ELUDE 发表于 2025-3-26 23:32:03

Adversarial Examples Generation System Based on Gradient Shielding of Restricted Regionbility of neural networks. As a result, security of neural networks is drawing more research attention than before and a large number of attack methods have been proposed to generate adversarial examples to evaluate the robustness of neural networks. Furthermore, adversarial examples can be widely a

Outspoken 发表于 2025-3-27 04:17:02

Attribute Value Extraction Based on Rule Matchingta and covers a large amount of false information. How to extract key information from the information published on the Internet is the content of this paper. Since the accuracy of the factual information provided by the encyclopedic text on the Internet is higher than other texts, and for the resum

说不出 发表于 2025-3-27 08:55:06

Research on Automated Vulnerability Mining of Embedded System Firmware is the security issues brought by firmware. The threat posed by firmware vulnerabilities is fatal. Researching firmware vulnerability mining technology is a way to effectively protect embedded systems. However, it’s not easy to move the software’s vulnerability mining methods to firmware. The exist

Cryptic 发表于 2025-3-27 13:14:06

Attacking Naive Bayes Journal Recommendation Systemstness of such systems against malicious attacks has been studied in recent years. In this paper, we build a journal recommendation system based on the Naive Bayesian algorithm which helps recommend suitable journals for the authors. Since journal recommendation systems may also suffer from various a

继而发生 发表于 2025-3-27 14:48:34

Research on Intrusion Detection Technology of Industrial Control Systemsrk technology, industrial control systems are constantly integrating with the Internet, evolving into an open system, which also brings numerous threats to the industrial control systems. As an important security protection technology, many scholars have conducted a lot of research on industrial con

Immortal 发表于 2025-3-27 20:56:55

Resnet-Based Slide Puzzle Captcha Automatic Response Systemoring text captcha, the user experience has been greatly improved, so slide puzzle captcha has gradually replaced the text-based captcha on many large platforms.In this paper, we divided slide puzzle captcha cracking into three steps: identifying the gap position, generating the sliding track, and i

生命 发表于 2025-3-27 23:41:47

http://reply.papertrans.cn/17/1623/162274/162274_37.png

狗舍 发表于 2025-3-28 05:34:51

A General Framework of Smart Contract Vulnerability Mining Based on Control Flow Graph Matchingcreate potential security vulnerabilities and can result in huge economic losses. Therein, detecting potential vulnerabilities in smart contracts plays an important role in maintaining the security of the blockchain. There are a series of schemes work on finding bugs in smart contracts, such as Oyen

scrutiny 发表于 2025-3-28 09:23:27

Placement and Routing Optimization Problem for Service Function Chain: State of Art and Future Oppors can be represented by a service function chain which contains a set of virtualized network functions in a specified order. From the perspective of network performance optimization, the challenges of deploying service chain in network is twofold: 1) the location of placing virtualized network funct

esculent 发表于 2025-3-28 12:22:24

DDoS Attack Detection Based on One-Class SVM in SDN flexible management. However, security problems in SDN are also inevitable. DDoS attack belongs to one of the most serious attack types, which is fairly common for today’s Internet. In SDN security fields, DDoS attack detection research has been received more and more attention. In this paper, a DD
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu