异端邪说下 发表于 2025-3-27 00:29:02

Hybrid Control Strategy for Rumor Spread in Social Networks, single protective strategies, and single blocking strategies. This approach effectively reduces the scale of rumor propagation, offering a robust strategy reference for combating the issue of rumor dissemination.

locus-ceruleus 发表于 2025-3-27 02:53:08

Conference proceedings 2024ovember 2023.. The 85 full papers presented were carefully reviewed and selected from 428 submissions. The papers are clustered in parts on: Artificial Intelligence and Machine Learning; Data Security and information Security; Computer Networks and IoT. The papers present recent research and develop

convert 发表于 2025-3-27 08:43:26

http://reply.papertrans.cn/24/2337/233665/233665_33.png

可耕种 发表于 2025-3-27 12:40:38

http://reply.papertrans.cn/24/2337/233665/233665_34.png

Pandemic 发表于 2025-3-27 16:57:55

Koen Claessen,Nicholas Smallbone,John Hughes of such incidents indicates the seriousness of the personal information leakage problem and the intensification of privacy risks. This paper analyzes data security issues and metrics for privacy protection in Artificial Intelligence, then some recommendation for privacy protection is proposed.

不易燃 发表于 2025-3-27 17:50:05

,Stable Monocular Visual Odometry Based on Optical Flow Matching,osed for filtering key points. Finally, position estimation and scale recovery are performed based on multi-view geometry. Experiments are extensively validated on the KITTI dataset, and the visual odometry method achieves 3.48 (%) translation error and 0.67 rotation error (./100 m) outperforming the baseline DF-VO.

Functional 发表于 2025-3-28 00:18:50

http://reply.papertrans.cn/24/2337/233665/233665_37.png

ALB 发表于 2025-3-28 05:52:47

http://reply.papertrans.cn/24/2337/233665/233665_38.png

Insubordinate 发表于 2025-3-28 06:36:41

,Trust Management as a Service for RFID Based Applications in Edge Enabled Cloud, based application in edge enabled cloud context is proposed. Such a framework can facilitate RFID application developers to evaluate and choose a trustworthy ECS based on their specific QoS requirements. In addition, a trust level evaluation model is proposed, which can effectively evaluates the tr

Contort 发表于 2025-3-28 13:35:43

http://reply.papertrans.cn/24/2337/233665/233665_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Computer Networks and IoT; First International Hai Jin,Yi Pan,Jianfeng Lu Conference proceedings 2024 The Editor(s) (if applicable) and Th