找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021

[復制鏈接]
樓主: Wilson
41#
發(fā)表于 2025-3-28 15:26:46 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3identify network attacks has been one of the research hotspots in the field of network security protection in recent years. But they have some limitations, such as model parameters are difficult to optimize, and the prediction accuracy rate is low. Also, the characteristics of time series uncertaint
42#
發(fā)表于 2025-3-28 18:47:17 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3y, the convolutional network method is applied to data recognition, and the recognition method of the abnormal data in the local area network common channel based on the convolutional neural network is studied. First, the convolutional neural network structure is analyzed and the three main parts of
43#
發(fā)表于 2025-3-29 02:08:58 | 只看該作者
44#
發(fā)表于 2025-3-29 03:47:12 | 只看該作者
Niki J. Agnantis,Demetrios A. Spandidoser of malware writers abuse various anti-reverse technologies to hide malware information. In order to protect these malwares, they usually use virtualization, obfuscation, packing, and anti-debugging techniques. These protections hinder the acquisition of malware information, making the reverse ana
45#
發(fā)表于 2025-3-29 09:13:42 | 只看該作者
S. L. Schor,A. M. Schor,A. Howell,J. Haggielly. Due to the growing malware variants, automatic detection and classification of malware samples is inevitable. A long-tailed distribution is one of the most common problems in malware dataset. However, existing general deep learning model is difficult to identify few-shot classes in the case of
46#
發(fā)表于 2025-3-29 12:02:46 | 只看該作者
47#
發(fā)表于 2025-3-29 16:55:37 | 只看該作者
48#
發(fā)表于 2025-3-29 22:45:53 | 只看該作者
Barbara Florentine,Juan C. Felix, it is always plagued by information leaks. Some recent researches have pointed out that forward and backward privacy which disallows leakage from update operations should be the basic requirement for a secure SSE scheme. However, most existing forward and backward private SSE schemes only consider
49#
發(fā)表于 2025-3-30 03:25:37 | 只看該作者
50#
發(fā)表于 2025-3-30 05:51:02 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-17 17:10
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
长武县| 康乐县| 汾阳市| 巴彦淖尔市| 雷波县| 江永县| 兴仁县| 淮安市| 邹城市| 昆明市| 靖安县| 丽水市| 黑龙江省| 青冈县| 和硕县| 靖远县| 城固县| 新田县| 宝坻区| 昭通市| 文成县| 吉木萨尔县| 武乡县| 垫江县| 安西县| 灵璧县| 西盟| 汶上县| 玉溪市| 垣曲县| 辰溪县| 郴州市| 葵青区| 娱乐| 汪清县| 寿阳县| 庐江县| 徐州市| 阿荣旗| 潜山县| 寿阳县|