Motion 发表于 2025-3-21 16:41:38

书目名称Artificial Intelligence and Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0162276<br><br>        <br><br>书目名称Artificial Intelligence and Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0162276<br><br>        <br><br>

Neutropenia 发表于 2025-3-21 20:41:51

http://reply.papertrans.cn/17/1623/162276/162276_2.png

MIME 发表于 2025-3-22 02:35:28

http://reply.papertrans.cn/17/1623/162276/162276_3.png

ostracize 发表于 2025-3-22 04:41:11

http://reply.papertrans.cn/17/1623/162276/162276_4.png

linear 发表于 2025-3-22 12:28:20

http://reply.papertrans.cn/17/1623/162276/162276_5.png

Bph773 发表于 2025-3-22 15:54:56

http://reply.papertrans.cn/17/1623/162276/162276_6.png

Banquet 发表于 2025-3-22 17:02:34

A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHEd decryption, and then the partial sharing decryption is proposed. Performance analysis illustrated that the proposed scheme is feasible and the complexity expands. Under the universal composability frame, the proposed protocol is also proved to be semantically secure.

indemnify 发表于 2025-3-22 21:14:18

Conference proceedings 20199 submissions. The papers were organized in topical sections as follows:..Part I: cloud computing;. Part II: artificial intelligence; big data; and cloud computing and security;. Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity;. Part IV: encryption and cybersecurity..

macabre 发表于 2025-3-23 05:24:12

http://reply.papertrans.cn/17/1623/162276/162276_9.png

Integrate 发表于 2025-3-23 06:49:39

https://doi.org/10.1007/1-56898-635-1cture of the application. The samples with low-frequency path are preferably selected during the sample selection phase using simulated annealing and genetic algorithms. The experimental results on the LAVA-M dataset justify the better performance of the proposed GVDM model, which finds more vulnerabilities than other fuzzers with high accuracy.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Artificial Intelligence and Security; 5th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2019 Springer Nat