Zobrazeno 1 - 10
of 333
pro vyhledávání: '"Fang, Binxing"'
Personalized federated learning becomes a hot research topic that can learn a personalized learning model for each client. Existing personalized federated learning models prefer to aggregate similar clients with similar data distribution to improve t
Externí odkaz:
http://arxiv.org/abs/2403.09284
Publikováno v:
Tongxin xuebao, Vol 45, Pp 196-205 (2024)
The resource public key infrastructure (RPKI) deploys a centralized and hierarchical infrastructure for the authorization of IP addresses. It not only enhances the security of the Internet border gateway protocol system, but also introduces centraliz
Externí odkaz:
https://doaj.org/article/adc366ac570a4beeb5c186b4462c13aa
Publikováno v:
Tongxin xuebao, Vol 45, Pp 191-213 (2024)
Anomaly propagation is a non-traditional mode of information dissemination that frequently occurs in today’s online social networks. To fully comprehend the overall process of anomaly propagation in social networks, the anomaly propagation lifecycl
Externí odkaz:
https://doaj.org/article/ee16183102ae42bab6a4d2cecf4388b5
Publikováno v:
中国工程科学, Vol 25, Iss 6, Pp 96-105 (2023)
The rapid development of network attack and defense technologies has posed various challenges to current cybersecurity assurance systems. Therefore, studying a new cybersecurity assurance system has become an urgent need to promote the development of
Externí odkaz:
https://doaj.org/article/b0f2b351751a42298a32a7bef52d500c
Publikováno v:
中国工程科学, Vol 25, Iss 6, Pp 126-136 (2023)
Industrial control system (ICS) is gradually transitioning from being closed and isolated to open and interconnected. The network threats to ICS are becoming highly hidden, strong-confrontation, and cross-domain in nature. Once subjected to cyberatta
Externí odkaz:
https://doaj.org/article/884d6a3b1ef24b889cb99fa26ed46314
Publikováno v:
In Computer Networks June 2024 247
Publikováno v:
In Computers & Security February 2024 137
False information detection on social media is challenging as it commonly requires tedious evidence-collecting but lacks available comparative information. Clues mined from user comments, as the wisdom of crowds, could be of considerable benefit to t
Externí odkaz:
http://arxiv.org/abs/2009.03823
Autor:
Ji, Tiantian, Fang, Binxing, Cui, Xiang, Wang, Zhongru, Diao, Jiawen, Wang, Tian, Yu, Weiqiang
Constructing stealthy malware has gained increasing popularity among cyber attackers to conceal their malicious intent. Nevertheless, the constructed stealthy malware still fails to survive the reverse engineering by security experts. Therefore, this
Externí odkaz:
http://arxiv.org/abs/2008.06163