找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cloud Computing; 10th EAI Internation Lianyong Qi,Mohammad R. Khosravi,Varun G. Menon Conference proceedings 2021 ICST Institute for Comput

[复制链接]
楼主: T-Lymphocyte
发表于 2025-3-26 22:32:35 | 显示全部楼层
A Fraud Detection Approach Based on Combined Feature Weighting. We first introduce the data preprocessing measures for handling imbalanced fraud detection dataset. Then we compare related models to implement fraudster recognition. We also propose a feature selection approach based on combined feature weights. Some future research interests are also envisioned.
发表于 2025-3-27 02:40:05 | 显示全部楼层
Research on Distributed Trust Management in IoTposed trust mechanism, trustrank is quantified by normative trust and risk measures. Performance analysis shows that the proposed trust mechanism has a higher probability of high trust device being selected and higher success rate of cooperation.
发表于 2025-3-27 09:01:23 | 显示全部楼层
发表于 2025-3-27 09:29:38 | 显示全部楼层
A Dual-Index Based Representation for Processing XPath Queries on Very Large XML Documentss remains a challenge in case XML documents are very large. In this study, we implemented a tree-shaped data structure called partial tree that is intrinsically suitable for large XML document processing with multiple computers. Our implementation uses two index sets to accelerate the evaluation of
发表于 2025-3-27 14:16:57 | 显示全部楼层
IAS-BERT: An Information Gain Association Vector Semi-supervised BERT Model for Sentiment Analysisal Encoder Representations from Transformers (BERT), as one of those models, has achieved excellent results in various tasks of NLP since its emergence. But it still has shortcomings, such as poor capability of extracting local features and exploding of training gradients. After analyzing the shortc
发表于 2025-3-27 20:17:07 | 显示全部楼层
A Concept Lattice Method for Eliminating Redundant Featuresormation from omics genes quickly. Feature selection is an important step of data preprocessing, and it is one of the key factors affecting the capability of algorithm information extraction. Since single feature selection method causes the deviation of feature subsets, we introduce ensemble learnin
发表于 2025-3-28 01:43:20 | 显示全部楼层
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detectionome the targets of malicious attacks or hackers due to the centralization of data storage and computing facilities. Most intrusion attacks to cloud servers are often originated from inner or external networks. Intrusion detection is a prerequisite to designing anti-intrusion countermeasures of cloud
发表于 2025-3-28 03:28:52 | 显示全部楼层
发表于 2025-3-28 09:34:25 | 显示全部楼层
发表于 2025-3-28 13:33:57 | 显示全部楼层
Lightweight Anonymous Communication Model Based on Anonymous IBE have a greater demand for privacy. In addition, the development of mobile Internet and cloud computing requires the communication model to be as efficient and low-bandwidth as possible on the basis of security. In order to achieve the goal of protecting users’ data privacy, this paper firstly prese
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-26 07:48
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表