In recent years, with the rapid growth of car ownership, Chinese road traffic conditions have changed a lot. Governments, enterprises, and the public are increasingly finding that the increasing deviation between the ...
详细信息
Reversing binary samples is a conventional way to detect Android malware and is limited by the prosperity of code obfuscation. Detecting network traffic generated by Android malware can counter the advanced obfuscatio...
详细信息
Reversing binary samples is a conventional way to detect Android malware and is limited by the prosperity of code obfuscation. Detecting network traffic generated by Android malware can counter the advanced obfuscation technic and has been intensively studied in recent years. Existing methods mostly require sufficient and balanced training data to construct a satisfactory detector. Unfortunately, the newly emerged Android malware, especially those of new families, is hard to obtain for lack of prior knowledge. Meanwhile, the state-of-the-art few-shot learning approaches are incompetent for task-specific classification. To address the issues, this paper proposes a novel metric-learning framework, namely Path Optimization Prototypical Nets (POPNet), for few-shot Android malware encrypted network traffic classification. POPNet aims to map network traffic onto a high dimensional metric space, using auxiliary traffic from benign android software to augment the representative ability. Path optimization strategies are carefully designed to compress the searching space to obtain a more rational distribution on the linearly separable metric space. Our method achieves state-of-the-art performance on few-shot and zero-shot classification on MalDroid2017 and USTC2016. Additional experiments on Omniglot further prove the generalization of POPNet.
Scientific data is an important strategic resource in the era of big data. Efficient management and wide circulation are the key ways to enhance the value of scientific data resources. With the transformation of the i...
详细信息
Time series outlier detection is an important topic in datamining, having significant applications in reality. Due to the complexity and dynamics of time series, it is quite difficult to detect outlier in time series...
详细信息
This paper describes new solutions for distributed services management protocols. The new idea will be based on use transformative computing methodology in services securing algorithms. Such solutions will be based on...
详细信息
This paper aims to analyze the situation of dropout of business computer students at University of Phayao. The composition of the goal consists of 3 main points, including summarizing the situation from the past to th...
详细信息
ISBN:
(纸本)9783030402747;9783030402730
This paper aims to analyze the situation of dropout of business computer students at University of Phayao. The composition of the goal consists of 3 main points, including summarizing the situation from the past to the present, statistical analysis and machine learning analysis. data collection is 1,888 students from the Department of Business Computer at University of Phayao from the academic year 2001-2016. The research tools are percentages, decision tree, cross-validation methods, and confusion matrix performance. The results showed that the dropout rate of learners in business computer program tended to increase even though the number of new students decreased. It was found that the academic results had a significant influence on dropout, which most of the students who dropped out were obviously in their first academic year. Which, the model received is a high-performance prediction level with an accuracy of 87.21%. It was found that factors affecting the dropout consisted of seven courses: 221110, 221120, 001103, 128221, 005171, 122130 and 128221. Based on research findings, it represents a situation that has entered into a crisis in which the stakeholders need to focus on the above problems.
Based on the hybrid algorithm and BP neural network, the forecasting technology of network public opinion was studied. After detailed introduction of the research background and significance, the concept and developme...
详细信息
Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on code mini...
详细信息
Cloud computing allows users to store data in a distributed cloud storage. So the data are stored in different geographical locations which will predominantly increase the vulnerability of the data. The natural way to...
详细信息
ISBN:
(纸本)9789811319518;9789811319501
Cloud computing allows users to store data in a distributed cloud storage. So the data are stored in different geographical locations which will predominantly increase the vulnerability of the data. The natural way to safeguard the data from the intruders is to encrypt the data before storing in the cloud. This paper proposes an advanced Cramer-Shoup Cryptosystem to resolve the security threats in cloud environment. The proposed encryption method withstands well against the adaptive chosen cipher text attack (CCA2). While considering high velocity, encryption method has to work as fast as possible to improve the efficiency. The proposed ACS Cryptosystem supports batch encryption and decryption to increase the efficiency and reduces the computation overhead. The experimental analysis for the proposed method is carried out and observed that the proposed encryption technique improves the security of the data and results are compared with existing security algorithms.
Nationality fabric classification is a significant work to promote the protection work of fabric patterns and further reveal its unique connotation and inheritance rules in big data era. Thus, how to ascertain the fea...
详细信息
ISBN:
(纸本)9783030653903;9783030653897
Nationality fabric classification is a significant work to promote the protection work of fabric patterns and further reveal its unique connotation and inheritance rules in big data era. Thus, how to ascertain the feature representation of fabric patterns becomes a primary problem. This paper presents a high-level feature representation for fabric patterns for nationality classification, called FabricGene, which improves the semantic expression ability of the fabric pattern features. In fabric patterns, each FabricGene represents a complete abstract concept including the external shape and connotation characteristics. We evaluate the performance of FabricGenes and basic geometric primitives to illustrate the effectiveness of FabricGenes in nationality classification. Five widely used classification algorithms are applied to classify the fabric patterns by learning from training data with 12 groups of FabricGenes and 11 groups of basic geometric primitives respectively. The results demonstrate that the FabricGenes perform more effectively and stably in nationality classification than the basic geometric primitives. Namely, the FabricGenes can express the fabric patterns' nationality features more accurately.
暂无评论