Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and culture of the whole society. The information revolution has changed the way of …
Q Wang, Y Gao, J Ren, B Zhang - Computers & Security, 2023 - Elsevier
To address the problem that the traditional vectored representation of software vulnerability data has high-dimensional sparsity and leads to unsatisfactory automatic classification, this …
Data-driven public security networking and computer systems are always under threat from malicious codes known as malware; therefore, a large amount of research and development …
P Zhao, Z Fan, Z Cao, X Li - International Journal of Information …, 2022 - igi-global.com
In order to improve the ability to detect network attacks, traditional intrusion detection models often used convolutional neural networks to encode spatial information or recurrent neural …
H Yin, M Xue, Y Xiao, K Xia, G Yu - IEEE Access, 2019 - ieeexplore.ieee.org
Edge computing extends traditional cloud services to the edge of the network, and the highly dynamic and heterogeneous environment at the edge of the network makes the network …
Y Li, F Liu, Z Du, D Zhang - Algorithms, 2018 - mdpi.com
In the malware detection process, obfuscated malicious codes cannot be efficiently and accurately detected solely in the dynamic or static feature space. Aiming at this problem, an …
M Fan, T Liu, J Liu, X Luo, L Yu… - Scientia Sinica …, 2020 - research.polyu.edu.hk
Android has become the most popular mobile operating system in the past ten years due to its three main advantages, namely, the openness of source code, richness of hardware …