標(biāo)題: Titlebook: Machine Learning for Cyber Security; 4th International Co Yuan Xu,Hongyang Yan,Jin Li Conference proceedings 2023 The Editor(s) (if applica [打印本頁(yè)] 作者: Jejunum 時(shí)間: 2025-3-21 19:29
書(shū)目名稱Machine Learning for Cyber Security影響因子(影響力)
書(shū)目名稱Machine Learning for Cyber Security影響因子(影響力)學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security被引頻次
書(shū)目名稱Machine Learning for Cyber Security被引頻次學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security年度引用
書(shū)目名稱Machine Learning for Cyber Security年度引用學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security讀者反饋
書(shū)目名稱Machine Learning for Cyber Security讀者反饋學(xué)科排名
作者: 瑪瑙 時(shí)間: 2025-3-21 22:46 作者: 對(duì)待 時(shí)間: 2025-3-22 03:19 作者: SHRIK 時(shí)間: 2025-3-22 05:13
Conference proceedings 2023g for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China..The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from?367 submissions..作者: FLIRT 時(shí)間: 2025-3-22 09:46 作者: Sigmoidoscopy 時(shí)間: 2025-3-22 15:59
https://doi.org/10.1007/978-3-031-20096-0artificial intelligence; computer networks; computer science; computer security; computer systems; comput作者: 向宇宙 時(shí)間: 2025-3-22 20:40
Swarm Intelligence for Multi-objective Portfolio Optimization,at multi-objective evolutionary algorithm based on decomposition (MOEA/D) and weighted optimization framework (WOF) perform significantly better than the other four in solving the high-dimensional objective problem, and WOF obtains a more uniform solution to the high-dimensional problem.作者: occult 時(shí)間: 2025-3-22 22:18
Conference proceedings 2023g for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China..The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from?367 submissions..作者: 野蠻 時(shí)間: 2025-3-23 04:21 作者: MENT 時(shí)間: 2025-3-23 07:54
Visualized Analysis of the Emerging Trends of Automated Audio Description Technology,ription, facilitated by deep learning, such as CNN, RNN, LSTM and their improvements. Knowledge-guided and data-driven learning methods may be possible solutions for computer understanding and generation of human-like description of videos.作者: Thymus 時(shí)間: 2025-3-23 10:47
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Netwssion scheme is used to transmit the ciphertext of the vehicle communication network information to the other end. The results show that compared with des and RSA encryption methods, the proposed method has shorter encryption time and higher key sensitivity, indicating that the proposed encryption transmission method is more efficient and secure.作者: elucidate 時(shí)間: 2025-3-23 16:46
0302-9743 ne Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China..The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from?367 submissions..978-3-031-20095-3978-3-031-20096-0Series ISSN 0302作者: 原來(lái) 時(shí)間: 2025-3-23 20:00 作者: Thyroxine 時(shí)間: 2025-3-23 23:35 作者: 聯(lián)想 時(shí)間: 2025-3-24 05:33
Spatio-Temporal Context Modeling for Road Obstacle Detection,ive experiments were conducted on the Small Obstacle Detection (SOD) dataset and the Lost and Found dataset. The results indicate that our method with spatio-temporal context modeling is superior to existing methods for road obstacle detection.作者: 男生戴手銬 時(shí)間: 2025-3-24 07:51 作者: Asparagus 時(shí)間: 2025-3-24 11:07
Bowen Xue,Huifen Zhong,Junrui Lu,Tianwei Zhou,Ben Niu作者: 細(xì)絲 時(shí)間: 2025-3-24 16:03 作者: 彎曲道理 時(shí)間: 2025-3-24 21:57 作者: 消息靈通 時(shí)間: 2025-3-25 00:31 作者: 竊喜 時(shí)間: 2025-3-25 05:19
A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing Model,rithms. Finally, the blockchain is used to ensure data security and tamper resistance. Through the simulation experiment, the performance test results show that the scheme meets the performance index, and the security analysis results show that the scheme can provide security. It offers a novel appr作者: EWER 時(shí)間: 2025-3-25 08:19
Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference,graph that is ad-hoc and difficult to construct. To ensure the amortized technique for GBP is applied to BN inference for practical use, we propose (i) A new pairwise conversion (PWC) algorithm converts all the conditional probability distributions in the BN into pairwise factors to facilitate neura作者: manifestation 時(shí)間: 2025-3-25 12:28 作者: 完整 時(shí)間: 2025-3-25 19:46 作者: 盟軍 時(shí)間: 2025-3-25 23:59
,A Lightweight NFT Auction Protocol for?Cross-chain Environment,taining low communication costs. The transactions can be confirmed in an average of 4 blocks, and the contract strategies will filter out invalid transactions. We also do additional experiments to prove that our protocol can resist reentrancy.作者: 寬容 時(shí)間: 2025-3-26 04:02 作者: 死貓他燒焦 時(shí)間: 2025-3-26 05:27 作者: declamation 時(shí)間: 2025-3-26 12:01 作者: Phenothiazines 時(shí)間: 2025-3-26 14:19 作者: FLIP 時(shí)間: 2025-3-26 19:14 作者: 包裹 時(shí)間: 2025-3-26 23:56 作者: 厭倦嗎你 時(shí)間: 2025-3-27 02:46 作者: RECUR 時(shí)間: 2025-3-27 07:28
Fan Jiang,Yuanlong Cao,Jianmao Xiao,Hui Yi,Gang Lei,Min Liu,Shuiguang Deng,Hao Wangsich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: 粘土 時(shí)間: 2025-3-27 12:51
Jinyang Wang,Tao Wang,Min Gan,George Hadjichristofisich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: 牽連 時(shí)間: 2025-3-27 16:27
Lingqian Zheng,Xinrong Caosich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: Abjure 時(shí)間: 2025-3-27 20:24
Weiye Ning,Xin Xie,Yuhui Huang,Si Yu,Zhao Li,Hao Yangsich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: olfction 時(shí)間: 2025-3-27 22:17
Yanning Zhangsich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: 舊病復(fù)發(fā) 時(shí)間: 2025-3-28 04:01 作者: 燕麥 時(shí)間: 2025-3-28 07:03 作者: Mediocre 時(shí)間: 2025-3-28 13:40
Li Chen,Yongjin Wang,Jia Liu,Lijing Tansich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: ovation 時(shí)間: 2025-3-28 17:27
Huiling Liusich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: 構(gòu)成 時(shí)間: 2025-3-28 22:35 作者: chondromalacia 時(shí)間: 2025-3-29 00:25 作者: Cervical-Spine 時(shí)間: 2025-3-29 05:42 作者: Angiogenesis 時(shí)間: 2025-3-29 08:43
Dianxin Wang,Tian Chen,Zheng Zhang,Nan Zhangsich das Lexikon an Wissenschaftler und Studenten der Pharmazie, Biologie, Medizin, Chemie sowie an ?rztefür Naturheilverfahren, Apotheker, Heilpraktiker und an Mitarbeiter in der Industrie..978-3-662-64799-8978-3-662-64800-1作者: laxative 時(shí)間: 2025-3-29 15:05 作者: Lice692 時(shí)間: 2025-3-29 17:47 作者: SCORE 時(shí)間: 2025-3-29 21:34 作者: 感情 時(shí)間: 2025-3-30 00:16 作者: 圣歌 時(shí)間: 2025-3-30 04:39
A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing Model,y no research related to the security of medical resource sharing in near-domain networks. Most of the medical data is transmitted through an insecure environment without encryption, and there is a risk of interception and tampering. In addition, lots of medical data is uploaded to the cloud platfor作者: 面包屑 時(shí)間: 2025-3-30 08:40 作者: 含鐵 時(shí)間: 2025-3-30 12:48
VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts, previous research work is based on symbol detection and comparison with expert-defined error patterns to analyze the possible vulnerabilities of smart contracts. The accuracy and performance of such methods are generally low. In response to this problem, this paper proposes an efficient smart contr作者: HAIL 時(shí)間: 2025-3-30 18:32
,Robust Remote Sensing Scene Classification with?Multi-view Voting and?Entropy Ranking, method for the task that is secure against partially incorrect categorization of images. Specifically, we remove and correct errors in the labels progressively by iterative multi-view voting and entropy ranking. At each time step, we first divide the training data into disjoint parts for separate t作者: 消極詞匯 時(shí)間: 2025-3-30 22:06
Visualized Analysis of the Emerging Trends of Automated Audio Description Technology,audio description studies. Based on the data collected from the Web of Science database, this article uses the visualized analysis software of CiteSpace to analyze the progress and development of automated audio description technology. It is found that the main keywords include computer vision, natu作者: 極少 時(shí)間: 2025-3-31 03:35 作者: Insul島 時(shí)間: 2025-3-31 07:53
Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis,rmation. Because the network is open to a certain extent, it poses a great threat to the security of network information transmission. Therefore, a research on encrypted transmission method of network speech recognition information based on big data analysis is proposed. Preprocess network speech si作者: 行業(yè) 時(shí)間: 2025-3-31 10:47 作者: 敲竹杠 時(shí)間: 2025-3-31 16:04
,A Multi-scale Framework for?Out-of-Distribution Detection in?Dermoscopic Images, However, conventional skin disease recognition systems may produce high confidence for out-of-distribution (OOD) data, which may become a major security vulnerability in practical applications. In this paper, we propose a multi-scale detection framework to detect out-of-distribution skin disease im作者: 冰雹 時(shí)間: 2025-3-31 18:39 作者: GRIN 時(shí)間: 2025-4-1 01:08
Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology,ta, a secure cloud storage method for regional economic data network based on blockchain technology is proposed. According to the distribution of regional economic data network nodes, the relevant network model is constructed. Under this model, the regional economic data are collected in real time, 作者: 抗原 時(shí)間: 2025-4-1 05:42
,Data Leakage with?Label Reconstruction in?Distributed Learning Environments,solutions revealed that it may lead to information leakage of private data. Attackers are able to reconstruct data via minimizing the difference between shared gradients and fake gradients that are produced by themselves. This is so-called data leakage attack from gradients. We find that, in many ca作者: maverick 時(shí)間: 2025-4-1 08:14 作者: 蠟燭 時(shí)間: 2025-4-1 11:39
Spatio-Temporal Context Modeling for Road Obstacle Detection,atio-temporal context modeling. Firstly, a data-driven spatial context model of the driving scene is constructed with the layouts of the training data. Then, obstacles in the input image are detected via the state-of-the-art object detection algorithms, and the results are combined with the generate作者: 賄賂 時(shí)間: 2025-4-1 18:13
,A Survey of?Android Malware Detection Based on?Deep Learning,d malware detection. However, the latest Android malware usually uses escape techniques such as code obfuscation, so the traditional machine learning methods gradually become invalid. In recent years, deep learning has been gradually applied in the field of Android malware detection due to its power作者: 鋼筆記下懲罰 時(shí)間: 2025-4-1 20:40
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Netw information based on neural network is proposed. Use neural network to generate random key to encrypt vehicle communication network information. Design encryption transmission scheme, including data encryption module, dynamic key generation module and data transmission module. The encrypted transmi