找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Ubiquitous Security; First International Guojun Wang,Kim-Kwang Raymond Choo,Bruno Crispo Conference proceedings 2022 The Editor(s) (if app

[复制链接]
楼主: FETUS
发表于 2025-3-23 12:08:45 | 显示全部楼层
发表于 2025-3-23 16:23:23 | 显示全部楼层
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks, generalize well for larger topologies with more IoT devices. We also show that when we train different machine learning methods on our dataset, the resulting intrusion detection systems achieve very high performance.
发表于 2025-3-23 19:47:09 | 显示全部楼层
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks,n, speech recognition, and automatic driving. AI security is also becoming a burning problem. Because the deep learning model is usually regarded as a black box, it is susceptible to backdoor attacks that embed hidden patterns to impact the model prediction results. To promote backdoor detection res
发表于 2025-3-23 23:12:03 | 显示全部楼层
发表于 2025-3-24 04:19:23 | 显示全部楼层
发表于 2025-3-24 09:09:29 | 显示全部楼层
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm,algorithm to rank features’ importance and reduce the impact of redundant features. Then, we use density detection algorithms to monitor malicious accounts according to the actual situation and the cooperative behavior of malicious accounts. Finally, we employ neural network algorithms to make secon
发表于 2025-3-24 14:31:29 | 显示全部楼层
发表于 2025-3-24 15:30:51 | 显示全部楼层
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone N The main issues in a surveillance drone network are identification of valid drones, maintaining boundaries and information security along with physical security. To address these issues we are proposing a lightweight and secure drone-to-ground station and drone-to-drone mutual authentication protoc
发表于 2025-3-24 20:02:42 | 显示全部楼层
Smart Search over Encrypted Educational Resources in Cloud Storage,ored in the cloud server in the form of ciphertext for the sake of privacy protection. However, this is against the use of data. Currently, although the search schemes under ciphertext are primarily based on keywords, these schemes fail to reflect the actual needs of users well. Moreover, the qualit
发表于 2025-3-25 01:23:09 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 00:48
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表