Results 21 to 30 of about 7,894,693 (380)
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu+4 more
doaj +1 more source
Early warning algorithm for highly sensitive network information based on deep neural network
In order to solve the problem that the traditional sensitive information early warning algorithm is difficult to cluster information effectively, a new sensitive information early warning algorithm is proposed.
Ying TONG+4 more
doaj +1 more source
Design of data leakage prevention model of virtual network ciphertext data for private cloud
In order to create a more secure network ciphertext transmission environment and avoid the leakage of network data information, an improved design of network ciphertext data leakage prevention model was proposed.
TONG Ying+4 more
doaj +1 more source
Wireless Network Security [PDF]
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks.
Yang Xiao+4 more
openaire +3 more sources
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li+4 more
doaj +1 more source
Generating Chinese Event Extraction Method Based on ChatGPT and Prompt Learning
Regarding the scarcity of annotated data for existing event extraction tasks and the insufficient semantic mining of event extraction models in the Chinese domain, this paper proposes a generative joint event extraction model to improve existing models ...
Jianxun Chen, Peng Chen, Xuxu Wu
doaj +1 more source
Composite Metrics for Network Security Analysis [PDF]
Security metrics present the security level of a system or a network in both qualitative and quantitative ways. In general, security metrics are used to assess the security level of a system and to achieve security goals. There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that are ...
arxiv +1 more source
MLNet: a multi-level multimodal named entity recognition architecture
In the field of human–computer interaction, accurate identification of talking objects can help robots to accomplish subsequent tasks such as decision-making or recommendation; therefore, object determination is of great interest as a pre-requisite task.
Hanming Zhai+4 more
doaj +1 more source
Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li+6 more
doaj +1 more source