Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Zigang Fang"'
Publikováno v:
2020 IEEE International Conference on Progress in Informatics and Computing (PIC).
Although image translation algorithms such as StarGAN, STGAN, StarGAN-v2, etc. based on the generative adversarial networks, bring enormous convenience to people's work and life, they also have greater security risks in terms of privacy and security
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030242671
ICAIS (4)
ICAIS (4)
The private key is the unique credential of the blockchain asset and can be used to sign and authenticate transactions. Losing the private key also loses the control of the account, so the leakage of the private key is one of the major factors affect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ae0f77569dc018d1f6c31626703fa43b
https://doi.org/10.1007/978-3-030-24268-8_50
https://doi.org/10.1007/978-3-030-24268-8_50
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030364045
ADHIP (2)
ADHIP (2)
With the rapid development of Internet of Things (IoT), The IoT terminal are diversified, and the attack points available to attackers are also diversified, and most IoT terminal are more vulnerable to attacks because they are less secure. In order t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e206471bed3ddde6ae0318dd242207d6
https://doi.org/10.1007/978-3-030-36405-2_24
https://doi.org/10.1007/978-3-030-36405-2_24
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811519215
In recent years, as information technology develops, Industrial Internet has become a hot issue in international industry. Because of the use of networked software in Industrial Internet, many machines are software-intensive. But software is a produc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67b431afdeb87f3f33394655b3872cb5
https://doi.org/10.1007/978-981-15-1922-2_40
https://doi.org/10.1007/978-981-15-1922-2_40
Autor:
Huansheng Ning
This two-volume set (CCIS 1137 and CCIS 1138) constitutes the proceedings of the Third International Conference on Cyberspace Data and Intelligence, Cyber DI 2019, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, Cy
This two-volume set LNICST 301 -302 constitutes the post-conference proceedings of the Third EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2019, held in Nanjing, China, in September 2019. The 101 papers presented were
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly call