The world is full of relationships, and graph is the most evident representation for them. With the increasing of data scale, graphs become larger and have encountered a new world of analyzing. What can we learn from ...
详细信息
With the advent of the network era, network security has attracted more and more attention. As the key node in the network, network key devices play an important role in protecting the internal network and ensuring th...
详细信息
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
详细信息
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome...
详细信息
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de...
详细信息
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t...
详细信息
Short text datum, which contains a lot of useful information, could be easily found on a wide variety of self-media platform and social communication tools. on It is significant to use datum mining technology to autom...
详细信息
Event extraction is an important branch of information extraction. It involves two challenging issues: event identification and argument identification. Most approaches of event identification are trigger-based, which...
详细信息
Class imbalance widely occurs in many real-world applications, which affects the recognition of important class to a certain extent. Ensemble methods that combined resampling are effective to alleviate the class imbal...
详细信息
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem...
详细信息
暂无评论