Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
The purpose of much research in the hybrid classification area is to reduce the number of deep features. However, many approaches overlook the relation between deep features and specific classes or diseases. This stud...
详细信息
The importance of object detection within computer vision, especially in the context of detecting small objects, has notably increased. This thorough survey extensively examines small object detection across various a...
详细信息
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ...
详细信息
Advances in machine vision systems have revolutionized applications such as autonomous driving,robotic navigation,and augmented *** substantial progress,challenges persist,including dynamic backgrounds,occlusion,and l...
详细信息
Advances in machine vision systems have revolutionized applications such as autonomous driving,robotic navigation,and augmented *** substantial progress,challenges persist,including dynamic backgrounds,occlusion,and limited labeled *** address these challenges,we introduce a comprehensive methodology toenhance image classification and object detection *** proposed approach involves the integration ofmultiple methods in a complementary *** process commences with the application of Gaussian filters tomitigate the impact of noise *** images are then processed for segmentation using Fuzzy C-Meanssegmentation in parallel with saliency mapping techniques to find the most prominent *** Binary RobustIndependent Elementary Features(BRIEF)characteristics are then extracted fromdata derived fromsaliency mapsand segmented *** precise object separation,Oriented FAST and Rotated BRIEF(ORB)algorithms *** Algorithms(GAs)are used to optimize Random Forest classifier parameters which lead toimproved *** method stands out due to its comprehensive approach,adeptly addressing challengessuch as changing backdrops,occlusion,and limited labeled data concurrently.A significant enhancement hasbeen achieved by integrating Genetic Algorithms(GAs)to precisely optimize *** minor adjustmentnot only boosts the uniqueness of our system but also amplifies its overall *** proposed methodologyhas demonstrated notable classification accuracies of 90.9%and 89.0%on the challenging Corel-1k and MSRCdatasets,***,detection accuracies of 87.2%and 86.6%have been *** ourmethod performed well in both datasets it may face difficulties in real-world data especially where datasets havehighly complex *** these limitations,GAintegration for parameter optimization shows a notablestrength in enhancing the overall adaptability and performance of our system.
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless ***,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to impl...
详细信息
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless ***,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT *** this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT ***,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value *** addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the *** effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other *** analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.
Image captioning is a technique that generates concise and meaningful descriptions of the visual contents present in an image. Image captioning frameworks generally employ an encoder-decoder-based pipeline to generate...
详细信息
Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature *** the continuous development of quantum computation and quantum infor...
详细信息
Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature *** the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more ***,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum ***,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing *** on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing *** analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is *** the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights o...
详细信息
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights of a pre-selected set of attention points, our approach learns to locate the best attention points to maximize the performance of a specific task, e.g., point cloud classification. Importantly, we advocate the use of single attention point to facilitate semantic understanding in point feature learning. Specifically,we formulate a new and simple convolution, which combines convolutional features from an input point and its corresponding learned attention point(LAP). Our attention mechanism can be easily incorporated into state-of-the-art point cloud classification and segmentation networks. Extensive experiments on common benchmarks, such as Model Net40, Shape Net Part, and S3DIS, all demonstrate that our LAP-enabled networks consistently outperform the respective original networks, as well as other competitive alternatives, which employ multiple attention points, either pre-selected or learned under our LAP framework.
暂无评论