Euthyroid 发表于 2025-3-28 15:26:46

https://doi.org/10.1007/978-981-19-0197-3identify network attacks has been one of the research hotspots in the field of network security protection in recent years. But they have some limitations, such as model parameters are difficult to optimize, and the prediction accuracy rate is low. Also, the characteristics of time series uncertaint

滴注 发表于 2025-3-28 18:47:17

https://doi.org/10.1007/978-981-19-0197-3y, the convolutional network method is applied to data recognition, and the recognition method of the abnormal data in the local area network common channel based on the convolutional neural network is studied. First, the convolutional neural network structure is analyzed and the three main parts of

gerrymander 发表于 2025-3-29 02:08:58

http://reply.papertrans.cn/15/1468/146755/146755_43.png

evasive 发表于 2025-3-29 03:47:12

Niki J. Agnantis,Demetrios A. Spandidoser of malware writers abuse various anti-reverse technologies to hide malware information. In order to protect these malwares, they usually use virtualization, obfuscation, packing, and anti-debugging techniques. These protections hinder the acquisition of malware information, making the reverse ana

画布 发表于 2025-3-29 09:13:42

S. L. Schor,A. M. Schor,A. Howell,J. Haggielly. Due to the growing malware variants, automatic detection and classification of malware samples is inevitable. A long-tailed distribution is one of the most common problems in malware dataset. However, existing general deep learning model is difficult to identify few-shot classes in the case of

肥料 发表于 2025-3-29 12:02:46

http://reply.papertrans.cn/15/1468/146755/146755_46.png

Dysarthria 发表于 2025-3-29 16:55:37

http://reply.papertrans.cn/15/1468/146755/146755_47.png

prolate 发表于 2025-3-29 22:45:53

Barbara Florentine,Juan C. Felix, it is always plagued by information leaks. Some recent researches have pointed out that forward and backward privacy which disallows leakage from update operations should be the basic requirement for a secure SSE scheme. However, most existing forward and backward private SSE schemes only consider

botany 发表于 2025-3-30 03:25:37

http://reply.papertrans.cn/15/1468/146755/146755_49.png

venous-leak 发表于 2025-3-30 05:51:02

http://reply.papertrans.cn/15/1468/146755/146755_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Advances in Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021