標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁] 作者: risky-drinking 時間: 2025-3-21 18:41
書目名稱Artificial Intelligence and Security影響因子(影響力)
書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence and Security被引頻次
書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Security年度引用
書目名稱Artificial Intelligence and Security年度引用學(xué)科排名
書目名稱Artificial Intelligence and Security讀者反饋
書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名
作者: 很像弓] 時間: 2025-3-21 23:43 作者: Catheter 時間: 2025-3-22 02:46 作者: 希望 時間: 2025-3-22 05:46
Fabbriche, sistemi, organizzazioniseries simulation of aerospace, presents the general model based on CCS-like, gives the calculi method of model, and proves the termination of computation. This paper analyzes the time process in the simulation of spacecrafts, simplifies the general model, designs the framework of the temporal confi作者: 失望昨天 時間: 2025-3-22 12:26
Fabbriche, sistemi, organizzazioniriori) is proposed to solve this problem, A tuple measurement model based on the algorithm is created. Compared with traditional Apriori algorithm, CFI-Apriori algorithm stores infrequent candidate item sets and creates two tuple measurement models based on probability weight and information entropy作者: 生存環(huán)境 時間: 2025-3-22 13:08 作者: 臨時抱佛腳 時間: 2025-3-22 19:03 作者: 防御 時間: 2025-3-22 23:34
Il futuro dell’ingegneria industrialevariant for scale changes and rotations, and are flexible for illumination variations and affine transformations. The paper chooses SIFT to extract key points of ear images. Then the features of key points are extracted with the local multi-scale analysis feature of the Gabor wavelet. In this way, e作者: ULCER 時間: 2025-3-23 02:49 作者: 音樂戲劇 時間: 2025-3-23 05:51
Fabbriche, sistemi, organizzazioni the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase. However, there exists an inherent security issue for the typical PEKS schemes that they cannot prevent the inside keywords guessing attack (KGA). Moreover, most PEKS sch作者: flex336 時間: 2025-3-23 13:19 作者: Constituent 時間: 2025-3-23 14:56 作者: Headstrong 時間: 2025-3-23 21:55 作者: ethnology 時間: 2025-3-23 23:52 作者: 粘連 時間: 2025-3-24 04:42
Abgrenzung von verwandten Gattungsformen,f low cost, simple deployment and long-distance communication. Most researches use the Received Signal Strength (RSS) of the tag backscattered signal or reference tags to realize localization. Owing to the large fluctuation of RSS and its sensitivity to antenna direction and environment, the localiz作者: depreciate 時間: 2025-3-24 07:02 作者: 得意人 時間: 2025-3-24 12:32
https://doi.org/10.1007/978-3-476-04132-6 So this study can be divided into two parts. First of all, contrary to the previous machine learning algorithm with only one machine learning model applied for a vast area, a clustering algorithm is proposed to divide the vast area into multiple areas with different models for forecast correction. 作者: 突襲 時間: 2025-3-24 17:58
https://doi.org/10.1007/978-3-319-70238-4ent. With the development of high-throughput proteomics technology, essential protein recognition has become a hot topic and focus of research, there are many computational methods for essential proteins detecting. However, these existing methods are mostly predicted in static PPI networks, ignoring作者: 沉思的魚 時間: 2025-3-24 20:58 作者: 用不完 時間: 2025-3-25 00:18 作者: disparage 時間: 2025-3-25 03:19 作者: 大約冬季 時間: 2025-3-25 07:38
978-3-030-57883-1Springer Nature Switzerland AG 2020作者: 橫條 時間: 2025-3-25 13:32
Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software DetectionCurrently, methods based on static detection have certain limitations to the malicious samples of system call confusion. The existing dynamic detection methods mainly extract features from the local system Application Programming Interface (API) sequence dynamically invoked, and combine them with Ra作者: botany 時間: 2025-3-25 17:48 作者: 有角 時間: 2025-3-25 20:23 作者: 沖擊力 時間: 2025-3-26 02:25 作者: 地牢 時間: 2025-3-26 04:41
Tuple Measure Model Based on CFI-Apriori Algorithmriori) is proposed to solve this problem, A tuple measurement model based on the algorithm is created. Compared with traditional Apriori algorithm, CFI-Apriori algorithm stores infrequent candidate item sets and creates two tuple measurement models based on probability weight and information entropy作者: Mortal 時間: 2025-3-26 10:38
Deep Learning Video Action Recognition Method Based on Key Frame Algorithmthod for key frame extraction. The KGAF-means method is based on the clustering principle and combines the K-means algorithm with the artificial fish swarm algorithm to realize the key frame sequence extraction. Based on the extracted key frame sequence, the RGB image and the optical flow image are 作者: intertwine 時間: 2025-3-26 14:56
Optimization and Deployment of Vehicle Trajectory Prediction Scheme Based on Real-Time ANPR Traffic provide evident support for path prediction. Taking advantage of the real-time ANPR data, this study adopts and modifies a trajectory prediction model based on order-k Markov model, calculating a supplementary probability matrix to compensate for the deficiency of the prediction model by exploring 作者: 做方舟 時間: 2025-3-26 20:37
Ear Recognition Based on Gabor-SIFTvariant for scale changes and rotations, and are flexible for illumination variations and affine transformations. The paper chooses SIFT to extract key points of ear images. Then the features of key points are extracted with the local multi-scale analysis feature of the Gabor wavelet. In this way, e作者: Working-Memory 時間: 2025-3-26 23:08
Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Cachingrvers of service provider (SP). Dozens of researches show that this problem can be effectively solved by caching contents on the network edge. However, edge caching still faces some challenges. First, cache capacity requirements and dilemma. Most existing edge devices have small storage capacity, wh作者: CROW 時間: 2025-3-27 04:15
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Latti the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase. However, there exists an inherent security issue for the typical PEKS schemes that they cannot prevent the inside keywords guessing attack (KGA). Moreover, most PEKS sch作者: 駕駛 時間: 2025-3-27 05:46 作者: APRON 時間: 2025-3-27 09:27
Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks It can generate very high quality face pictures, so it plays a very important role in the field of criminal investigation. But during surveillance, suspects often wear face covers, such as glasses, masks, hats and so on. It may affect the machine’s recognition of the face. The traditional method is作者: impaction 時間: 2025-3-27 16:02
An Efficient Method for Generating Matrices of Quantum Logic Circuitsof quantum gates in the quantum circuit, and then the matrix of the quantum circuit is constructed according to the mapping relationship between the truth table and the matrix. A common method is to generate a matrix by using the topological transformation rules of quantum gates, and then multiply t作者: cartilage 時間: 2025-3-27 21:43 作者: beta-cells 時間: 2025-3-27 23:27
A Localization Algorithm Based on Emulating Large Bandwidth with Passive RFID Tagsf low cost, simple deployment and long-distance communication. Most researches use the Received Signal Strength (RSS) of the tag backscattered signal or reference tags to realize localization. Owing to the large fluctuation of RSS and its sensitivity to antenna direction and environment, the localiz作者: 消音器 時間: 2025-3-28 04:58
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Networkatency, high reliability, and data security for various application services. The fog computing model newly proposed by researchers in recent years can increase the task processing and data analysis capabilities of network edge devices, so it can reduce the computing load of cloud computing devices 作者: 誘騙 時間: 2025-3-28 07:52
A Research for 2-m Temperature Prediction Based on Machine Learning So this study can be divided into two parts. First of all, contrary to the previous machine learning algorithm with only one machine learning model applied for a vast area, a clustering algorithm is proposed to divide the vast area into multiple areas with different models for forecast correction. 作者: cluster 時間: 2025-3-28 11:41
A New Scheme for Essential Proteins Identification in Dynamic Weighted Protein-Protein Interaction Nent. With the development of high-throughput proteomics technology, essential protein recognition has become a hot topic and focus of research, there are many computational methods for essential proteins detecting. However, these existing methods are mostly predicted in static PPI networks, ignoring作者: 形狀 時間: 2025-3-28 17:14 作者: 兇殘 時間: 2025-3-28 21:57 作者: 極深 時間: 2025-3-29 01:14
https://doi.org/10.1007/88-470-0426-8imental results show that the mAP value of the method is 22.9 on the public dataset Charades. And the results show that the proposed method has better robustness than other network models and improves the short video action recognition effect.作者: panorama 時間: 2025-3-29 03:12
Il futuro dell’ingegneria industrialee points, and obtain high recognition rate by using few feature points. It is robust to rigid changes, illumination and rotations changes of ear image, provides a new approach to the research for ear recognition.作者: 避開 時間: 2025-3-29 10:37
Fabbriche, sistemi, organizzazionis a lattice-based PECKS scheme which can resist inside KGA. Its security can be reduced to the hardness of LWE problem and ISIS problem, thus it can resist quantum computing attack. We also give a comparison with other searchable encryption schemes on the computational cost of the main algorithms and the size of related parameters.作者: Ibd810 時間: 2025-3-29 11:49 作者: Flinch 時間: 2025-3-29 19:19
Verso la matematica dell’organizzazione our method achieves dimensionality reduction skillfully, which greatly improves the efficiency of the algorithm. Taking the GT circuit and the NCV circuit as examples, when the number of quantum lines is as large as 8, our method is hundreds of thousands of times faster than the method proposed in the previous paper.作者: parallelism 時間: 2025-3-29 22:52 作者: GEAR 時間: 2025-3-30 03:45
Computing Sentence Embedding by Merging Syntactic Parsing Tree and Word Embeddingmpared to the traditional sentence embedding weighting method, our method achieves better or comparable performance on various text similarity tasks, especially with the low dimension of the data set.作者: Ballerina 時間: 2025-3-30 08:02
Deep Learning Video Action Recognition Method Based on Key Frame Algorithmimental results show that the mAP value of the method is 22.9 on the public dataset Charades. And the results show that the proposed method has better robustness than other network models and improves the short video action recognition effect.作者: Discrete 時間: 2025-3-30 09:46 作者: 無法取消 時間: 2025-3-30 15:24
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattis a lattice-based PECKS scheme which can resist inside KGA. Its security can be reduced to the hardness of LWE problem and ISIS problem, thus it can resist quantum computing attack. We also give a comparison with other searchable encryption schemes on the computational cost of the main algorithms and the size of related parameters.作者: 煩躁的女人 時間: 2025-3-30 19:38 作者: Seizure 時間: 2025-3-30 21:13 作者: 聚集 時間: 2025-3-31 03:35 作者: 引導(dǎo) 時間: 2025-3-31 07:30 作者: JOT 時間: 2025-3-31 10:30
Fabbriche, sistemi, organizzazioniem, and implements the framework in a simulation system. And then, it describes the computation process by the example of the concrete temporal process of the spacecraft’s simulation. Finally, this paper gives the conclusion and point out the field in which this model can be used in the future.作者: 補充 時間: 2025-3-31 16:21
Verso la matematica dell’organizzazionearithmetic operation based on DCGAN is proposed to process the traditional photos so and store them in the face database, so that the details of the human face can be well preserved. When face recognition is carried out, such pictures are used to assist in face recognition. The experimental results show that this method can improve the accuracy.作者: 混合物 時間: 2025-3-31 19:52
A Formal Method for Safety Time Series Simulation of Aerospaceem, and implements the framework in a simulation system. And then, it describes the computation process by the example of the concrete temporal process of the spacecraft’s simulation. Finally, this paper gives the conclusion and point out the field in which this model can be used in the future.