Bunion 发表于 2025-3-21 19:53:04

书目名称Emerging Information Security and Applications影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0308272<br><br>        <br><br>书目名称Emerging Information Security and Applications读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0308272<br><br>        <br><br>

食物 发表于 2025-3-21 23:40:40

Nachhaltiges Planen, Bauen und Wohnen federated training to overcome the data silos issue. In addition, we leverage a homomorphic cryptosystem and the Schnorr signature algorithm to ensure the security and integrity of local model parameters. Security analysis and experimental results show that the proposed scheme can not only protect

莎草 发表于 2025-3-22 01:55:01

http://reply.papertrans.cn/31/3083/308272/308272_3.png

Dorsal 发表于 2025-3-22 06:50:05

http://reply.papertrans.cn/31/3083/308272/308272_4.png

invulnerable 发表于 2025-3-22 11:32:48

Andreas Georg Scherer,Guido Palazzockets in bypassing machine learning detection techniques. We then propose a voting ensemble method to improve adversarial attack detection. The voting ensemble proposed increases the accuracy of adversarial detection, providing a new level of protection against adversarial example attacks.

晚来的提名 发表于 2025-3-22 15:44:37

http://reply.papertrans.cn/31/3083/308272/308272_6.png

晚来的提名 发表于 2025-3-22 19:31:16

,Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step Method,st step, we generate audio-dependent (individual) perturbations for each target example. In the second phase, we aggregate the generated perturbations and fine-turn them into UAPs. By this strategy, we can optimize the desired UAPs at an ideal starting point, resulting in a remarkably efficient. Exp

乐章 发表于 2025-3-22 22:14:38

http://reply.papertrans.cn/31/3083/308272/308272_8.png

faculty 发表于 2025-3-23 01:38:21

,Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge,f two objectives, we propose a novel framework that disentangle the original NER labels into two additional training labels for entity segmentation and entity classification respectively. Then we introduce two dedicated expert models to effectively extract specific knowledge from the disentangled la

LATHE 发表于 2025-3-23 06:37:27

,Chinese Named Entity Recognition Within the Electric Power Domain,t. Results demonstrate that the proposed model outperforms both the BiLSTM-CRF model and the BERT-softmax model in NER tasks across the electrical power domain and various other domains. This study contributes to the advancement of NER applications in the electrical power domain and holds significan
页: [1] 2 3 4 5
查看完整版本: Titlebook: Emerging Information Security and Applications; 4th International Co Jun Shao,Sokratis K. Katsikas,Weizhi Meng Conference proceedings 2024