標(biāo)題: Titlebook: Machine Learning for Cyber Security; 4th International Co Yuan Xu,Hongyang Yan,Jin Li Conference proceedings 2023 The Editor(s) (if applica [打印本頁(yè)] 作者: IU421 時(shí)間: 2025-3-21 17:36
書(shū)目名稱Machine Learning for Cyber Security影響因子(影響力)
書(shū)目名稱Machine Learning for Cyber Security影響因子(影響力)學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security被引頻次
書(shū)目名稱Machine Learning for Cyber Security被引頻次學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security年度引用
書(shū)目名稱Machine Learning for Cyber Security年度引用學(xué)科排名
書(shū)目名稱Machine Learning for Cyber Security讀者反饋
書(shū)目名稱Machine Learning for Cyber Security讀者反饋學(xué)科排名
作者: botany 時(shí)間: 2025-3-21 23:30
Conference proceedings 2023ng for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.. .The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions..作者: Schlemms-Canal 時(shí)間: 2025-3-22 02:24 作者: 松緊帶 時(shí)間: 2025-3-22 05:25
978-3-031-20098-4The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: cocoon 時(shí)間: 2025-3-22 09:43
Machine Learning for Cyber Security978-3-031-20099-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 橫截,橫斷 時(shí)間: 2025-3-22 15:54 作者: 逃避現(xiàn)實(shí) 時(shí)間: 2025-3-22 17:51
0302-9743 ine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.. .The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions..978-3-031-20098-4978-3-031-20099-1Series ISSN 0作者: Control-Group 時(shí)間: 2025-3-22 21:53
Conference proceedings 2023ng for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.. .The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions..作者: asthma 時(shí)間: 2025-3-23 03:13
,Highway: A Super Pipelined Parallel BFT Consensus Algorithm for?Permissioned Blockchain,ized high-performance BFT consensus algorithm that supports decentralized management. Our algorithm is a state machine replication protocol based on a partial synchrony model. Our approach has an 18.–50. throughput improvement over HotStuff and can reach millions of throughput at 1000 Mbps networks.作者: infarct 時(shí)間: 2025-3-23 05:36
,Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach–Part I,ulated in the bipolar picture fuzzy graph framework, and decision making algorithms are designed to characterize the relationships among attributes. The numerical example is introduced in this paper to show how to handle the MADM problem in terms of bipolar picture graph model.作者: coagulation 時(shí)間: 2025-3-23 12:54
Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province,lar membership functions on corresponding bipolar graph are proposed and a novel algorithm for mountain road traffic accident in specific area is given. We analyze the result and give a reasonable explanation for this phenomenon. Some suggestions for reducing the number of mountain traffic accident are proposed.作者: 檔案 時(shí)間: 2025-3-23 14:06 作者: bourgeois 時(shí)間: 2025-3-23 20:52
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism,ures according to the importance, so as to improve the segmentation accuracy. According to the experiments on two medical image datasets, our method achieved better segmentation performance than other deep learning-based algorithms, which verified the effectiveness and efficiency of our method.作者: 你正派 時(shí)間: 2025-3-23 23:14
,A Textual Adversarial Attack Scheme for?Domain-Specific Models,e beam search to augment the search range to further improve the attack ability. Experiment results, involving multiple victim models, datasets, and baselines, reflect that our attack method realized significant improvements on domain-specific model attack.作者: Blazon 時(shí)間: 2025-3-24 05:18 作者: 現(xiàn)代 時(shí)間: 2025-3-24 08:49
,Semi-supervised Learning with?Nearest-Neighbor Label and?Consistency Regularization,on of the unlabeled data. We compared with several standard semi-supervised learning benchmarks and achieved a competitive performance. For example, we achieved an accuracy of . on CIFAR-10 with 250 labels and . on SVNH with 250 labels. It even achieved . accuracy with only 40 labels data in the CIFAR-10.作者: LATER 時(shí)間: 2025-3-24 14:25 作者: epinephrine 時(shí)間: 2025-3-24 14:52 作者: 能得到 時(shí)間: 2025-3-24 19:32 作者: indicate 時(shí)間: 2025-3-25 01:40 作者: DALLY 時(shí)間: 2025-3-25 05:46 作者: 漫步 時(shí)間: 2025-3-25 09:23
,Extracting Random Secret Key Scheme for?One-Time Pad Under Intelligent Connected Vehicle, numbers from the voltage entropy source. First, we filter the weak periodicity in the voltage signal using wavelet variations. After obtaining the non-periodic voltage signal, we fuse the high voltage time interval with it as a second entropy source to improve the extraction efficiency of the rando作者: archetype 時(shí)間: 2025-3-25 11:39 作者: inundate 時(shí)間: 2025-3-25 16:10
,Dynamic Momentum for?Deep Learning with?Differential Privacy, dynamically set the momentum for DP-SGD to achieve better utility. The results showd that we achieved the new state-of-the-art on MNIST, Fashion-MNIST, CIFAR-10 and Imagenette datasets without any modification of differential-privacy analysis.作者: N防腐劑 時(shí)間: 2025-3-25 21:01 作者: Thymus 時(shí)間: 2025-3-26 01:02 作者: optional 時(shí)間: 2025-3-26 06:07
A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network tection of sensitive information of intangible cultural heritage communication network is realized. The results of comparative experiments show that under the effect of machine learning algorithm, the recognition accuracy of the network host for the sensitive information of intangible cultural herit作者: HARD 時(shí)間: 2025-3-26 08:46
Shu Gong,Gang Huae gestanden sind. Ich erkannte, da? der einstige Lückenbü?er bei liebevoller Behandlung zu einem recht wertvollen Glied in der Gesellschaft seiner literarischen Brüder werden k?nnte und bemühte mich, ihn so rasch als m?glich gesellschaftsf?hig zu machen. Auch der Springer-Verlag zeigte in dankenswer作者: genuine 時(shí)間: 2025-3-26 15:21
Jialiang Dong,Shen Wang,Longfei Wu,Huoyuan Dong,Zhitao Guan作者: coalition 時(shí)間: 2025-3-26 18:20
Guolin Zheng,Zuoyong Li,Wenkai Hu,Haoyi Fan,Fum Yew Ching,Zhaochai Yu,Kaizhi Chen作者: 榮幸 時(shí)間: 2025-3-26 23:29
Guanbiao Lin,Hu Li,Yingying Zhang,Shiyu Peng,Yufeng Wang,Zhenxin Zhang,Jin Li作者: 植物群 時(shí)間: 2025-3-27 02:00
Yuhui Huang,Xin Xie,Weiye Ning,Dengquan Wu,Zixi Li,Hao Yang作者: CLOUT 時(shí)間: 2025-3-27 08:32
Yusheng Xu,Xinrong Cao,Rong Hu,Pantea Keikhosrokiani,Zuoyong Li作者: incarcerate 時(shí)間: 2025-3-27 09:35 作者: apiary 時(shí)間: 2025-3-27 15:17 作者: 領(lǐng)巾 時(shí)間: 2025-3-27 20:59
,Multi-party Secure Comparison of?Strings Based on?Outsourced Computation, carry out multi-party joint analysis and computation, securely and privately complete the full excavation of data value in the process of circulation, sharing, fusion, and calculation, which has become a popular research topic. String comparison is one of the common operations in data processing. T作者: expdient 時(shí)間: 2025-3-28 00:06 作者: gruelling 時(shí)間: 2025-3-28 04:22
Overview of DDoS Attack Research Under SDN,ent centralized control, improving network operation efficiency and simplifying network management. However, SDN is vulnerable to Distributed Denial of Service (DDoS) attacks, especially on the control plane, which affects the whole network. In this paper, DDoS attack detection and defense under SDN作者: bronchodilator 時(shí)間: 2025-3-28 10:06
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism,field. However, due to the limitation of traditional convolution operations, Unet cannot realize global semantic information interaction. To address this problem, this paper proposes a deep learning model based on Unet. The proposed model takes the Residual network as the image feature extraction la作者: 知識(shí)分子 時(shí)間: 2025-3-28 13:58
,Performance Improvement of?Classification Model Based on?Adversarial Sample Generation,r to improve the text filtering ability of the neural network model, it is necessary to make the filtering model learn more bad text feature information, especially the feature information that is not recognized by the filtering model at present. Therefore, having more abundant and diverse high-qual作者: 施魔法 時(shí)間: 2025-3-28 15:08 作者: Phenothiazines 時(shí)間: 2025-3-28 19:44
,Federated Community Detection in?Social Networks,akage remains an area of ongoing and indispensable focus. Therefore, anonymization and differential privacy based community detection methods are proposed to protect the privacy of social network information. However, the above methods cause inevitable accuracy loss in some way, resulting in the low作者: 水槽 時(shí)間: 2025-3-28 23:58 作者: Overthrow 時(shí)間: 2025-3-29 03:16 作者: TATE 時(shí)間: 2025-3-29 08:28
,Extracting Random Secret Key Scheme for?One-Time Pad Under Intelligent Connected Vehicle,d through Bluetooth, WiFi or OBD interfaces, so that attackers can remotely attack vehicles through these channels. Hence we create one-time pads to protect the in-vehicle network. Intelligent connected vehicle (ICV) is an information physical system, thus finding a suitable entropy source from its 作者: Comprise 時(shí)間: 2025-3-29 11:23 作者: Occupation 時(shí)間: 2025-3-29 17:05
,Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach–Part I,o learn the correlation between different attributes, and the graph model is an appropriate tool to analyze it. In this work, the MADM problem is formulated in the bipolar picture fuzzy graph framework, and decision making algorithms are designed to characterize the relationships among attributes. T作者: Etymology 時(shí)間: 2025-3-29 23:30
,Priv-IDS: A Privacy Protection and?Intrusion Detection Framework for?In-Vehicle Network,hicles, integrated with modern communication and network technology, to achieve intelligent information exchange and sharing. As an international standardized communication protocol, controller area network (CAN) plays an important role in vehicle communication. However, due to the CAN is plaintext 作者: Chagrin 時(shí)間: 2025-3-30 01:07 作者: FACT 時(shí)間: 2025-3-30 05:00
An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP,eam anomaly detection models suffer from low detection accuracy and poor generalization performance. Therefore, this paper designs an unsupervised surface anomaly detection model based on attention and atrous spatial pyramid pooling. The proposed model learns anomaly images and their normal reconstr作者: tangle 時(shí)間: 2025-3-30 10:39 作者: 無(wú)聊點(diǎn)好 時(shí)間: 2025-3-30 15:39 作者: adj憂郁的 時(shí)間: 2025-3-30 16:46 作者: 膠狀 時(shí)間: 2025-3-30 23:20
8樓作者: 遺傳學(xué) 時(shí)間: 2025-3-31 01:47
8樓作者: 使苦惱 時(shí)間: 2025-3-31 07:12
8樓作者: 裙帶關(guān)系 時(shí)間: 2025-3-31 09:41
9樓作者: Distribution 時(shí)間: 2025-3-31 14:14
9樓作者: 縮短 時(shí)間: 2025-3-31 19:46
9樓作者: 吞沒(méi) 時(shí)間: 2025-4-1 00:37
9樓作者: 泄露 時(shí)間: 2025-4-1 04:09
10樓作者: curettage 時(shí)間: 2025-4-1 06:08
10樓作者: Minuet 時(shí)間: 2025-4-1 10:18
10樓作者: LUT 時(shí)間: 2025-4-1 16:08
10樓