当前位置:网站首页>Xai+ network security? Brandon University and others' latest "interpretable artificial intelligence in network security applications" overview, 33 page PDF describes its current situation, challenges,
Xai+ network security? Brandon University and others' latest "interpretable artificial intelligence in network security applications" overview, 33 page PDF describes its current situation, challenges,
2022-07-03 20:42:00 【Zhiyuan community】

Thesis link :https://arxiv.org/abs/2206.03585
In the past few years , Artificial intelligence (AI) Technology has been applied to almost all vertical fields of human life . However , The results produced by AI models often lag behind the interpretability .AI Models often appear in black boxes where developers cannot explain or trace the reasons behind specific decisions . Explainable AI (XAI) It is a rapidly developing research field , It helps extract information , And visualize the generated results with the best transparency . This study on XAI The application in network security is widely summarized . Network security can protect the system 、 Networks and programs are protected from different types of attacks .XAI The use of has great potential in predicting such attacks . This paper gives a brief overview of network security and various forms of attacks . then , Discussed the tradition AI The use of technology and its related challenges , This is open XAI The door to use in various applications . It introduces XAI Implementation in various research projects and industries . Last , The lessons learned from these applications are emphasized to provide guidance for the scope of future research .
边栏推荐
- Strange way of expressing integers (expanding Chinese remainder theorem)
- Cannot load driver class: com. mysql. cj. jdbc. Driver
- 不同业务场景该如何选择缓存的读写策略?
- In 2021, the global foam protection packaging revenue was about $5286.7 million, and it is expected to reach $6615 million in 2028
- Example of peanut shell inner net penetration
- Refer to some books for the distinction between blocking, non blocking and synchronous asynchronous
- Derivation of decision tree theory
- App compliance
- Based on laravel 5.5\5.6\5 X solution to the failure of installing laravel ide helper
- CesiumJS 2022^ 源码解读[7] - 3DTiles 的请求、加载处理流程解析
猜你喜欢

Preliminary practice of niuke.com (11)

Discussion Net legacy application transformation

2.1 use of variables

String and+

18、 MySQL -- index

It is discussed that the success of Vit lies not in attention. Shiftvit uses the precision of swing transformer to outperform the speed of RESNET

Interval product of zhinai sauce (prefix product + inverse element)

Battle drag method 1: moderately optimistic, build self-confidence (1)

Sightseeing - statistics of the number of shortest paths + state transfer + secondary small paths

《ActBERT》百度&悉尼科技大学提出ActBERT,学习全局局部视频文本表示,在五个视频-文本任务中有效!...
随机推荐
Global and Chinese market of liquid antifreeze 2022-2028: Research Report on technology, participants, trends, market size and share
AcWing 1460. Where am i?
Refer to some books for the distinction between blocking, non blocking and synchronous asynchronous
Rhcsa third day operation
Cap and base theory
Go learning notes (4) basic types and statements (3)
Interval product of zhinai sauce (prefix product + inverse element)
上周内容回顾
Global and Chinese market of full authority digital engine control (FADEC) 2022-2028: Research Report on technology, participants, trends, market size and share
Wireless network (preprocessing + concurrent search)
How to handle wechat circle of friends marketing activities and share production and release skills
Such as the visual appeal of the live broadcast of NBA Finals, can you still see it like this?
Rhcsa third day notes
19、 MySQL -- SQL statements and queries
Phpexcel import export
Kubernetes 通信异常网络故障 解决思路
2.5 conversion of different data types (2)
11-grom-v2-05-initialization
2.1 use of variables
Global and Chinese markets for medical temperature sensors 2022-2028: Research Report on technology, participants, trends, market size and share