找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021

[復(fù)制鏈接]
樓主: Wilson
41#
發(fā)表于 2025-3-28 15:26:46 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3identify network attacks has been one of the research hotspots in the field of network security protection in recent years. But they have some limitations, such as model parameters are difficult to optimize, and the prediction accuracy rate is low. Also, the characteristics of time series uncertaint
42#
發(fā)表于 2025-3-28 18:47:17 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3y, the convolutional network method is applied to data recognition, and the recognition method of the abnormal data in the local area network common channel based on the convolutional neural network is studied. First, the convolutional neural network structure is analyzed and the three main parts of
43#
發(fā)表于 2025-3-29 02:08:58 | 只看該作者
44#
發(fā)表于 2025-3-29 03:47:12 | 只看該作者
Niki J. Agnantis,Demetrios A. Spandidoser of malware writers abuse various anti-reverse technologies to hide malware information. In order to protect these malwares, they usually use virtualization, obfuscation, packing, and anti-debugging techniques. These protections hinder the acquisition of malware information, making the reverse ana
45#
發(fā)表于 2025-3-29 09:13:42 | 只看該作者
S. L. Schor,A. M. Schor,A. Howell,J. Haggielly. Due to the growing malware variants, automatic detection and classification of malware samples is inevitable. A long-tailed distribution is one of the most common problems in malware dataset. However, existing general deep learning model is difficult to identify few-shot classes in the case of
46#
發(fā)表于 2025-3-29 12:02:46 | 只看該作者
47#
發(fā)表于 2025-3-29 16:55:37 | 只看該作者
48#
發(fā)表于 2025-3-29 22:45:53 | 只看該作者
Barbara Florentine,Juan C. Felix, it is always plagued by information leaks. Some recent researches have pointed out that forward and backward privacy which disallows leakage from update operations should be the basic requirement for a secure SSE scheme. However, most existing forward and backward private SSE schemes only consider
49#
發(fā)表于 2025-3-30 03:25:37 | 只看該作者
50#
發(fā)表于 2025-3-30 05:51:02 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-17 06:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
酉阳| 福鼎市| 洮南市| 浙江省| 通榆县| 丰镇市| 黎川县| 丰县| 建宁县| 龙胜| 封开县| 马关县| 平罗县| 神农架林区| 循化| 陕西省| 南岸区| 富裕县| 融水| 开原市| 黔东| 金山区| 荣昌县| 惠来县| 汾阳市| 新宁县| 大同县| 荣成市| 台湾省| 黑河市| 陵川县| 通山县| 广西| 苏尼特右旗| 忻州市| 邵武市| 澄城县| 隆尧县| 沅江市| 龙州县| 博乐市|