|
|
|
Chenglin Yang, Dongliang Xu and Xiao Ma
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced...
ver más
|
|
|
|
|
|
Tamás Kegyes, Alex Kummer, Zoltán Süle and János Abonyi
We analyzed a special class of graph traversal problems, where the distances are stochastic, and the agent is restricted to take a limited range in one go. We showed that both constrained shortest Hamiltonian pathfinding problems and disassembly line bal...
ver más
|
|
|
|
|
|
Katarzyna Leszczynska-Sejda, Andrzej Chmielarz, Dorota Kopyto, Michal Ochmanski, Grzegorz Benke, Arkadiusz Palmowski, Agnieszka Sobianowska-Turek, Przemyslaw Los, Agnieszka Fornalczyk, Michal Zygmunt and Karolina Goc
This paper presents comparative experimental results for the single-stage and two-stage counter-current acid leaching of battery masses, with the addition of a booster, from different types of LIB waste. Three different types of battery masses were used ...
ver más
|
|
|
|
|
|
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th...
ver más
|
|
|
|
|
|
Yu Sun and Zhiqiang Zhang
Accurately classifying degraded images is a challenging task that relies on domain expertise to devise effective image processing techniques for various levels of degradation. Genetic Programming (GP) has been proven to be an excellent approach for solvi...
ver más
|
|
|