Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Zixiao Kong"'
Autor:
Jiachen Yu, Yuting Liu, Yingchun Zhang, Rong Ran, Zixiao Kong, Duoyi Zhao, Minda Liu, Wei Zhao, Yan Cui, Yingqi Hua, Lianbo Gao, Zhiyu Zhang, Yingxin Yang
Publikováno v:
Frontiers in Bioengineering and Biotechnology, Vol 11 (2024)
Introduction: Cancer remains a significant health challenge, with chemotherapy being a critical treatment modality. However, traditional chemotherapy faces limitations due to non-specificity and toxicity. Nanogels, as advanced drug carriers, offer po
Externí odkaz:
https://doaj.org/article/6e99ccd74935444888713ee3446e147b
Publikováno v:
IEEE Access, Vol 7, Pp 143573-143596 (2019)
In the era of cyberspace, malware is the main weapon for launching cyber-attacks and the critical rival for the security community. More and more researchers are investing in the wave of anti-malware research. In order to promote researchers to enter
Externí odkaz:
https://doaj.org/article/222bc52125564f4d8b55438b8a57b31f
Publikováno v:
Electronics; Volume 12; Issue 11; Pages: 2346
Recently, malware detection models based on deep learning have gradually replaced manual analysis as the first line of defense for anti-malware systems. However, it has been shown that these models are vulnerable to a specific class of inputs called
Publikováno v:
Electronics; Volume 12; Issue 7; Pages: 1751
The increasing popularity of Industry 4.0 has led to more and more security risks, and malware adversarial attacks emerge in an endless stream, posing great challenges to user data security and privacy protection. In this paper, we investigate the st
Publikováno v:
Computers & Security. 129:103190
Publikováno v:
Computers & Security. 83:208-233
It is a wide-spread way to detect malware by analyzing its behavioral characteristics based on API call sequences. However, previous studies usually just focus on its static or dynamic API call sequence, while neglecting the correlation between them.
Publikováno v:
Journal of Network and Computer Applications. 125:236-250
To handle the security threat faced by the widespread use of Internet of Things (IoT) devices due to the ever-lasting increase of malware, the security researchers increasingly rely on machine learning techniques based on various static and/or dynami
Publikováno v:
Machine Learning for Cyber Security ISBN: 9783030622220
ML4CS (1)
ML4CS (1)
With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C&C communication has become the most prefe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a99589ade769a34a8cf277bf4905d77a
https://doi.org/10.1007/978-3-030-62223-7_12
https://doi.org/10.1007/978-3-030-62223-7_12
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811534171
With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud computing model has been unable to efficiently
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ffc57872df0f195f71c6f47ce8464a4a
https://doi.org/10.1007/978-981-15-3418-8_6
https://doi.org/10.1007/978-981-15-3418-8_6