派博傳思國際中心

標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁]

作者: risky-drinking    時間: 2025-3-21 18:41
書目名稱Artificial Intelligence and Security影響因子(影響力)




書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Artificial Intelligence and Security被引頻次




書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名




書目名稱Artificial Intelligence and Security年度引用




書目名稱Artificial Intelligence and Security年度引用學(xué)科排名




書目名稱Artificial Intelligence and Security讀者反饋




書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名





作者: 很像弓]    時間: 2025-3-21 23:43

作者: Catheter    時間: 2025-3-22 02:46

作者: 希望    時間: 2025-3-22 05:46
Fabbriche, sistemi, organizzazioniseries simulation of aerospace, presents the general model based on CCS-like, gives the calculi method of model, and proves the termination of computation. This paper analyzes the time process in the simulation of spacecrafts, simplifies the general model, designs the framework of the temporal confi
作者: 失望昨天    時間: 2025-3-22 12:26
Fabbriche, sistemi, organizzazioniriori) is proposed to solve this problem, A tuple measurement model based on the algorithm is created. Compared with traditional Apriori algorithm, CFI-Apriori algorithm stores infrequent candidate item sets and creates two tuple measurement models based on probability weight and information entropy
作者: 生存環(huán)境    時間: 2025-3-22 13:08

作者: 臨時抱佛腳    時間: 2025-3-22 19:03

作者: 防御    時間: 2025-3-22 23:34
Il futuro dell’ingegneria industrialevariant for scale changes and rotations, and are flexible for illumination variations and affine transformations. The paper chooses SIFT to extract key points of ear images. Then the features of key points are extracted with the local multi-scale analysis feature of the Gabor wavelet. In this way, e
作者: ULCER    時間: 2025-3-23 02:49

作者: 音樂戲劇    時間: 2025-3-23 05:51
Fabbriche, sistemi, organizzazioni the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase. However, there exists an inherent security issue for the typical PEKS schemes that they cannot prevent the inside keywords guessing attack (KGA). Moreover, most PEKS sch
作者: flex336    時間: 2025-3-23 13:19

作者: Constituent    時間: 2025-3-23 14:56

作者: Headstrong    時間: 2025-3-23 21:55

作者: ethnology    時間: 2025-3-23 23:52

作者: 粘連    時間: 2025-3-24 04:42
Abgrenzung von verwandten Gattungsformen,f low cost, simple deployment and long-distance communication. Most researches use the Received Signal Strength (RSS) of the tag backscattered signal or reference tags to realize localization. Owing to the large fluctuation of RSS and its sensitivity to antenna direction and environment, the localiz
作者: depreciate    時間: 2025-3-24 07:02

作者: 得意人    時間: 2025-3-24 12:32
https://doi.org/10.1007/978-3-476-04132-6 So this study can be divided into two parts. First of all, contrary to the previous machine learning algorithm with only one machine learning model applied for a vast area, a clustering algorithm is proposed to divide the vast area into multiple areas with different models for forecast correction.
作者: 突襲    時間: 2025-3-24 17:58
https://doi.org/10.1007/978-3-319-70238-4ent. With the development of high-throughput proteomics technology, essential protein recognition has become a hot topic and focus of research, there are many computational methods for essential proteins detecting. However, these existing methods are mostly predicted in static PPI networks, ignoring
作者: 沉思的魚    時間: 2025-3-24 20:58

作者: 用不完    時間: 2025-3-25 00:18

作者: disparage    時間: 2025-3-25 03:19

作者: 大約冬季    時間: 2025-3-25 07:38
978-3-030-57883-1Springer Nature Switzerland AG 2020
作者: 橫條    時間: 2025-3-25 13:32
Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software DetectionCurrently, methods based on static detection have certain limitations to the malicious samples of system call confusion. The existing dynamic detection methods mainly extract features from the local system Application Programming Interface (API) sequence dynamically invoked, and combine them with Ra
作者: botany    時間: 2025-3-25 17:48

作者: 有角    時間: 2025-3-25 20:23

作者: 沖擊力    時間: 2025-3-26 02:25

作者: 地牢    時間: 2025-3-26 04:41
Tuple Measure Model Based on CFI-Apriori Algorithmriori) is proposed to solve this problem, A tuple measurement model based on the algorithm is created. Compared with traditional Apriori algorithm, CFI-Apriori algorithm stores infrequent candidate item sets and creates two tuple measurement models based on probability weight and information entropy
作者: Mortal    時間: 2025-3-26 10:38
Deep Learning Video Action Recognition Method Based on Key Frame Algorithmthod for key frame extraction. The KGAF-means method is based on the clustering principle and combines the K-means algorithm with the artificial fish swarm algorithm to realize the key frame sequence extraction. Based on the extracted key frame sequence, the RGB image and the optical flow image are
作者: intertwine    時間: 2025-3-26 14:56
Optimization and Deployment of Vehicle Trajectory Prediction Scheme Based on Real-Time ANPR Traffic provide evident support for path prediction. Taking advantage of the real-time ANPR data, this study adopts and modifies a trajectory prediction model based on order-k Markov model, calculating a supplementary probability matrix to compensate for the deficiency of the prediction model by exploring
作者: 做方舟    時間: 2025-3-26 20:37
Ear Recognition Based on Gabor-SIFTvariant for scale changes and rotations, and are flexible for illumination variations and affine transformations. The paper chooses SIFT to extract key points of ear images. Then the features of key points are extracted with the local multi-scale analysis feature of the Gabor wavelet. In this way, e
作者: Working-Memory    時間: 2025-3-26 23:08
Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Cachingrvers of service provider (SP). Dozens of researches show that this problem can be effectively solved by caching contents on the network edge. However, edge caching still faces some challenges. First, cache capacity requirements and dilemma. Most existing edge devices have small storage capacity, wh
作者: CROW    時間: 2025-3-27 04:15
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Latti the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase. However, there exists an inherent security issue for the typical PEKS schemes that they cannot prevent the inside keywords guessing attack (KGA). Moreover, most PEKS sch
作者: 駕駛    時間: 2025-3-27 05:46

作者: APRON    時間: 2025-3-27 09:27
Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks It can generate very high quality face pictures, so it plays a very important role in the field of criminal investigation. But during surveillance, suspects often wear face covers, such as glasses, masks, hats and so on. It may affect the machine’s recognition of the face. The traditional method is
作者: impaction    時間: 2025-3-27 16:02
An Efficient Method for Generating Matrices of Quantum Logic Circuitsof quantum gates in the quantum circuit, and then the matrix of the quantum circuit is constructed according to the mapping relationship between the truth table and the matrix. A common method is to generate a matrix by using the topological transformation rules of quantum gates, and then multiply t
作者: cartilage    時間: 2025-3-27 21:43

作者: beta-cells    時間: 2025-3-27 23:27
A Localization Algorithm Based on Emulating Large Bandwidth with Passive RFID Tagsf low cost, simple deployment and long-distance communication. Most researches use the Received Signal Strength (RSS) of the tag backscattered signal or reference tags to realize localization. Owing to the large fluctuation of RSS and its sensitivity to antenna direction and environment, the localiz
作者: 消音器    時間: 2025-3-28 04:58
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Networkatency, high reliability, and data security for various application services. The fog computing model newly proposed by researchers in recent years can increase the task processing and data analysis capabilities of network edge devices, so it can reduce the computing load of cloud computing devices
作者: 誘騙    時間: 2025-3-28 07:52
A Research for 2-m Temperature Prediction Based on Machine Learning So this study can be divided into two parts. First of all, contrary to the previous machine learning algorithm with only one machine learning model applied for a vast area, a clustering algorithm is proposed to divide the vast area into multiple areas with different models for forecast correction.
作者: cluster    時間: 2025-3-28 11:41
A New Scheme for Essential Proteins Identification in Dynamic Weighted Protein-Protein Interaction Nent. With the development of high-throughput proteomics technology, essential protein recognition has become a hot topic and focus of research, there are many computational methods for essential proteins detecting. However, these existing methods are mostly predicted in static PPI networks, ignoring
作者: 形狀    時間: 2025-3-28 17:14

作者: 兇殘    時間: 2025-3-28 21:57

作者: 極深    時間: 2025-3-29 01:14
https://doi.org/10.1007/88-470-0426-8imental results show that the mAP value of the method is 22.9 on the public dataset Charades. And the results show that the proposed method has better robustness than other network models and improves the short video action recognition effect.
作者: panorama    時間: 2025-3-29 03:12
Il futuro dell’ingegneria industrialee points, and obtain high recognition rate by using few feature points. It is robust to rigid changes, illumination and rotations changes of ear image, provides a new approach to the research for ear recognition.
作者: 避開    時間: 2025-3-29 10:37
Fabbriche, sistemi, organizzazionis a lattice-based PECKS scheme which can resist inside KGA. Its security can be reduced to the hardness of LWE problem and ISIS problem, thus it can resist quantum computing attack. We also give a comparison with other searchable encryption schemes on the computational cost of the main algorithms and the size of related parameters.
作者: Ibd810    時間: 2025-3-29 11:49

作者: Flinch    時間: 2025-3-29 19:19
Verso la matematica dell’organizzazione our method achieves dimensionality reduction skillfully, which greatly improves the efficiency of the algorithm. Taking the GT circuit and the NCV circuit as examples, when the number of quantum lines is as large as 8, our method is hundreds of thousands of times faster than the method proposed in the previous paper.
作者: parallelism    時間: 2025-3-29 22:52

作者: GEAR    時間: 2025-3-30 03:45
Computing Sentence Embedding by Merging Syntactic Parsing Tree and Word Embeddingmpared to the traditional sentence embedding weighting method, our method achieves better or comparable performance on various text similarity tasks, especially with the low dimension of the data set.
作者: Ballerina    時間: 2025-3-30 08:02
Deep Learning Video Action Recognition Method Based on Key Frame Algorithmimental results show that the mAP value of the method is 22.9 on the public dataset Charades. And the results show that the proposed method has better robustness than other network models and improves the short video action recognition effect.
作者: Discrete    時間: 2025-3-30 09:46

作者: 無法取消    時間: 2025-3-30 15:24
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattis a lattice-based PECKS scheme which can resist inside KGA. Its security can be reduced to the hardness of LWE problem and ISIS problem, thus it can resist quantum computing attack. We also give a comparison with other searchable encryption schemes on the computational cost of the main algorithms and the size of related parameters.
作者: 煩躁的女人    時間: 2025-3-30 19:38

作者: Seizure    時間: 2025-3-30 21:13

作者: 聚集    時間: 2025-3-31 03:35

作者: 引導(dǎo)    時間: 2025-3-31 07:30

作者: JOT    時間: 2025-3-31 10:30
Fabbriche, sistemi, organizzazioniem, and implements the framework in a simulation system. And then, it describes the computation process by the example of the concrete temporal process of the spacecraft’s simulation. Finally, this paper gives the conclusion and point out the field in which this model can be used in the future.
作者: 補充    時間: 2025-3-31 16:21
Verso la matematica dell’organizzazionearithmetic operation based on DCGAN is proposed to process the traditional photos so and store them in the face database, so that the details of the human face can be well preserved. When face recognition is carried out, such pictures are used to assist in face recognition. The experimental results show that this method can improve the accuracy.
作者: 混合物    時間: 2025-3-31 19:52
A Formal Method for Safety Time Series Simulation of Aerospaceem, and implements the framework in a simulation system. And then, it describes the computation process by the example of the concrete temporal process of the spacecraft’s simulation. Finally, this paper gives the conclusion and point out the field in which this model can be used in the future.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
宝山区| 韶关市| 五常市| 桂阳县| 道孚县| 青海省| 东宁县| 宣化县| 丹江口市| 浦县| 灵寿县| 河源市| 宁安市| 鄂托克前旗| 巴彦县| 徐汇区| 镇雄县| 奉贤区| 华安县| 苍溪县| 疏附县| 灌南县| 周宁县| 万宁市| 浦北县| 萨迦县| 濉溪县| 宣威市| 屯门区| 靖州| 沈阳市| 高唐县| 乐至县| 甘德县| 隆林| 江阴市| 库伦旗| 永和县| 鲜城| 潍坊市| 平远县|