Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Jinlong Fei"'
Publikováno v:
Sensors, Vol 24, Iss 4, p 1314 (2024)
Addressing inherent limitations in distinguishing metrics relying solely on Euclidean distance, especially within the context of geo-indistinguishability (Geo-I) as a protection mechanism for location-based service (LBS) privacy, this paper introduce
Externí odkaz:
https://doaj.org/article/7174601f2d0a410f9ed0d8d13326d7f2
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5367 (2023)
Represented by reactive security defense mechanisms, cyber defense possesses a static, reactive, and deterministic nature, with overwhelmingly high costs to defend against ever-changing attackers. To change this situation, researchers have proposed m
Externí odkaz:
https://doaj.org/article/55697721a5d4412aa1bf45128983cbb5
Publikováno v:
IEEE Access, Vol 5, Pp 21954-21961 (2017)
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network. In this paper, we explore how to model an intrusion detection system based on deep learning
Externí odkaz:
https://doaj.org/article/68d19e98ae434c93a173671c5daac7a9
Publikováno v:
Computers, Materials & Continua; 2024, Vol. 79 Issue 2, p2253-2276, 24p
Publikováno v:
Electronics; Volume 12; Issue 12; Pages: 2668
Deep learning has achieved good classification results in the field of traffic classification in recent years due to its good feature representation ability. However, the existing traffic classification technology cannot meet the requirements for the
Publikováno v:
Electronics; Volume 12; Issue 6; Pages: 1344
Over the years, injection vulnerabilities have been at the top of the Open Web Application Security Project Top 10 and are one of the most damaging and widely exploited types of vulnerabilities against web applications. Structured Query Language (SQL
Publikováno v:
2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC).
Publikováno v:
Electronics
Volume 12
Issue 2
Pages: 323
Volume 12
Issue 2
Pages: 323
Existing machine learning-based malware traffic recognition techniques can effectively detect abnormal behaviors in the network. However, almost all of them focus on a closed-set scenario in which the data used for training and testing come from the
Publikováno v:
2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).
Autor:
Chunbing Wu, Jinlong Fei
Publikováno v:
Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence.