找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021

[復制鏈接]
樓主: Wilson
41#
發(fā)表于 2025-3-28 15:26:46 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3identify network attacks has been one of the research hotspots in the field of network security protection in recent years. But they have some limitations, such as model parameters are difficult to optimize, and the prediction accuracy rate is low. Also, the characteristics of time series uncertaint
42#
發(fā)表于 2025-3-28 18:47:17 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3y, the convolutional network method is applied to data recognition, and the recognition method of the abnormal data in the local area network common channel based on the convolutional neural network is studied. First, the convolutional neural network structure is analyzed and the three main parts of
43#
發(fā)表于 2025-3-29 02:08:58 | 只看該作者
44#
發(fā)表于 2025-3-29 03:47:12 | 只看該作者
Niki J. Agnantis,Demetrios A. Spandidoser of malware writers abuse various anti-reverse technologies to hide malware information. In order to protect these malwares, they usually use virtualization, obfuscation, packing, and anti-debugging techniques. These protections hinder the acquisition of malware information, making the reverse ana
45#
發(fā)表于 2025-3-29 09:13:42 | 只看該作者
S. L. Schor,A. M. Schor,A. Howell,J. Haggielly. Due to the growing malware variants, automatic detection and classification of malware samples is inevitable. A long-tailed distribution is one of the most common problems in malware dataset. However, existing general deep learning model is difficult to identify few-shot classes in the case of
46#
發(fā)表于 2025-3-29 12:02:46 | 只看該作者
47#
發(fā)表于 2025-3-29 16:55:37 | 只看該作者
48#
發(fā)表于 2025-3-29 22:45:53 | 只看該作者
Barbara Florentine,Juan C. Felix, it is always plagued by information leaks. Some recent researches have pointed out that forward and backward privacy which disallows leakage from update operations should be the basic requirement for a secure SSE scheme. However, most existing forward and backward private SSE schemes only consider
49#
發(fā)表于 2025-3-30 03:25:37 | 只看該作者
50#
發(fā)表于 2025-3-30 05:51:02 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-17 17:10
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
阳泉市| 改则县| 洪江市| 开平市| 孙吴县| 和平区| 鲁山县| 建湖县| 深水埗区| 巢湖市| 宝鸡市| 福州市| 昌都县| 宿迁市| 兴安县| 托克托县| 德令哈市| 合作市| 永年县| 泰兴市| 郸城县| 资中县| 香格里拉县| 油尖旺区| 泾川县| 石嘴山市| 海城市| 辽阳市| 舒兰市| 汝州市| 栾川县| 上饶县| 扎鲁特旗| 三台县| 黔西县| 天祝| 于田县| 辰溪县| 石楼县| 科尔| 平原县|