monitor container e作者: 虛情假意 時間: 2025-3-30 17:59
Security Transmission Scheme of Sensitive Data for Mobile Terminalcryption protection scheme for sensitive data in the Android system from generation to use throughout the life cycle, effectively preventing sensitive data from being. The threat of theft and tampering by malicious third parties guarantees the privacy and integrity of user sensitive data during the 作者: 山頂可休息 時間: 2025-3-31 00:01 作者: phlegm 時間: 2025-3-31 03:54 作者: 睨視 時間: 2025-3-31 06:41
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/162285.jpg作者: 疏忽 時間: 2025-3-31 11:35
https://doi.org/10.1007/978-981-15-1963-5paper proposes an optimized partition method to solve the data skew problem. Firstly, the parallel cluster sampling algorithm is used to sample the intermediate data processed by each Map task to predict the data distribution. Then, the frequency of each Key is obtained according to the sampling pre作者: CRUDE 時間: 2025-3-31 13:57 作者: conference 時間: 2025-3-31 19:39
Fabrication and Characterization Methods,The archives, as the historical records of the circulation of the Land tenure, have become an important part of the land reserve work and play an irreplaceable role in verifying it. It is a basic work in the whole land reserve undertaking, and also an important part of the National Archives System.