State Grid Enterprise Common data Model (SG-CIM) is a semantically unified data model for smart grid business applications. The model is divided into entity and relation files. Since the relations in SG-CIM model are ...
详细信息
In order to solve the problem that the vehicles associated with the track cannot be uniquely identified when tracking a moving vehicle by MOT approaches in computer vision field, a moving vehicle tracking method based...
详细信息
The virtual network embedding problem is embedding virtual networks (VNs) in a substrate network so that revenue or accept ratio is maximized. Previous study usually assumes disclosed communication demand among the vi...
详细信息
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev...
详细信息
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying levels of understanding when it comes to securing an online *** Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these *** published articles focused on these attacks’binary *** article described a novel deep-learning approach for detecting SQL injection and XSS *** datasets for SQL injection and XSS payloads are combined into a single *** dataset is labeledmanually into three labels,each representing a kind of *** work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a *** model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload *** payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and *** outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious ***’s high performance was demonstrated by its accuracy of 99.26%.
To leverage the massively parallel capability of GPU for query execution, GPU databases have been studied for over a decade. Recently, researchers proposed to execute queries with both CPU and GPU in a pipelined appro...
详细信息
C-eigenvalues of piezoelectric-type tensors play an important role in Piezoelectric effect and converse Piezoelectric effect. In this article, using the largest absolute value components of left and right C-eigenvecto...
详细信息
Effective target detection and recognition are essential in remote sensing image field, and complex evidence theory (CET) is widely used for this purpose. However, measuring conflict between complex basic belief assig...
详细信息
Vehicle behavior recognition is one of the most important research fields in intelligent transportation. In the field of traffic surveillance videos, target vehicles only occupy small proportion of the video frame,mak...
详细信息
In this paper, aiming at the vehicle information supervision problem existing in the transportation process of the third-party small and medium-sized cold chain logistics enterprises, combined with the actual monitori...
详细信息
Among different electromagnetic spectrum monitoring tasks, a fundamental one is detecting the presence of weak communication signal under non-cooperative setting. Various detection methods have been studied in the lit...
详细信息
暂无评论