supported in part by the National Social Science Foundation of China under Grant 20BTQ058;in part by the Natural Science Foundation of Hunan Province under Grant 2023JJ50033.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed training.Nonetheless,the open system architecture inherent to federated learning syst...
近日,东南大学计算机与科学工程学院白如帆在人工智能领域国际期刊《Artificial Intelligence》(AIJ,CCF A)上发表题为“On the Computation of Mixed Strategies for Security Games with General Defending Requirements”的论文,介...
support from the National Natural Science Foundation of China(32302370 to P.W.);USDA NIFA(grant 2020-67013-31615 to P.H.).
In plant immunity,a well-orchestrated cascade is initiated by the dimerization of receptor-like kinases(RLKs),followed by the phosphorylation of receptor-like cytoplasmic kinases(RLCKs)and subsequent activation of NAD...
supported by the Philosophy and Social Science Foundation of Hunan Province(Grant Number 21YBQ005).
Objectives:This study investigates the association between victimization experience and the tendency to defend on behalf of victims during school bullying incidents in public settings,with a focus on the mediating eff...
All humans areborn small,weak and completely dependent on others,and it takes years for them to become self-reliant.This means that children rely on adultsto provide for them and protect them,and they face great dange...
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers c...
supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MEST)No.2015R1A3A2031159,2016R1A5A1008055.
Existing web-based security applications have failed in many situations due to the great intelligence of attackers.Among web applications,Cross-Site Scripting(XSS)is one of the dangerous assaults experienced while mod...
Project supported by the National Natural Science Foundation of China(No.62072024);the Outstanding Youth Program of Beijing University of Civil Engineering and Architecture,China(No.JDJQ20220805);the Shenzhen Stability Support General Project(Type A),China(No.20200826104014001)。
Low-rank matrix decomposition with first-order total variation(TV)regularization exhibits excellent performance in exploration of image structure.Taking advantage of its excellent performance in image denoising,we app...
funded by Institutional Fund Projects under Grant No.(IFPIP:329-611-1443);the technical and financial support provided by the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
Face verification systems are critical in a wide range of applications,such as security systems and biometric authentication.However,these systems are vulnerable to adversarial attacks,which can significantly compromi...
a phased result of the important project“A Research of General Secretary Xi Jinping’s Important Statement on Respecting and Safeguarding Human Rights”(No.228ZD004);supported by National Social Science Fund of China;the SWUPL student scientific research innovation project of 2021(No.2021XZXS-070)。
To defend the explanatory power of the choice theory of rights,choice theorists have put forward the impossibility theorem,the proposition of moral priority,and the redundancy theory of rights to deny the existence of...