Zobrazeno 1 - 10
of 2 084
pro vyhledávání: '"Xu Haitao"'
The change of the vibrational energy within a molecule after collisions with another molecule plays an essential role in the evolution of molecular internal energy distributions, which is also the limiting process in the relaxation of the gas towards
Externí odkaz:
http://arxiv.org/abs/2409.08955
Autor:
Niu, Shutong, Wang, Ruoyu, Du, Jun, Yang, Gaobin, Tu, Yanhui, Wu, Siyuan, Qian, Shuangqing, Wu, Huaxin, Xu, Haitao, Zhang, Xueyang, Zhong, Guolong, Yu, Xindi, Chen, Jieru, Wang, Mengzhi, Cai, Di, Gao, Tian, Wan, Genshun, Ma, Feng, Pan, Jia, Gao, Jianqing
This technical report outlines our submission system for the CHiME-8 NOTSOFAR-1 Challenge. The primary difficulty of this challenge is the dataset recorded across various conference rooms, which captures real-world complexities such as high overlap r
Externí odkaz:
http://arxiv.org/abs/2409.02041
Publikováno v:
Di-san junyi daxue xuebao, Vol 43, Iss 7, Pp 655-662 (2021)
Objective To compare the efficacy of percutaneous vertebroplasty (PVP) using polymethyl methacrylate (PMMA)/calcium phosphate cement (CPC) (1∶1) and PMMA alone for osteoporotic vertebral compression fractures (OVCFs). Methods A retrospective case-c
Externí odkaz:
https://doaj.org/article/d4ee2d3999b548f2982cc2c62b5adb63
Publikováno v:
E3S Web of Conferences, Vol 438, p 01023 (2023)
Drilling parameters optimization is very important for practical engineering drilling, and the rationality of the selected optimization mode directly affects the accuracy of the parameters obtained. The maximum bit performance curve which can reflect
Externí odkaz:
https://doaj.org/article/cc2654cba6b84af1a2ac8ca607799c6a
Currently, deep learning successfully applies to code vulnerability detection by learning from code sequences or property graphs. However, sequence-based methods often overlook essential code attributes such as syntax, control flow, and data dependen
Externí odkaz:
http://arxiv.org/abs/2404.14719
Adversarial attacks induce misclassification by introducing subtle perturbations. Recently, diffusion models are applied to the image classifiers to improve adversarial robustness through adversarial training or by purifying adversarial noise. Howeve
Externí odkaz:
http://arxiv.org/abs/2404.08273
Autor:
Li, Zhenyuan, Wei, Yangyang, Shen, Xiangmin, Wang, Lingzhi, Chen, Yan, Xu, Haitao, Ji, Shouling, Zhang, Fan, Hou, Liang, Liu, Wenmao, Zhang, Xuhong, Ying, Jianwei
Recent research in both academia and industry has validated the effectiveness of provenance graph-based detection for advanced cyber attack detection and investigation. However, analyzing large-scale provenance graphs often results in substantial ove
Externí odkaz:
http://arxiv.org/abs/2403.12541
URLs play a crucial role in understanding and categorizing web content, particularly in tasks related to security control and online recommendations. While pre-trained models are currently dominating various fields, the domain of URL analysis still l
Externí odkaz:
http://arxiv.org/abs/2402.11495
In evolving cyber landscapes, the detection of malicious URLs calls for cooperation and knowledge sharing across domains. However, collaboration is often hindered by concerns over privacy and business sensitivities. Federated learning addresses these
Externí odkaz:
http://arxiv.org/abs/2312.03636
Although advancements in machine learning have driven the development of malicious URL detection technology, current techniques still face significant challenges in their capacity to generalize and their resilience against evolving threats. In this p
Externí odkaz:
http://arxiv.org/abs/2312.00508