找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Network Security Empowered by Artificial Intelligence; Yingying Chen,Jie Wu,Xiaogang Wang Book 2024 The Editor(s) (if applicable) and The

[复制链接]
楼主: 凶恶的老妇
发表于 2025-3-26 22:07:39 | 显示全部楼层
发表于 2025-3-27 01:36:27 | 显示全部楼层
Deep Learning for Robust and Secure Wireless Communicationsanging from information access to social networking. However, the emergence of numerous wireless applications is driving the demand for spectrum to unprecedented levels. Simultaneously, wireless systems are becoming increasingly software-driven, reducing the barrier for wireless threats such as inte
发表于 2025-3-27 07:54:04 | 显示全部楼层
发表于 2025-3-27 11:57:23 | 显示全部楼层
发表于 2025-3-27 14:03:06 | 显示全部楼层
Localizing Spectrum Offenders Using Crowdsourcing over large areas in order to provide protection to spectrum users. This chapter explores various recent RSS-based localization techniques which use crowdsourced measurements, including path loss models, fingerprinting, and machine learning-based approaches. Our focus is on utilizing convolutional n
发表于 2025-3-27 20:38:19 | 显示全部楼层
发表于 2025-3-28 00:29:49 | 显示全部楼层
Security and Privacy of Augmented Reality Systemsem increasingly popular among mass consumers, in industry, and even in military training. In order to support immersive and realistic user experience, AR systems rely on real-time sensing through various types of sensors to understand the physical environment, make intelligent decisions, and render
发表于 2025-3-28 03:02:00 | 显示全部楼层
Securing Augmented Reality Applicationsalthcare. However, these applications face numerous security challenges, such as data privacy, authentication, and authorization. In this chapter, we explore the use of Artificial Intelligence and Machine Learning techniques to enhance the security of AR applications. We discuss the different securi
发表于 2025-3-28 08:38:20 | 显示全部楼层
On the Robustness of Image-Based Malware Detection Against Adversarial Attacksnstrated in various network-security-oriented applications such as intrusion detection, cyber threat intelligence, vulnerability discovery, and malware detection. Nevertheless, recent research studies have shown that crafted adversarial samples can be used to evade malware detection models. Even tho
发表于 2025-3-28 11:47:16 | 显示全部楼层
The Cost of Privacy: A Comprehensive Analysis of the Security Issues in Federated Learningn extensive model trained in a broader dataset without ever sharing their private data directly. FL combines multiple local models into a global model, thereby diminishing the need for individual participants to have large datasets. This decentralized nature of FL makes it more susceptible to advers
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-16 10:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表