![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning
As network traffic is increasingly valued for privacy protection and the encrypted SSL/TLS (Secure Sockets Layer/Transport Layer Security) traffic is surging, more and more malicious behaviors are hidden in it...
-
Chapter and Conference Paper
SE_EDNet: A Robust Manipulated Faces Detection Algorithm
Face manipulation techniques have raised concern over potential threats, which demand effective images forensic methods. Various approaches have been proposed, but when detecting higher-quality manipulated fac...
-
Chapter and Conference Paper
Natural Language Inference Based on the LIC Architecture with DCAE Feature
Natural Language Inference (NLI), which is also known as Recognizing Textual Entailment (RTE), aims to identify the logical relationship between a premise and a hypothesis. In this paper, a DCAE (Directly-Cond...