找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu

[复制链接]
楼主: 去是公开
发表于 2025-3-26 23:32:03 | 显示全部楼层
Adversarial Examples Generation System Based on Gradient Shielding of Restricted Regionbility of neural networks. As a result, security of neural networks is drawing more research attention than before and a large number of attack methods have been proposed to generate adversarial examples to evaluate the robustness of neural networks. Furthermore, adversarial examples can be widely a
发表于 2025-3-27 04:17:02 | 显示全部楼层
Attribute Value Extraction Based on Rule Matchingta and covers a large amount of false information. How to extract key information from the information published on the Internet is the content of this paper. Since the accuracy of the factual information provided by the encyclopedic text on the Internet is higher than other texts, and for the resum
发表于 2025-3-27 08:55:06 | 显示全部楼层
Research on Automated Vulnerability Mining of Embedded System Firmware is the security issues brought by firmware. The threat posed by firmware vulnerabilities is fatal. Researching firmware vulnerability mining technology is a way to effectively protect embedded systems. However, it’s not easy to move the software’s vulnerability mining methods to firmware. The exist
发表于 2025-3-27 13:14:06 | 显示全部楼层
Attacking Naive Bayes Journal Recommendation Systemstness of such systems against malicious attacks has been studied in recent years. In this paper, we build a journal recommendation system based on the Naive Bayesian algorithm which helps recommend suitable journals for the authors. Since journal recommendation systems may also suffer from various a
发表于 2025-3-27 14:48:34 | 显示全部楼层
Research on Intrusion Detection Technology of Industrial Control Systemsrk technology, industrial control systems are constantly integrating with the Internet, evolving into an open system, which also brings numerous threats to the industrial control systems. As an important security protection technology, many scholars have conducted a lot of research on industrial con
发表于 2025-3-27 20:56:55 | 显示全部楼层
Resnet-Based Slide Puzzle Captcha Automatic Response Systemoring text captcha, the user experience has been greatly improved, so slide puzzle captcha has gradually replaced the text-based captcha on many large platforms.In this paper, we divided slide puzzle captcha cracking into three steps: identifying the gap position, generating the sliding track, and i
发表于 2025-3-27 23:41:47 | 显示全部楼层
发表于 2025-3-28 05:34:51 | 显示全部楼层
A General Framework of Smart Contract Vulnerability Mining Based on Control Flow Graph Matchingcreate potential security vulnerabilities and can result in huge economic losses. Therein, detecting potential vulnerabilities in smart contracts plays an important role in maintaining the security of the blockchain. There are a series of schemes work on finding bugs in smart contracts, such as Oyen
发表于 2025-3-28 09:23:27 | 显示全部楼层
Placement and Routing Optimization Problem for Service Function Chain: State of Art and Future Oppors can be represented by a service function chain which contains a set of virtualized network functions in a specified order. From the perspective of network performance optimization, the challenges of deploying service chain in network is twofold: 1) the location of placing virtualized network funct
发表于 2025-3-28 12:22:24 | 显示全部楼层
DDoS Attack Detection Based on One-Class SVM in SDN flexible management. However, security problems in SDN are also inevitable. DDoS attack belongs to one of the most serious attack types, which is fairly common for today’s Internet. In SDN security fields, DDoS attack detection research has been received more and more attention. In this paper, a DD
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 12:48
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表