找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: International Conference on Innovative Computing and Communications; Proceedings of ICICC Deepak Gupta,Ashish Khanna,Ajay Jaiswal Conferenc

[复制链接]
楼主: 杂技演员
发表于 2025-3-23 11:14:09 | 显示全部楼层
Malware Classification Using Multi-layer Perceptron Model,, loss function and alpha (regularization parameter) are used for training the multi-layer perceptron model to develop the optimal malware classifier. The proposed malware classifier produced an accuracy of 99.2% using the Adam loss function in binary classification of the executable files.
发表于 2025-3-23 17:13:26 | 显示全部楼层
Protocol Random Forest Model to Enhance the Effectiveness of Intrusion Detection Identification,. Three protocol datasets, which represent subsets of the NSL-KDD dataset, are used for the experiment. The finding is sufficient to prove that our protocol random forest (Protocol-RF) model detects the attacks with the highest precision of 0.907 and a low false-positive rate of 0.001.
发表于 2025-3-23 19:48:30 | 显示全部楼层
发表于 2025-3-24 00:39:48 | 显示全部楼层
Conference proceedings 2021ative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications..
发表于 2025-3-24 05:18:35 | 显示全部楼层
Selection of Probabilistic Data Structures for SPV Wallet Filtering,er which has much better ability to perform than bloom filter by means of limited counting, offers deletion algorithm, and also maintains the space complexity at the same time. Cuckoo hashing can be used to resolve collisions and maintain a compressed cuckoo hash table.
发表于 2025-3-24 08:23:47 | 显示全部楼层
A Dummy Location Generation Model for Location Privacy in Vehicular Ad hoc Networks, applications require the access to location of vehicles participating in the network and may lead to life-threatening situations. Hence, a careful solution is required while sharing the credentials including location. In this work, we propose to use the dummy location generation of the vehicles. Th
发表于 2025-3-24 13:56:30 | 显示全部楼层
发表于 2025-3-24 17:48:28 | 显示全部楼层
发表于 2025-3-24 19:44:56 | 显示全部楼层
发表于 2025-3-25 01:03:42 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-8 06:23
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表