派博傳思國際中心

標(biāo)題: Titlebook: Cyberspace Safety and Security; 12th International S Jieren Cheng,Xiangyan Tang,Xiaozhang Liu Conference proceedings 2021 Springer Nature S [打印本頁]

作者: Myelopathy    時(shí)間: 2025-3-21 19:13
書目名稱Cyberspace Safety and Security影響因子(影響力)




書目名稱Cyberspace Safety and Security影響因子(影響力)學(xué)科排名




書目名稱Cyberspace Safety and Security網(wǎng)絡(luò)公開度




書目名稱Cyberspace Safety and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cyberspace Safety and Security被引頻次




書目名稱Cyberspace Safety and Security被引頻次學(xué)科排名




書目名稱Cyberspace Safety and Security年度引用




書目名稱Cyberspace Safety and Security年度引用學(xué)科排名




書目名稱Cyberspace Safety and Security讀者反饋




書目名稱Cyberspace Safety and Security讀者反饋學(xué)科排名





作者: COST    時(shí)間: 2025-3-21 23:38

作者: 友好    時(shí)間: 2025-3-22 02:54
Indizieren und Gliedern von Dokumenten,ability, and the artificial designed adversarial examples can make the DNN model output the wrong results. These adversarial examples not only exist in the digital world, but also in the physical world. At present, researches on autonomous driving platform mainly focus on attacking a single sensor.
作者: 同音    時(shí)間: 2025-3-22 06:47
https://doi.org/10.1007/978-1-4302-7214-4vulnerability of malware detector and improve the defense ability of cyberspace. Considering the huge market share of android system, adversarial malware examples of android are studied in this paper. And an algorithm is proposed to find universal adversarial perturbations of malware. Such perturbat
作者: ANIM    時(shí)間: 2025-3-22 08:50
https://doi.org/10.1007/978-1-4302-7214-4includes a random projection method for reducing feature dimensionality which would be more efficient than usual feature selection methods in existing work for the task. We also introduced a new method of SGD-based SVM with adapted sampling, which was based on the insight from the confidence and nea
作者: 是貪求    時(shí)間: 2025-3-22 14:18
https://doi.org/10.1007/978-1-4302-7214-4h field of adversarial machine learning. Support vector machines (SVMs), as a kind of successful approach, were widely used to solve security problems, such as image classification, malware detection, spam filtering, and intrusion detection. However, many adversarial attack methods have emerged rece
作者: 是貪求    時(shí)間: 2025-3-22 19:58

作者: Terrace    時(shí)間: 2025-3-23 00:50

作者: circuit    時(shí)間: 2025-3-23 04:01

作者: engrave    時(shí)間: 2025-3-23 07:12
https://doi.org/10.1007/978-1-4842-2439-7ts. Different attack and defense strategies have been proposed to better study the security of deep neural networks. But these works only focus on an aspect such as attack or defense. In this work, we propose a robust GAN based on the attention mechanism, which uses the deep latent features of the o
作者: 刪除    時(shí)間: 2025-3-23 11:53
Understanding Digital Publishingtheir private data. In the classic federated learning protocol, the model parameters are the interaction information between the client and the server. The client can update the local model according to the global model parameters, and the server can aggregate the updated model parameters of each cl
作者: follicle    時(shí)間: 2025-3-23 17:16
Adding Navigation to the Package,ng algorithms are failed to solve the protection problems against geometric attacks. To solve this problem, a robust digital watermarking algorithm for medical images based on PHTs-DCT is proposed in this paper. For embedding watermark, DCT is applied to reduce the redundant data of the image, then
作者: 拖網(wǎng)    時(shí)間: 2025-3-23 19:29
https://doi.org/10.1007/978-981-16-9881-1 concerns about the privacy of patient information. Aiming at the hidden dangers of copying, cutting, tampering, etc. in the dissemination of medical images, combined with the characteristics of medical images, this paper proposed a novel zero-watermarking algorithm based on Tetrolet-DCT, focusing o
作者: 漫不經(jīng)心    時(shí)間: 2025-3-23 23:05

作者: monopoly    時(shí)間: 2025-3-24 02:56

作者: 低位的人或事    時(shí)間: 2025-3-24 10:05

作者: 翻動(dòng)    時(shí)間: 2025-3-24 12:45

作者: 極微小    時(shí)間: 2025-3-24 17:46

作者: ORE    時(shí)間: 2025-3-24 20:10
https://doi.org/10.1007/978-3-030-25816-0and privacy of the shared data. However, it is still challenging to achieve a data sharing scheme, which meets the security, privacy, security, and credibility requirements. This paper proposes SDSBT, a multi-party data sharing platform based on blockchain and the trusted execution environment (TEE)
作者: endoscopy    時(shí)間: 2025-3-24 23:58
Floriana Battaglia,Lucio Bontempelliread of the epidemic before the vaccine was developed, but this also led to economic recession. At present, there is an urgent need for solutions to ensure the normal schedule of life while reducing the spread of the epidemic. Several contact tracking solutions have been proposed in the market, but
作者: Atheroma    時(shí)間: 2025-3-25 04:42
Adolescence Between Past and Futured as a technical support for intelligent driving technology. In this paper we mainly focus on the research and application of lidar real-time positioning and map building technology in intelligent driving vehicles, including the preprocessing of raw data required by Simultaneous Localization and Map
作者: 神經(jīng)    時(shí)間: 2025-3-25 10:58

作者: Type-1-Diabetes    時(shí)間: 2025-3-25 12:30
978-3-030-73670-5Springer Nature Switzerland AG 2021
作者: Cryptic    時(shí)間: 2025-3-25 16:58
Conference proceedings 2021ecember 2020..The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace..
作者: 預(yù)知    時(shí)間: 2025-3-25 22:57

作者: Abominate    時(shí)間: 2025-3-26 02:32

作者: 跳動(dòng)    時(shí)間: 2025-3-26 04:37
Conference proceedings 2021ecember 2020..The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issue
作者: 嘮叨    時(shí)間: 2025-3-26 11:21
0302-9743 yberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace..978-3-030-73670-5978-3-030-73671-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 填滿    時(shí)間: 2025-3-26 15:29
https://doi.org/10.1007/978-1-4302-7214-4rest neighbor clustering analysis of input data. The approach was tested on a real-world competition dataset, and effectiveness of the new method was verified by experimental results. By using the new method, we can even obtain a better classification accuracy than the best score produced in the competition.
作者: Forehead-Lift    時(shí)間: 2025-3-26 17:49
https://doi.org/10.1007/978-3-030-25816-0, which effectively and securely realizes the data sharing among multiple parties. SDSBT achieves the properties including privacy-preserving, identity authentication, application security, and accountability. The security analysis and experimental results show that the scheme is secure and practical.
作者: Kindle    時(shí)間: 2025-3-26 22:47

作者: backdrop    時(shí)間: 2025-3-27 03:20
https://doi.org/10.1007/978-1-4302-7214-4 deep neural networks. This defense approach is based on the kernel optimization of SVMs with radial basis function kernels. To test this hypothesis, we evaluate our approach on MNIST and CIFAR-10 image classification datasets, and the experimental results show that our method is beneficial and makes our classifier more robust.
作者: Magisterial    時(shí)間: 2025-3-27 05:37

作者: 無思維能力    時(shí)間: 2025-3-27 12:32

作者: Heterodoxy    時(shí)間: 2025-3-27 15:29
Identity Development in Adolescentsex in theory, the realize of this algorithm is concise and clear, which can quickly and effectively separate these signals, and provide research basis for accurate analysis of the causes of aircraft accidents in the later stage.
作者: 古代    時(shí)間: 2025-3-27 20:35

作者: 憲法沒有    時(shí)間: 2025-3-28 01:24
Floriana Battaglia,Lucio Bontempelli passport. What’s more, the method separates the user’s location information from the user’s identity effectively, which protects the user’s privacy and efficiently analyzes the high-risk areas of the epidemic.
作者: largesse    時(shí)間: 2025-3-28 04:58
Kernel Optimization in SVM for Defense Against Adversarial Attacks, deep neural networks. This defense approach is based on the kernel optimization of SVMs with radial basis function kernels. To test this hypothesis, we evaluate our approach on MNIST and CIFAR-10 image classification datasets, and the experimental results show that our method is beneficial and makes our classifier more robust.
作者: 舊石器時(shí)代    時(shí)間: 2025-3-28 07:18
A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT,ow that the algorithm proposed in this paper can effectively extract the watermark without any changing of the medical image, and has a higher NC value under conventional attacks and geometric attacks. it has better invisibility and robustness.
作者: Matrimony    時(shí)間: 2025-3-28 11:08

作者: 異端    時(shí)間: 2025-3-28 14:46
The Blind Separation of Cockpit Mixed Signals Based on Fast Independent Component Analysis,ex in theory, the realize of this algorithm is concise and clear, which can quickly and effectively separate these signals, and provide research basis for accurate analysis of the causes of aircraft accidents in the later stage.
作者: groggy    時(shí)間: 2025-3-28 22:15

作者: Angiogenesis    時(shí)間: 2025-3-28 23:31
BID-HCP: Blockchain Identifier Based Health Certificate Passport System, passport. What’s more, the method separates the user’s location information from the user’s identity effectively, which protects the user’s privacy and efficiently analyzes the high-risk areas of the epidemic.
作者: 平項(xiàng)山    時(shí)間: 2025-3-29 06:42
Indizieren und Gliedern von Dokumenten,ject. Specifically, based on a 3D object that can attack LiDAR sensors, a geometric transformation can be used to project it onto the 2D plane. Perturbation can be added on the 2D plane to generate 2D adversarial examples, which can attack the optical image sensor in the black-box setting, without changing the object’s geometry.
作者: 兇兆    時(shí)間: 2025-3-29 10:36

作者: 褲子    時(shí)間: 2025-3-29 15:11
Adding Navigation to the Package,tic mapping, and the zero watermark is constructed and stored in a third party medical image protection database. Extensive experiments have shown that the proposed algorithm has good robustness to geometric attacks and common attacks, especially anti-translation, rotation, and compression attacks.
作者: 搜尋    時(shí)間: 2025-3-29 16:06

作者: 不愿    時(shí)間: 2025-3-29 19:43

作者: Ophthalmoscope    時(shí)間: 2025-3-30 00:04
,A Robust Digital Watermarking for?Medical Images Based on PHTs-DCT,tic mapping, and the zero watermark is constructed and stored in a third party medical image protection database. Extensive experiments have shown that the proposed algorithm has good robustness to geometric attacks and common attacks, especially anti-translation, rotation, and compression attacks.
作者: Progesterone    時(shí)間: 2025-3-30 04:26
Camdar-Adv: Method for Generating Adversarial Patches on 3D Object,ability, and the artificial designed adversarial examples can make the DNN model output the wrong results. These adversarial examples not only exist in the digital world, but also in the physical world. At present, researches on autonomous driving platform mainly focus on attacking a single sensor.
作者: CEDE    時(shí)間: 2025-3-30 09:53

作者: abnegate    時(shí)間: 2025-3-30 14:02
,A Semi-supervised Learning Approach for?High Dimensional Android Malware Classification,includes a random projection method for reducing feature dimensionality which would be more efficient than usual feature selection methods in existing work for the task. We also introduced a new method of SGD-based SVM with adapted sampling, which was based on the insight from the confidence and nea
作者: 財(cái)政    時(shí)間: 2025-3-30 18:22
Kernel Optimization in SVM for Defense Against Adversarial Attacks,h field of adversarial machine learning. Support vector machines (SVMs), as a kind of successful approach, were widely used to solve security problems, such as image classification, malware detection, spam filtering, and intrusion detection. However, many adversarial attack methods have emerged rece
作者: 敵意    時(shí)間: 2025-3-30 21:08

作者: Trabeculoplasty    時(shí)間: 2025-3-31 04:04
Reliability Optimization and Trust Computing of Composite Wing Based on Sparse PC Method,he research on uncertainty analysis method is particularly important. Although the traditional Monte Carlo method can ensure the accuracy of optimization, it takes too long time, which limits its potential application on engineering. High precision uncertainty analysis and optimization design based
作者: 船員    時(shí)間: 2025-3-31 07:23

作者: APO    時(shí)間: 2025-3-31 11:54

作者: 大洪水    時(shí)間: 2025-3-31 17:01

作者: 贊美者    時(shí)間: 2025-3-31 18:36
,A Robust Digital Watermarking for?Medical Images Based on PHTs-DCT,ng algorithms are failed to solve the protection problems against geometric attacks. To solve this problem, a robust digital watermarking algorithm for medical images based on PHTs-DCT is proposed in this paper. For embedding watermark, DCT is applied to reduce the redundant data of the image, then
作者: 里程碑    時(shí)間: 2025-3-31 23:25
A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT, concerns about the privacy of patient information. Aiming at the hidden dangers of copying, cutting, tampering, etc. in the dissemination of medical images, combined with the characteristics of medical images, this paper proposed a novel zero-watermarking algorithm based on Tetrolet-DCT, focusing o
作者: 松雞    時(shí)間: 2025-4-1 02:08

作者: 現(xiàn)代    時(shí)間: 2025-4-1 07:39
The Blind Separation of Cockpit Mixed Signals Based on Fast Independent Component Analysis,oice signal is the basis for exploring the real reason behind the flight accident, which often starts from the separation of cockpit mixed signals. In this paper, a Fast Independent Component Analysis (FastICA) method for mixed signal separation is proposed. The basic idea of the method, three class
作者: 結(jié)束    時(shí)間: 2025-4-1 12:33

作者: Harness    時(shí)間: 2025-4-1 17:58
Analysis on Influencing Factors of Electricity Sales for Electric Data Security, strengthen the electricity companies, related national energy departments’ control and security over the expected electricity consumption across the country. In this paper, we analyze the relationship between different types of electricity sales and a variety of potential factors, including immedia
作者: 腐爛    時(shí)間: 2025-4-1 21:25





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
炎陵县| 盈江县| 武隆县| 平乐县| 瑞金市| 黄陵县| 龙泉市| 昌邑市| 吴江市| 保靖县| 辽宁省| 维西| 浪卡子县| 瓦房店市| 孟连| 伊春市| 澄迈县| 宜君县| 高尔夫| 东阿县| 子洲县| 望江县| 綦江县| 岐山县| 柞水县| 丹凤县| 通州区| 二连浩特市| 永新县| 舟曲县| 房产| 青冈县| 瑞安市| 淳安县| 乌海市| 南京市| 秀山| 南乐县| 施秉县| 合山市| 周至县|