Since the Turing test, creating believable open-domain dialogues has been a basic problem in the study of artificial intelligence. Achieving success with dialogue models can greatly improve natural human-computer inte...
详细信息
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing *** address these issues,this paper proposes LRChain,a method based on consor...
详细信息
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing *** address these issues,this paper proposes LRChain,a method based on consortium blockchain,for lifelong learning archives data protection and *** employs a combination of on-chain and off-chain cooperative storage using a consortium chain and inter planetary file system(IPFS)to enhance data security and *** also enables fine-grained verification of learning archives through selective disclosure principles,ensuring privacy protection of sensitive ***,an attributebased encryption(ABE)algorithm is utilized to establish authorized access control for learning archives,facilitating safe and trusted *** evaluations and security analyses demonstrate that this method exhibits decentralization,strong security,tamper resistance,and performs well,effectively meeting the requirements for secure sharing of learning archive data.
The authentication mechanism of the Internet of things (IoT) control system is an important research field. This paper aims to give an appropriate authentication mechanism of IoT control system. It analyzes the pros a...
详细信息
The design of feature set is a basic research direction of anomaly detection technology. The characterization ability of feature set directly affects the accuracy and generalization ability of intrusion detection algo...
详细信息
In a large-scale network environment, the Internet has produced an amount of digital information such as social media, e-commercial comments, online shopping records and advertising click logs. So, recommend systems n...
详细信息
ISBN:
(纸本)9781849199285
In a large-scale network environment, the Internet has produced an amount of digital information such as social media, e-commercial comments, online shopping records and advertising click logs. So, recommend systems not only furnish users with satisfied requirements but also bring about healthy profit to companies. To cope with massive data, we proposed an effective recommend system (ERS) for modelling abundant history data. Firstly, we advise a new data split strategy to make the recommend system fit for large scale advertising. Then, a distributed-recommendation algorithm is designed. Finally, we apply ERS and distributedcomputing and storage tools (such as Spark, Hadoop, etc.) to model history data aiming at improving the system efficiency. In this paper, we also compare and analyse diverse performances of ERS including its efficiency and its accuracy.
Aiming at the problem that single protection technology is difficult to meet the needs of network security, the rationality and accuracy of situation assessment index are poor, the multi-source and multi-dimensional n...
详细信息
On-board sensors are utilized for monitoring and collecting a diverse range of data pertaining to the vehicle and its surroundings. However, in the field of Internet of Vehicles, security threats encountered by vehicl...
详细信息
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b...
ISBN:
(数字)9781728195582
ISBN:
(纸本)9781728195599
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to build hand-crafted patterns for extraction, which is easy to cause error propagation and affect the accuracy of extraction. In this paper, we propose an end-to-end abstract Chinese Open RE model based on the Pointer-Generator network, PGCORE. We employ the results extracted by the state-of-the-art pattern-based Chinese Open RE system as the training set of the model. Experimental results show that our method is outperforms the pattern-based several baselines system, which proves the feasibility and effectiveness of using deep learning models for Chinese Open RE.
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on MD5 and time which can effectively prevent the deception in data transm...
详细信息
ISBN:
(纸本)9781849199285
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on MD5 and time which can effectively prevent the deception in data transmission. The method uses the traditional MD5 algorithm to encrypt and validate important data, then verifying the validity and legitimacy of the data by using time.
The investment on the stock market is prone to be affected by the Internet. For the purpose of improving the prediction accuracy, we propose a multi-task stock prediction model that not only considers the stock correl...
详细信息
暂无评论