火海 发表于 2025-3-23 09:54:49

http://reply.papertrans.cn/29/2845/284456/284456_11.png

不要不诚实 发表于 2025-3-23 16:45:53

http://reply.papertrans.cn/29/2845/284456/284456_12.png

推迟 发表于 2025-3-23 21:05:21

DT-Anon: Decision Tree Target-Driven Anonymizationarn from the anonymized data. The basic idea of our approach is to perform the anonymization process on partitions produced by a decision tree driven by the target of the classification task. Each partition is then independently anonymized, to limit the impact of anonymization on the attributes and

TAG 发表于 2025-3-24 00:45:11

http://reply.papertrans.cn/29/2845/284456/284456_14.png

gregarious 发表于 2025-3-24 02:32:22

http://reply.papertrans.cn/29/2845/284456/284456_15.png

杀虫剂 发表于 2025-3-24 06:33:41

http://reply.papertrans.cn/29/2845/284456/284456_16.png

SIT 发表于 2025-3-24 11:52:03

ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Repoel cybersecurity framework which leverages active learning strategies in conjunction with an LLM. This approach dynamically selects the most informative instances for annotation, thereby achieving comparable performance with a significantly smaller dataset. By prioritizing the annotation of samples

赦免 发表于 2025-3-24 18:29:34

http://reply.papertrans.cn/29/2845/284456/284456_18.png

Presbyopia 发表于 2025-3-24 19:02:18

http://reply.papertrans.cn/29/2845/284456/284456_19.png

推迟 发表于 2025-3-25 01:22:43

http://reply.papertrans.cn/29/2845/284456/284456_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Data and Applications Security and Privacy XXXVIII; 38th Annual IFIP WG Anna Lisa Ferrara,Ram Krishnan Conference proceedings 2024 IFIP In