发现 发表于 2025-3-28 16:51:53

Ting Zhu,Mustafa Berke Yelten,Michael B. Steer,Paul D. Franzonotocol, and a large number of malwares use DNS protocol as the covert tunnel for remote control. Therefore, it is very important to enhance the detection of DNS covert tunnel. At present, the researches always select closed data set to detect different tunnel tools and can not distinguish the specif

Humble 发表于 2025-3-28 20:50:39

http://reply.papertrans.cn/89/8827/882644/882644_42.png

联想记忆 发表于 2025-3-29 01:57:06

Leifur Leifsson,Slawomir Koziel,Eirikur Jonsson,Stanislav Ogurtsovoyability on ubiquitous applications requiring a high level of security such as driverless system, unmanned aerial vehicle and intrusion detection. In this paper, we propose latent encodings transferring attack (LET-attack) to generate target natural adversarial examples to fool well-trained classif

accomplishment 发表于 2025-3-29 06:11:44

Yi Zhang,Serhat Hosderuate the network robustness, many robustness measures have been presented depending on the type of attacks. These measures mainly concentrate on the relation between the robustness of the network and the number of deleted nodes, and seldom consider the robustness of the network in the scenarios that

性行为放纵者 发表于 2025-3-29 08:05:41

http://reply.papertrans.cn/89/8827/882644/882644_45.png

背信 发表于 2025-3-29 11:53:33

http://reply.papertrans.cn/89/8827/882644/882644_46.png

馆长 发表于 2025-3-29 16:58:53

http://reply.papertrans.cn/89/8827/882644/882644_47.png

不可磨灭 发表于 2025-3-29 22:03:39

http://reply.papertrans.cn/89/8827/882644/882644_48.png

步兵 发表于 2025-3-30 03:33:06

http://reply.papertrans.cn/89/8827/882644/882644_49.png

言外之意 发表于 2025-3-30 06:54:12

http://reply.papertrans.cn/89/8827/882644/882644_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Surrogate-Based Modeling and Optimization; Applications in Engi Slawomir Koziel,Leifur Leifsson Book 2013 Springer Science+Business Media N