Research on intelligence fusion: a holistic analysis of open-source intelligence fusion from the perspective of confrontation
In the digital society of "open sharing of information and interconnection of everything", the information traces characterized with "massive, multi-source and explosive growth" in the internet provide rich "mineral deposits" for open-source intelligence collecting. Int...
Saved in:
| Main Authors: | YUAN Weilin, ZHAO Weiwei, HU Zhenzhen, CAO Wei, HE Jun, DONG Shaojin, WANG Chengyuan, WANG Shengqing |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2024-09-01
|
| Series: | 智能科学与技术学报 |
| Subjects: | |
| Online Access: | http://www.cjist.com.cn/thesisDetails#10.11959/j.issn.2096-6652.202429 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis
by: Ahmad Mohammadi, et al.
Published: (2025-01-01) -
Frequency-shifted FMCW method against DRFM spoofing attacks
by: Gonca Suna Yazar, et al.
Published: (2025-06-01) -
An explainable AI-driven transformer model for spoofing attack detection in Internet of Medical Things (IoMT) networks
by: Mohammad A. Alsharaiah, et al.
Published: (2025-05-01) -
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
by: Rizhao Cai, et al.
Published: (2024-10-01) -
Evaluation of PPG Feature Values Toward Biometric Authentication Against Presentation Attacks
by: Shun Hinatsu, et al.
Published: (2022-01-01)