松紧带 发表于 2025-3-28 15:48:13

Smartphone Applications, Malware and Data Theftalicious authors. Analysing applications in order to identify malicious ones is a current major concern in information security; an additional problem connected with smart-phone applications is that their many advertising libraries can lead to loss of personal information. In this paper, we relate t

火海 发表于 2025-3-28 19:13:59

http://reply.papertrans.cn/24/2326/232548/232548_42.png

flaunt 发表于 2025-3-28 23:04:06

Generating a Standardized Upper Ontology for Security of Information and Networksure systems. That in turn necessitates ontologizing security of information and networks to start with and then standardization. Having involved in the fields of semantic technology and information assurance, I have strived to facilitate establishing an interface between them and for this reason SIN

aviator 发表于 2025-3-29 06:16:20

http://reply.papertrans.cn/24/2326/232548/232548_44.png

Ataxia 发表于 2025-3-29 07:32:08

http://reply.papertrans.cn/24/2326/232548/232548_45.png

顾客 发表于 2025-3-29 14:09:12

Kernel Online Multi-task Learningng problem as a single unit and does not incorporate information associated with the tasks that are closely related with it. Such anomalies have been rectified in the Multi-Task learning (MTL) paradigm, where the model learns a modeling problem, by making use of its associated tasks. Such modeling s

airborne 发表于 2025-3-29 17:51:20

Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Leaata applications), human annotators are required to label the data, which is very expensive and time consuming. This aspect is resolved by adopting the Active Learning approach to create labelled data from the available unlabelled data by actively choosing the most appropriate or most informative in

exceed 发表于 2025-3-29 20:43:01

http://reply.papertrans.cn/24/2326/232548/232548_48.png

600 发表于 2025-3-30 03:12:33

http://reply.papertrans.cn/24/2326/232548/232548_49.png

Type-1-Diabetes 发表于 2025-3-30 04:20:20

http://reply.papertrans.cn/24/2326/232548/232548_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3 Muthukrishnan Senthilkumar,Vijayalakshmi Ramasamy