连锁 发表于 2025-3-27 00:48:14

http://reply.papertrans.cn/28/2794/279326/279326_31.png

有效 发表于 2025-3-27 02:55:52

Wei Wang,Francesco Di Maio,Enrico Zioper proposes an information hiding algorithm based on multi-carrier fusion state partitioning of 3D models. Firstly, multiple three-dimensional vectors to be hidden are fused according to the radial distance between the center of each model and the inner tangential sphere, and then the inner tangent

Promotion 发表于 2025-3-27 08:37:57

Latin American Integration: A Brazilian Viewhrough data poisoning, which requires the attacker to have access to higher-level model training and can be easily exposed. However, vulnerabilities in code management for deep learning training make the code itself an extremely susceptible target for attacks. based on this, we propose a novel form

里程碑 发表于 2025-3-27 10:00:56

http://reply.papertrans.cn/28/2794/279326/279326_34.png

掺假 发表于 2025-3-27 15:11:31

http://reply.papertrans.cn/28/2794/279326/279326_35.png

MUTE 发表于 2025-3-27 20:50:51

http://reply.papertrans.cn/28/2794/279326/279326_36.png

wall-stress 发表于 2025-3-28 00:58:30

http://reply.papertrans.cn/28/2794/279326/279326_37.png

漂亮 发表于 2025-3-28 06:10:02

https://doi.org/10.1007/978-981-99-7996-7oncern for public security management recently. To combat massive cybercrime and conduct a clean Internet environment, graph-based semi-supervised cybercrime detection (GSCD) has gained increasing popularity recently for it can model complex relationships between network objects and provide node-lev

巨硕 发表于 2025-3-28 08:08:36

http://reply.papertrans.cn/28/2794/279326/279326_39.png

肉体 发表于 2025-3-28 14:18:01

http://reply.papertrans.cn/28/2794/279326/279326_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; 14th EAI Internation Sanjay Goel,Paulo Roberto Nunes de Souza Conference proceedings 2024 ICST Institute