找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021

[復(fù)制鏈接]
樓主: Wilson
41#
發(fā)表于 2025-3-28 15:26:46 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3identify network attacks has been one of the research hotspots in the field of network security protection in recent years. But they have some limitations, such as model parameters are difficult to optimize, and the prediction accuracy rate is low. Also, the characteristics of time series uncertaint
42#
發(fā)表于 2025-3-28 18:47:17 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3y, the convolutional network method is applied to data recognition, and the recognition method of the abnormal data in the local area network common channel based on the convolutional neural network is studied. First, the convolutional neural network structure is analyzed and the three main parts of
43#
發(fā)表于 2025-3-29 02:08:58 | 只看該作者
44#
發(fā)表于 2025-3-29 03:47:12 | 只看該作者
Niki J. Agnantis,Demetrios A. Spandidoser of malware writers abuse various anti-reverse technologies to hide malware information. In order to protect these malwares, they usually use virtualization, obfuscation, packing, and anti-debugging techniques. These protections hinder the acquisition of malware information, making the reverse ana
45#
發(fā)表于 2025-3-29 09:13:42 | 只看該作者
S. L. Schor,A. M. Schor,A. Howell,J. Haggielly. Due to the growing malware variants, automatic detection and classification of malware samples is inevitable. A long-tailed distribution is one of the most common problems in malware dataset. However, existing general deep learning model is difficult to identify few-shot classes in the case of
46#
發(fā)表于 2025-3-29 12:02:46 | 只看該作者
47#
發(fā)表于 2025-3-29 16:55:37 | 只看該作者
48#
發(fā)表于 2025-3-29 22:45:53 | 只看該作者
Barbara Florentine,Juan C. Felix, it is always plagued by information leaks. Some recent researches have pointed out that forward and backward privacy which disallows leakage from update operations should be the basic requirement for a secure SSE scheme. However, most existing forward and backward private SSE schemes only consider
49#
發(fā)表于 2025-3-30 03:25:37 | 只看該作者
50#
發(fā)表于 2025-3-30 05:51:02 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-17 06:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
山西省| 常德市| 德州市| 丹阳市| 安溪县| 常州市| 泽普县| 苍溪县| 通化县| 和平县| 灵台县| 和林格尔县| 昆山市| 清水河县| 松桃| 泾源县| 象州县| 和顺县| 鄱阳县| 古交市| 隆德县| 长寿区| 阳朔县| 双柏县| 郑州市| 桐庐县| 岢岚县| 彩票| 姚安县| 彭泽县| 穆棱市| 澄城县| 新宁县| 漾濞| 资阳市| 新晃| 鸡西市| 吉木萨尔县| 二连浩特市| 娄烦县| 建平县|