|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
Yumiko Yasuda and Yelysaveta Demydenko
The management of transboundary water resources presents a complex challenge involving multiple stakeholders and countries. Negotiating a single rule for managing these resources can take years due to various factors, including political, socioeconomic, ...
ver más
|
|
|
|
|
|
Wencong Xu, Hongyi Lu, Lei Zhao and Borui He
In recent years, with the rapid development of computer technology and artificial intelligence design technology, multiple possible design solutions can be quickly generated by transforming the experience and knowledge of structural design into computer ...
ver más
|
|
|
|
|
|
Changchang Li, Botao Xu, Zhiwei Chen, Xiaoou Huang, Jing (Selena) He and Xia Xie
University students, as a special group, face multiple psychological pressures and challenges, making them susceptible to social anxiety disorder. However, there are currently no articles using machine learning algorithms to identify predictors of social...
ver más
|
|
|
|
|
|
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt...
ver más
|
|
|