WAG 发表于 2025-3-23 11:50:59

https://doi.org/10.1007/978-981-99-0272-9artificial intelligence; computer security; authentification; computer crime; machine learning; computer

flamboyant 发表于 2025-3-23 15:23:25

Wanyi Gu,Guojun Wang,Peiqiang Li,Xubin Li,Guangxin Zhai,Xiangbin Li,Mingfei Chentrong-coupling problem. Namely it is the QED theory, where the correspondent problem of the “Landau pole” or the “Moscow zero” of the beta-function have led to the well known discussion about the common base of the quantum field theory.

辞职 发表于 2025-3-23 19:10:06

http://reply.papertrans.cn/95/9403/940264/940264_13.png

disrupt 发表于 2025-3-24 02:10:10

http://reply.papertrans.cn/95/9403/940264/940264_14.png

补助 发表于 2025-3-24 05:21:52

http://reply.papertrans.cn/95/9403/940264/940264_15.png

染色体 发表于 2025-3-24 07:22:08

Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNNiLSTM model. Our model determines whether a vulnerability is unknown by detecting the opcode sequence representing the entire execution process of a transaction. Experimental results with the opcode sequences of transactions show that the model can achieve 82.86% accuracy and 83.63% F1-score.

Coma704 发表于 2025-3-24 11:54:24

http://reply.papertrans.cn/95/9403/940264/940264_17.png

iodides 发表于 2025-3-24 17:07:24

Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine inally, we validate the effectiveness of our scheme by three machine learning models, namely the K-Near Neighbor Algorithm (KNN), the Support Vector Machine (SVM), and the Logistic Regression (LR). The SVM model achieves an accuracy of 91.4% and F1-score of 75.3% for the detection of unknown vulnerabilities.

Impugn 发表于 2025-3-24 19:40:58

Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learningper, we combine the subgoal embedding method with REINFORCE algorithm and PPO(Proximal Policy Optimization) algorithm to test the method in the MiniGrid-DoorKey game environment of the gym platform. The experiments demonstrate the effectiveness of the subgoal embedding method.

Epithelium 发表于 2025-3-25 00:59:54

http://reply.papertrans.cn/95/9403/940264/940264_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Ubiquitous Security; Second International Guojun Wang,Kim-Kwang Raymond Choo,Ernesto Damiani Conference proceedings 2023 The Editor(s) (if