„Security Computing“
Suchergebnisse
2.343 Treffer
-
Securing SDN controller placement with MuZero and blockchain-based smart contracts
-
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign
-
A text clarification and deep relational reasoning method for Mongolian-Chinese bilingual arbitrary-shaped scene text detection
-
From sound to story: GAS-Saudi’s graph-based solution for audio summarization in the deaf community
-
YOLOv8n-DSDL: A lightweight dual-backbone network with decoupled self-attention for cotton maturity detection
-
GLEM: a global–local enhancement method for fine-grained image recognition with attention erasure and multi-view cropping
-
Integrating LLM-based code optimization with human-like exclusionary reasoning for computational education
-
MWFNet: A multi-level wavelet fusion network for hippocampal subfield segmentation
-
Resilient service function chain initial deployment and dynamic replacement towards 6G networks
-
Underwater acoustic classification across diverse sea environments using adaptive regularization and knowledge encoding
-
A data-driven cost estimation model for agile development based on Kolmogorov-Arnold Networks and AdamW optimization
-
Multi-level fusion with fine-grained alignment for multimodal sentiment analysis
-
Low-light image enhancement method based on retinex theory and dual-tree complex wavelet transform
-
SentiEntityRec: Entity-level sentiment perception graph neural network for news recommendation
-
A dual scheduling framework for task and resource allocation in clouds using deep reinforcement learning
-
Multi-view co-occurrence and dual-modality framework for breast cancer classification
-
Exploring AI and quantum computing synergies in holographic counterpart frameworks for IoT security and privacy
-
A novel transformer-based dual attention architecture for the prediction of financial time series
-
Legal text summarization via judicial syllogism with large language models
-
Conflict evidence combination rule based on multi-dimensional weighted evidence optimization method and its applications in pattern recognition