Cacophonous 发表于 2025-3-26 21:47:16

http://reply.papertrans.cn/25/2418/241772/241772_31.png

新字 发表于 2025-3-27 01:42:45

,Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel,ext year. Prediction is performed by training various machine learning algorithms, such as AdaBoost, XGBoost, Random Forest, Logistic Regression, and Info-Fuzzy Network. The models are induced using a combination of seismic indicators used in the earthquake literature as well as various time-series

侵略主义 发表于 2025-3-27 05:20:43

A Bag of Tokens Neural Network to Predict Webpage Age,es. To improve the efficiency of (automated) penetration testers, we invent a machine learning method that predicts the age of a webpage. An HTML-specific tokenizer is trained and used to tokenize HTML bodies, which are then transformed into binary vector encodings (a “bag of tokens”). We train a Mu

aggravate 发表于 2025-3-27 10:15:11

,Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutationsad obtained the distributions of the correlations between linear input and output combiners of uniform random functions and uniform random permutations. The present work generalises these results to obtain the distributions of the correlations between arbitrary input and output combiners of uniform

Flagging 发表于 2025-3-27 13:37:27

http://reply.papertrans.cn/25/2418/241772/241772_35.png

scoliosis 发表于 2025-3-27 19:41:50

Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO, resource sharing to access the wireless shared channel for uplink communication with the base station (BS) becomes daunting. To address this issue, we devise and study a . multiple-access protocol for massive multiple-input-multiple-output (MIMO) systems, based on sparse coding techniques originate

衣服 发表于 2025-3-27 22:54:17

The Use of Performance-Countersto Perform Side-Channel Attacks,m and the user that uses it; thus, they have the potential to become a major privacy threat. This work shows that performance traces, achieved with performance counters, are sufficient for three efficient privacy attacks on a computer. The first attack allows the identification of webpages the user

火花 发表于 2025-3-28 04:14:15

http://reply.papertrans.cn/25/2418/241772/241772_38.png

值得赞赏 发表于 2025-3-28 07:09:34

Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks,el approach to graphical password (GP) schemes that utilize a dual-view technology known as the global precedence effect, which eliminates the need for external devices and makes the grid and pattern invisible to potential shoulder surfers. The usability of Hollow-Pass was evaluated through an onlin

constitutional 发表于 2025-3-28 11:35:48

,Practical Improvements on BKZ Algorithm, BKZ algorithm is the most efficient way to solve them. In this paper, we give four further improvements on BKZ algorithm, which can be used for SVP subroutines based on enumeration and sieving. These improvements in combination provide a speed-up of . in total. So all the lattice-based NIST PQC can
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Cyber Security, Cryptology, and Machine Learning; 7th International Sy Shlomi Dolev,Ehud Gudes,Pascal Paillier Conference proceedings 2023