inflate 发表于 2025-3-26 22:32:35
A Fraud Detection Approach Based on Combined Feature Weighting. We first introduce the data preprocessing measures for handling imbalanced fraud detection dataset. Then we compare related models to implement fraudster recognition. We also propose a feature selection approach based on combined feature weights. Some future research interests are also envisioned.和蔼 发表于 2025-3-27 02:40:05
Research on Distributed Trust Management in IoTposed trust mechanism, trustrank is quantified by normative trust and risk measures. Performance analysis shows that the proposed trust mechanism has a higher probability of high trust device being selected and higher success rate of cooperation.Ferritin 发表于 2025-3-27 09:01:23
http://reply.papertrans.cn/23/2285/228407/228407_33.pngInflammation 发表于 2025-3-27 09:29:38
A Dual-Index Based Representation for Processing XPath Queries on Very Large XML Documentss remains a challenge in case XML documents are very large. In this study, we implemented a tree-shaped data structure called partial tree that is intrinsically suitable for large XML document processing with multiple computers. Our implementation uses two index sets to accelerate the evaluation ofsleep-spindles 发表于 2025-3-27 14:16:57
IAS-BERT: An Information Gain Association Vector Semi-supervised BERT Model for Sentiment Analysisal Encoder Representations from Transformers (BERT), as one of those models, has achieved excellent results in various tasks of NLP since its emergence. But it still has shortcomings, such as poor capability of extracting local features and exploding of training gradients. After analyzing the shortc宏伟 发表于 2025-3-27 20:17:07
A Concept Lattice Method for Eliminating Redundant Featuresormation from omics genes quickly. Feature selection is an important step of data preprocessing, and it is one of the key factors affecting the capability of algorithm information extraction. Since single feature selection method causes the deviation of feature subsets, we introduce ensemble learnin变形 发表于 2025-3-28 01:43:20
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionome the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external networks. Intrusion detection is a prerequisite to designing anti-intrusion countermeasures of cloudAntioxidant 发表于 2025-3-28 03:28:52
http://reply.papertrans.cn/23/2285/228407/228407_38.pngOrgasm 发表于 2025-3-28 09:34:25
http://reply.papertrans.cn/23/2285/228407/228407_39.png变白 发表于 2025-3-28 13:33:57
Lightweight Anonymous Communication Model Based on Anonymous IBE have a greater demand for privacy. In addition, the development of mobile Internet and cloud computing requires the communication model to be as efficient and low-bandwidth as possible on the basis of security. In order to achieve the goal of protecting users’ data privacy, this paper firstly prese