招致 发表于 2025-3-30 09:53:12

http://reply.papertrans.cn/63/6207/620603/620603_51.png

comely 发表于 2025-3-30 16:05:45

http://reply.papertrans.cn/63/6207/620603/620603_52.png

ACE-inhibitor 发表于 2025-3-30 19:39:07

An Enumeration-Like Vector Sampling Method for Solving Approximate SVP,r, we propose a lattice vector sampling method for solving approximate SVP. Firstly, we apply enumeration techniques into vector sampling using natural number’s representation (NNR), enlightened by discrete pruning. Secondly, to find optimal parameters for the enumeration-like sampling method, we st

Mercurial 发表于 2025-3-31 00:40:34

Secure Multiparty Learning from Aggregation of Locally Trained Models,e-encryption and aggregate signature techniques. In our scheme, we utilize the method of secure verifiable computation delegation to privately generate labels for auxiliary unlabeled public data. Based on the labeled dataset, a central entity can learn a global learning model without direct access t

Mangle 发表于 2025-3-31 01:04:05

http://reply.papertrans.cn/63/6207/620603/620603_55.png

捐助 发表于 2025-3-31 07:03:28

http://reply.papertrans.cn/63/6207/620603/620603_56.png

一大群 发表于 2025-3-31 12:00:30

Content Recognition of Network Traffic Using Wavelet Transform and CNN,o on. Traffic identification plays an important role in network management, security defense and performance optimization. Traditionally, the network traffic analysis focuses on the protocol identification and application classification, which has been well studied in the past two decades. However,

BATE 发表于 2025-3-31 14:05:58

Compositional Information Flow Verification for Inter Application Communications in Android System,re challenges to information flow security. When data is transferred and processed, the diversity of different security mechanisms in various apps make data more vulnerable to leakage. Although there are several analysis approaches on security verification on inter-component information flow, repeti

compassion 发表于 2025-3-31 17:55:43

http://reply.papertrans.cn/63/6207/620603/620603_59.png

到婚嫁年龄 发表于 2025-4-1 01:26:36

http://reply.papertrans.cn/63/6207/620603/620603_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Machine Learning for Cyber Security; Second International Xiaofeng Chen,Xinyi Huang,Jun Zhang Conference proceedings 2019 Springer Nature S