Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Research on Telecommuting Security Solution Based on Zero Trust Architecture

    With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments....

    Wanli Kou, Huaizhe Zhou, Jia Du in Proceedings of the 13th International Conf… (2024)

  2. No Access

    Chapter and Conference Paper

    Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security Events

    Aiming to improve the efficiency of network security protection, the collaborative utilization of network security devices is studied. Firstly, the utilization status quo of network security devices was analyz...

    Jia Du, Junqiang Yang, Wanli Kou in Artificial Intelligence and Machine Learni… (2024)

  3. No Access

    Article

    Effect of carbon do** on corrosion resistance and conductivity of CrMoN-coated 316L stainless steel bipolar plates

    CrMoCN coatings with different carbon contents are prepared on 316L stainless steel substrates by closed-field unbalanced magnetron sputtering. The microstructure, phase composition, bonding state, corrosion p...

    Jie **, Xu Tian, Yi Tao, **anli Kou, Yuanhao Mi in Journal of Solid State Electrochemistry (2023)

  4. No Access

    Chapter and Conference Paper

    Steganalysis of Content-Adaptive JPEG Steganography Based on Ensemble of Convolutional Neural Networks with Image Preprocessing Using Gabor Filters

    As we know, compared with the feature-based steganalysis method, deep convolutional neural networks (DCNNs) have firmly established themselves as the superior steganography detectors. In this paper, considerin...

    **aofeng Song, **nshe Qi, Wanli Kou in Advances in Artificial Intelligence and Se… (2022)

  5. No Access

    Chapter and Conference Paper

    Research on Technical System for Cyberspace Surveying and Map**

    With the rapid development of the network, various businesses continue to appear, and the number of cyberspace protection targets is increasing exponentially. How to find out the family background, recognize t...

    Wanli Kou, Lin Ni, Jia Du in Advances in Artificial Intelligence and Security (2022)