找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu

[复制链接]
楼主: risky-drinking
发表于 2025-3-26 23:08:17 | 显示全部楼层
Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Cachingrvers of service provider (SP). Dozens of researches show that this problem can be effectively solved by caching contents on the network edge. However, edge caching still faces some challenges. First, cache capacity requirements and dilemma. Most existing edge devices have small storage capacity, wh
发表于 2025-3-27 04:15:33 | 显示全部楼层
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Latti the efficient search of the encrypted data stored in the cloud server and keep the privacy of these data during the search phase. However, there exists an inherent security issue for the typical PEKS schemes that they cannot prevent the inside keywords guessing attack (KGA). Moreover, most PEKS sch
发表于 2025-3-27 05:46:11 | 显示全部楼层
发表于 2025-3-27 09:27:29 | 显示全部楼层
Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks It can generate very high quality face pictures, so it plays a very important role in the field of criminal investigation. But during surveillance, suspects often wear face covers, such as glasses, masks, hats and so on. It may affect the machine’s recognition of the face. The traditional method is
发表于 2025-3-27 16:02:54 | 显示全部楼层
An Efficient Method for Generating Matrices of Quantum Logic Circuitsof quantum gates in the quantum circuit, and then the matrix of the quantum circuit is constructed according to the mapping relationship between the truth table and the matrix. A common method is to generate a matrix by using the topological transformation rules of quantum gates, and then multiply t
发表于 2025-3-27 21:43:35 | 显示全部楼层
发表于 2025-3-27 23:27:08 | 显示全部楼层
A Localization Algorithm Based on Emulating Large Bandwidth with Passive RFID Tagsf low cost, simple deployment and long-distance communication. Most researches use the Received Signal Strength (RSS) of the tag backscattered signal or reference tags to realize localization. Owing to the large fluctuation of RSS and its sensitivity to antenna direction and environment, the localiz
发表于 2025-3-28 04:58:40 | 显示全部楼层
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Networkatency, high reliability, and data security for various application services. The fog computing model newly proposed by researchers in recent years can increase the task processing and data analysis capabilities of network edge devices, so it can reduce the computing load of cloud computing devices
发表于 2025-3-28 07:52:25 | 显示全部楼层
A Research for 2-m Temperature Prediction Based on Machine Learning So this study can be divided into two parts. First of all, contrary to the previous machine learning algorithm with only one machine learning model applied for a vast area, a clustering algorithm is proposed to divide the vast area into multiple areas with different models for forecast correction.
发表于 2025-3-28 11:41:23 | 显示全部楼层
A New Scheme for Essential Proteins Identification in Dynamic Weighted Protein-Protein Interaction Nent. With the development of high-throughput proteomics technology, essential protein recognition has become a hot topic and focus of research, there are many computational methods for essential proteins detecting. However, these existing methods are mostly predicted in static PPI networks, ignoring
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-8 23:57
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表