当前位置:网站首页>Xai+ network security? Brandon University and others' latest "interpretable artificial intelligence in network security applications" overview, 33 page PDF describes its current situation, challenges,
Xai+ network security? Brandon University and others' latest "interpretable artificial intelligence in network security applications" overview, 33 page PDF describes its current situation, challenges,
2022-07-03 20:42:00 【Zhiyuan community】

Thesis link :https://arxiv.org/abs/2206.03585
In the past few years , Artificial intelligence (AI) Technology has been applied to almost all vertical fields of human life . However , The results produced by AI models often lag behind the interpretability .AI Models often appear in black boxes where developers cannot explain or trace the reasons behind specific decisions . Explainable AI (XAI) It is a rapidly developing research field , It helps extract information , And visualize the generated results with the best transparency . This study on XAI The application in network security is widely summarized . Network security can protect the system 、 Networks and programs are protected from different types of attacks .XAI The use of has great potential in predicting such attacks . This paper gives a brief overview of network security and various forms of attacks . then , Discussed the tradition AI The use of technology and its related challenges , This is open XAI The door to use in various applications . It introduces XAI Implementation in various research projects and industries . Last , The lessons learned from these applications are emphasized to provide guidance for the scope of future research .
边栏推荐
- Global and Chinese markets of cast iron diaphragm valves 2022-2028: Research Report on technology, participants, trends, market size and share
- Etcd raft Based Consistency assurance
- "Actbert" Baidu & Sydney University of technology proposed actbert to learn the global and local video text representation, which is effective in five video text tasks
- Gauss elimination solves linear equations (floating-point Gauss elimination template)
- 2.1 use of variables
- XAI+网络安全?布兰登大学等最新《可解释人工智能在网络安全应用》综述,33页pdf阐述其现状、挑战、开放问题和未来方向
- Sort out several network request methods of JS -- get rid of callback hell
- @Transactional注解失效的场景
- Upgrade PIP and install Libraries
- Exercises of function recursion
猜你喜欢

It is discussed that the success of Vit lies not in attention. Shiftvit uses the precision of swing transformer to outperform the speed of RESNET

QT6 QML book/qt quick 3d/ Basics

Research Report on the overall scale, major manufacturers, major regions, products and application segmentation of rotary tablet presses in the global market in 2022

19、 MySQL -- SQL statements and queries

Machine learning support vector machine SVM

TLS environment construction and plaintext analysis

Derivation of decision tree theory

一台服务器最大并发 tcp 连接数多少?65535?

SQL injection - Fundamentals of SQL database operation

Example of peanut shell inner net penetration
随机推荐
In 2021, the global revenue of syphilis rapid detection kits was about US $608.1 million, and it is expected to reach US $712.9 million in 2028
App compliance
Thread, thread stack, method stack, the difference of creating thread
Preliminary practice of niuke.com (11)
浅析 Ref-NeRF
Global and Chinese markets for medical temperature sensors 2022-2028: Research Report on technology, participants, trends, market size and share
Oak-d raspberry pie cloud project [with detailed code]
Basic knowledge of dictionaries and collections
Wireless network (preprocessing + concurrent search)
阻塞非阻塞和同步异步的区分 参考一些书籍
Global and Chinese markets of active matrix LCD 2022-2028: Research Report on technology, participants, trends, market size and share
2022 high voltage electrician examination and high voltage electrician reexamination examination
[Tang Laoshi] C -- encapsulation: member variables and access modifiers
Basic number theory -- Chinese remainder theorem
2.6 formula calculation
JVM JNI and PVM pybind11 mass data transmission and optimization
Sparse matrix (triple) creation, transpose, traversal, addition, subtraction, multiplication. C implementation
Golang type assertion and conversion (and strconv package)
MySQL 8.0 data backup and recovery
Change deepin to Alibaba image source