生命层 发表于 2025-3-30 09:33:43

http://reply.papertrans.cn/67/6629/662895/662895_51.png

Perennial长期的 发表于 2025-3-30 15:43:21

http://reply.papertrans.cn/67/6629/662895/662895_52.png

degradation 发表于 2025-3-30 20:24:34

A Simplified and Effective Solution for Hybrid SDN Network Deploymentted to replace the legacy switches with SDN switches as less as possible to obtain all the link utilizations. Secondly, a new load balancing strategy is proposed to flexibly manage the network and get high performance. Finally, a number of experiments show the effectiveness of the proposed solution.

断断续续 发表于 2025-3-30 22:00:18

http://reply.papertrans.cn/67/6629/662895/662895_54.png

candle 发表于 2025-3-31 01:16:46

A Malware Family Classification Method Based on the Point Cloud Model DGCNNhe point cloud model each malware behavior is mapped to a point in the high-dimensional space. The point cloud model can learn the relationships among these behaviors. The method avoids predetermining the relationships among data, which is more reasonable for malware detection. In addition, we use t

膝盖 发表于 2025-3-31 09:03:22

Accurate Polar Harmonic Transform-Based Watermarking Using Blind Statistical Detectorns are obtained for extracting the watermark bits. Compared with other decoders, the proposed decoder has better performance in terms of watermark robustness. In addition, the proposed watermarking algorithm can effectively resist geometrical attacks and common image processing attacks.

Fortify 发表于 2025-3-31 09:56:25

http://reply.papertrans.cn/67/6629/662895/662895_57.png

conscience 发表于 2025-3-31 14:39:07

Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networkss show that our attack strategy allows to recover the secret scalar value with a single trace from the attacked device and an exhaustive search over a set containing a few hundreds of the sought secret.

结束 发表于 2025-3-31 21:07:20

Deep Cross-Modal Supervised Hashing Based on Joint Semantic Matrixrmation as the supervision information, we can get more comprehensive and accurate search results. A large number of experiments show that the proposed DCSJM model achieves significant improvements in various cross-modal retrieval tasks.

incisive 发表于 2025-4-1 00:57:47

http://reply.papertrans.cn/67/6629/662895/662895_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Network and System Security; 15th International C Min Yang,Chao Chen,Yang Liu Conference proceedings 2021 Springer Nature Switzerland AG 20