找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Artificial Intelligence and Security; 7th International Co Xingming Sun,Xiaorui Zhang,Elisa Bertino Conference proceedings 2021 Springer Na

[复制链接]
楼主: Hemochromatosis
发表于 2025-3-25 04:54:12 | 显示全部楼层
Research and Implementation of Dimension Reduction Algorithm in Big Data Analysiss a burden on our calculation and information acquisition. Especially in the fields of data analysis and prediction, it is about that for us to obtain the target data efficiently. Big data analysis is a technique for quickly and efficiently extracting information from multiple types of data. The dim
发表于 2025-3-25 11:25:56 | 显示全部楼层
发表于 2025-3-25 14:23:57 | 显示全部楼层
Research and Implementation of Anomaly Detection Algorithm in Data Miningrom the normal behavior pattern. In this paper, the KNN (k-Nearest Neighbor) algorithm, the Local Outlier Factor algorithm, and the Isolation Forest algorithm will be used to process the MIT-BIH arrhythmia data set. The KNN algorithm is an Anomaly detection algorithm based on distance but may divide
发表于 2025-3-25 18:19:14 | 显示全部楼层
发表于 2025-3-25 23:29:18 | 显示全部楼层
发表于 2025-3-26 04:08:59 | 显示全部楼层
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Rankinguld be encrypted before outsourcing to the cloud storage. However, the retrieval of the encrypted data is currently a crucial issue of medical big data security. The existing searchable encryption methods can hardly satisfy the goals of fuzzy multi-keywords search, relevance ranking, access pattern
发表于 2025-3-26 08:22:19 | 显示全部楼层
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Clwidespread attention. To enhance the isolation of containers, cloud service providers usually run containers in different virtual machines. In this environment, in-container security tools can be detected or attacked by in-container attackers, and in-VM security tools face the risk of container esca
发表于 2025-3-26 11:12:09 | 显示全部楼层
A Computing Task Offloading Scheme for Mobile Edge Computinge quality by formulating reasonable task offloading strategies. As the number of edge users increases, the energy consumption and energy cost of the MEC are also increasing. Therefore, we investigated the task offloading problem in MEC, and proposed a computational task offloading scheme based on im
发表于 2025-3-26 13:33:04 | 显示全部楼层
Security Transmission Scheme of Sensitive Data for Mobile Terminall the entire process of the generation, transmission and use of user-sensitive data within the Android system. In order to achieve resource sharing and data transmission between different applications and processes, the Android system provides a mechanism for inter-process communication based on Bin
发表于 2025-3-26 19:48:48 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-19 18:55
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表