知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
会议文集
文集名
Artificial Intelligence and Security
会议名
8th International Conference on Artificial Intelligence and Security (ICAIS 2022)
中译名
《第八届国际人工智能与安全会议,卷3》
会议日期
July 15-20, 2022
会议地点
Qinghai, China
出版年
2022
馆藏号
343428
题名
作者
出版年
Research on Offense and Defense of DDos Based on Evolutionary Game Theory
Tengteng Zhao; Wei Zhang; Xiaolong Li; Wenjing Wang; Xu Niu; Hui Guo
2022
A Method of Data Distribution and Traceability Based on Blockchain
Bin Gu; Yunfeng Zou; Dongyang Cai; Huanyu Fan
2022
Data Provenance in Large-Scale Distribution
Yunan Zhu; Wei Che; Chao Shan; Shen Zhao
2022
A Vulnerability Detection Algorithm Based on Transformer Model
Fujin Hou; Kun Zhou; Longbin Li; Yuan Tian; Jie Li; Jian Li
2022
Research on Video Falsity Detection Based on Publisher and Publishing Environment Features
Xvhao Xiao; Xiaojun Li; Junping Yao; Shaochen Li; Bilal Anwar
2022
Intrusion Detection Model Based on KNN-AE-DNN
Hongtao Chen; Shuo Guo; Yanbo Shi; Weixuan Wei; Kaidi Wang
2022
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint Information
Lu Kang; Qingbing Ji; Lvlin Ni; Jiaxin Li
2022
An Efficient Certificate-Based Encryption Scheme Without Random Oracles
Lan Guo; Yang Lu; Qing Miao; Guangao Zu; Zhongqi Wang
2022
A Rational Hierarchical Quantum State Sharing Protocol
Huali Zhang; Bichen Che; Zhao Dou; Hengji Li; Yu Yang; Xiubo Chen; Jian Li
2022
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing
Qiulu Jiang; Wunan Wan; Zhi Qin; Jinquan Zhang; Hui Han; Shibin Zhang; Jinyue Xia
2022
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios
Huailin Pu; Wunan Wan; Zhi Qin; Jinquan Zhang; Qiulu Jiang; Shibin Zhang; Jinyue Xia
2022
Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP
Jing Shi; Mingyang Chen; Jiazheng Jiao
2022
Multi-objective Dual-Route Planning Algorithm for Grid Communication Network
Xiaojun Gou; Shunhui Luo; Liang Xiao
2022
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures
Zhe Li; Zhiwei Sheng; Wunan Wan; Shibin Zhang; Zhi Qin; Jinquan Zhang; Jinyue Xia
2022
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy
Xiao Feng; Yuanzheng Wang; Tengfei Dong; Yingxia Liao; Yixin Zhang; Yi Lin
2022
Deep Learning Network Intrusion Detection Based on Network Traffic
Hanyang Wang; Sirui Zhou; Honglei Li; Juan Hu; Xinran Du; Jinghui Zhou; Yunlong He; Fa Fu; Houqun Yang
2022
A Survey of Consensus Mechanism Based on Reputation Model
Yuanshen Li; Jieren Cheng; Hui Li; Yuming Yuan; Victor S. Sheng
2022
A Survey on Ethereum Illicit Detection
Meng Li
2022
Detect Adversarial Examples by Using Feature Autoencoder
Hongwei Ye; Xiaozhang Liu; Anli Yan; Lang Li; Xiulai Li
2022
Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin Chinese
Firew Tadele; Jianguo Wei; Kiyoshi Honda; Ruiteng Zhang; Wenhao Yang
2022
1
2
3
制造业外文文献服务平台