您当前的位置:
首页 >
文章列表页 >
Application of artificial intelligence technology in the field of security vulnerability
Artificial Intelligence and Network Security | 更新时间:2024-06-05
    • Application of artificial intelligence technology in the field of security vulnerability

    • Journal on Communications   Vol. 39, Issue 8, Pages: 1-17(2018)
    • DOI:10.11959/j.issn.1000-436x.2018137    

      CLC: TP18
    • Online First:2018-08

      Published:25 August 2018

    移动端阅览

  • Hongyu SUN, Yuan HE, Jice WANG, et al. Application of artificial intelligence technology in the field of security vulnerability[J]. Journal on Communications, 2018, 39(8): 1-17. DOI: 10.11959/j.issn.1000-436x.2018137.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

4964

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Application of artificial intelligence in mobile communication:challenge and practice
Fine-grained recognition method for encrypted FTP commands based on temporal dual-mode feature fusion
Temporal accumulation-driven intelligent spectrum sensing method under low-SNR conditions
Survey on key technologies for native-intelligence-driven spectrum management towards 6G
Enhanced membership inference attack method leveraging data characteristics

Related Author

Yusun FU
Genke YANG
Fu Chunhui
Yang Zhi
Guo Yuanbo
Li Yongfei
Jin Shuyuan
Zhang Luxin

Related Institution

School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University
Ningbo Artificial Intelligence Institute of Shanghai Jiao Tong University
School of Cryptography, Information Engineering University
School of Cyberspace Security, Hainan University
School of Computer Science and Engineering, Sun Yat-sen University
0