抗原 发表于 2025-4-1 05:42:07
,Data Leakage with Label Reconstruction in Distributed Learning Environments,solutions revealed that it may lead to information leakage of private data. Attackers are able to reconstruct data via minimizing the difference between shared gradients and fake gradients that are produced by themselves. This is so-called data leakage attack from gradients. We find that, in many camaverick 发表于 2025-4-1 08:14:21
http://reply.papertrans.cn/63/6207/620601/620601_62.png蜡烛 发表于 2025-4-1 11:39:01
Spatio-Temporal Context Modeling for Road Obstacle Detection,atio-temporal context modeling. Firstly, a data-driven spatial context model of the driving scene is constructed with the layouts of the training data. Then, obstacles in the input image are detected via the state-of-the-art object detection algorithms, and the results are combined with the generate贿赂 发表于 2025-4-1 18:13:20
,A Survey of Android Malware Detection Based on Deep Learning,d malware detection. However, the latest Android malware usually uses escape techniques such as code obfuscation, so the traditional machine learning methods gradually become invalid. In recent years, deep learning has been gradually applied in the field of Android malware detection due to its power钢笔记下惩罚 发表于 2025-4-1 20:40:00
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Netw information based on neural network is proposed. Use neural network to generate random key to encrypt vehicle communication network information. Design encryption transmission scheme, including data encryption module, dynamic key generation module and data transmission module. The encrypted transmi