An Improved Cuckoo Search Algorithm and Its Application in Function Optimization

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:UbiSec (2. : 2022 : Zhangjiajie) Ubiquitous security
1. Verfasser: Feng, Songlv (VerfasserIn)
Weitere Verfasser: Cheng, Cuina (VerfasserIn), Mo, Liping (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
CATS: A Serious Game in Industry Towards Stronger Cloud Security 2023 Zhao, Tiange
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning 2023 Yang, Wenti
Vulnerability Detection with Representation Learning 2023 Wang, Zhiqiang
Malware Traffic Classification Based on GAN and BP Neural Networks 2023 Duan, Yun
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications 2023 Louati, Akram
Encryption Proxies in a Confidential Computing Environment 2023 Bouhairi, Mohamad Jamil Al
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization 2023 Li, Yuting
Differentially Private Clustering Algorithm for Mixed Data 2023 Cheng, Kai
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud 2023 Huo, Zhenru
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network 2023 Khan, Saad
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security 2023 Alshaikh, Omar
Support Tool Selection in Digital Forensics Training 2023 Friedl, Sabrina
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM 2023 Gu, Wanyi
A New Signal Packing Algorithm for CAN-FD with Security Consideration 2023 Zheng, Bo
An Adversarial Sample Defense Method Based on Saliency Information 2023 Liu, Shuqi
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning 2023 Ran, Xiaoqian
Approaches for Zero Trust Adoption Based upon Organization Security Level 2023 Alawneh, Muntaha
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication 2023 Tsai, Michael
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection 2023 Carter, John
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing 2023 Akter, Shapna
Alle Artikel auflisten