荣幸 发表于 2025-3-26 23:29:40

Guanbiao Lin,Hu Li,Yingying Zhang,Shiyu Peng,Yufeng Wang,Zhenxin Zhang,Jin Li

植物群 发表于 2025-3-27 02:00:50

Yuhui Huang,Xin Xie,Weiye Ning,Dengquan Wu,Zixi Li,Hao Yang

CLOUT 发表于 2025-3-27 08:32:08

Yusheng Xu,Xinrong Cao,Rong Hu,Pantea Keikhosrokiani,Zuoyong Li

incarcerate 发表于 2025-3-27 09:35:58

http://reply.papertrans.cn/63/6207/620604/620604_34.png

apiary 发表于 2025-3-27 15:17:55

http://reply.papertrans.cn/63/6207/620604/620604_35.png

领巾 发表于 2025-3-27 20:59:56

,Multi-party Secure Comparison of Strings Based on Outsourced Computation, carry out multi-party joint analysis and computation, securely and privately complete the full excavation of data value in the process of circulation, sharing, fusion, and calculation, which has become a popular research topic. String comparison is one of the common operations in data processing. T

expdient 发表于 2025-3-28 00:06:12

http://reply.papertrans.cn/63/6207/620604/620604_37.png

gruelling 发表于 2025-3-28 04:22:26

Overview of DDoS Attack Research Under SDN,ent centralized control, improving network operation efficiency and simplifying network management. However, SDN is vulnerable to Distributed Denial of Service (DDoS) attacks, especially on the control plane, which affects the whole network. In this paper, DDoS attack detection and defense under SDN

bronchodilator 发表于 2025-3-28 10:06:19

A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism,field. However, due to the limitation of traditional convolution operations, Unet cannot realize global semantic information interaction. To address this problem, this paper proposes a deep learning model based on Unet. The proposed model takes the Residual network as the image feature extraction la

知识分子 发表于 2025-3-28 13:58:25

,Performance Improvement of Classification Model Based on Adversarial Sample Generation,r to improve the text filtering ability of the neural network model, it is necessary to make the filtering model learn more bad text feature information, especially the feature information that is not recognized by the filtering model at present. Therefore, having more abundant and diverse high-qual
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Machine Learning for Cyber Security; 4th International Co Yuan Xu,Hongyang Yan,Jin Li Conference proceedings 2023 The Editor(s) (if applica