找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021

[復(fù)制鏈接]
樓主: Wilson
41#
發(fā)表于 2025-3-28 15:26:46 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3identify network attacks has been one of the research hotspots in the field of network security protection in recent years. But they have some limitations, such as model parameters are difficult to optimize, and the prediction accuracy rate is low. Also, the characteristics of time series uncertaint
42#
發(fā)表于 2025-3-28 18:47:17 | 只看該作者
https://doi.org/10.1007/978-981-19-0197-3y, the convolutional network method is applied to data recognition, and the recognition method of the abnormal data in the local area network common channel based on the convolutional neural network is studied. First, the convolutional neural network structure is analyzed and the three main parts of
43#
發(fā)表于 2025-3-29 02:08:58 | 只看該作者
44#
發(fā)表于 2025-3-29 03:47:12 | 只看該作者
Niki J. Agnantis,Demetrios A. Spandidoser of malware writers abuse various anti-reverse technologies to hide malware information. In order to protect these malwares, they usually use virtualization, obfuscation, packing, and anti-debugging techniques. These protections hinder the acquisition of malware information, making the reverse ana
45#
發(fā)表于 2025-3-29 09:13:42 | 只看該作者
S. L. Schor,A. M. Schor,A. Howell,J. Haggielly. Due to the growing malware variants, automatic detection and classification of malware samples is inevitable. A long-tailed distribution is one of the most common problems in malware dataset. However, existing general deep learning model is difficult to identify few-shot classes in the case of
46#
發(fā)表于 2025-3-29 12:02:46 | 只看該作者
47#
發(fā)表于 2025-3-29 16:55:37 | 只看該作者
48#
發(fā)表于 2025-3-29 22:45:53 | 只看該作者
Barbara Florentine,Juan C. Felix, it is always plagued by information leaks. Some recent researches have pointed out that forward and backward privacy which disallows leakage from update operations should be the basic requirement for a secure SSE scheme. However, most existing forward and backward private SSE schemes only consider
49#
發(fā)表于 2025-3-30 03:25:37 | 只看該作者
50#
發(fā)表于 2025-3-30 05:51:02 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-17 06:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
双峰县| 肥东县| 黔东| 金山区| 龙井市| 红河县| 海林市| 昌黎县| 平昌县| 休宁县| 科技| 文昌市| 岳池县| 徐汇区| 弥渡县| 平和县| 洱源县| 康马县| 无为县| 德令哈市| 龙口市| 张家川| 全南县| 宁晋县| 中牟县| 易门县| 司法| 兴安盟| 渝北区| 措勤县| 昌都县| 河北区| 麦盖提县| 清丰县| 华宁县| 宜阳县| 慈利县| 恩施市| 垦利县| 宜丰县| 扎鲁特旗|