找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security with Intelligent Computing and Big-data Services; Sheng-Lung Peng,Shiuh-Jeng Wang,Ming Zhao Conference proceedings 2018 Springer

[复制链接]
楼主: LH941
发表于 2025-3-26 21:32:53 | 显示全部楼层
发表于 2025-3-27 02:55:47 | 显示全部楼层
Writing Security Specification with Things That Flowtual depiction as a supplement to the RFP to clarify requirements more precisely than traditional tools such as natural language, tables, and ad hoc graphs. A case study of an actual government ministry is presented with a model, i.e., diagrams that express how the features and services of PKI would logically operate in the requisite system.
发表于 2025-3-27 09:13:22 | 显示全部楼层
发表于 2025-3-27 09:30:34 | 显示全部楼层
Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Schememous attribute-based encryption schemes. The proposed attack uses an “invalid attribute key” to recover the hidden access structure of a given ciphertext. No information of the master secret key nor private keys are necessary in our attack.
发表于 2025-3-27 15:40:35 | 显示全部楼层
发表于 2025-3-27 21:03:30 | 显示全部楼层
A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor De of data, the information overloading problem has been more severe. On the other hand, traditional personalized recommendation algorithms based on the interaction between “user-item” are not easy to extend to the three dimensional interface of “user-item-tag”. This paper proposes a clustering analy
发表于 2025-3-27 22:30:05 | 显示全部楼层
Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space for low-dimension data the classification results are not satisfying. This paper proposes a classification method based on nearest neighbor representation in feature space, which extends representation-based classification to nonlinear feature space, and also remedies its drawback in low-dimension
发表于 2025-3-28 05:07:29 | 显示全部楼层
A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVMle Positive Basis Vector Matrix (SPBVM), is proposed. Firstly, the complexity of texture features are added to calculate the saliency values, based on the existing salient region detection algorithm. According to the saliency map, the important area of the image is preserved for the subsequent beaut
发表于 2025-3-28 07:34:33 | 显示全部楼层
Compact Cat Swarm Optimization Algorithmcing mode and seeking mode, on the other hands, cCSO inherits the main feature of compact optimization algorithms, a normal probabilistic vector is used to generate new individuals, the mean and the standard deviation of the probabilistic model could lead cats to the searching direction in next step
发表于 2025-3-28 11:31:01 | 显示全部楼层
Copy-Move Forgery Detection Based on Local Gabor Wavelets Patternse processing software. Various methods of digital image forgery exist, such as image splicing, copy-move forgery, and image retouching. Copy-move is one of the typical image forgery methods, in which a part of an image is duplicated and used to replace another part of the same image at a different l
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 05:46
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表