Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
With the development of deep learning and computer vision, face detection has achieved rapid progress owing. Face detection has several application domains, including identity authentication, security protection, medi...
详细信息
Spectral compressive imaging has emerged as a powerful technique to collect the 3D spectral information as 2D *** algorithm for restoring the original 3D hyperspectral images(HSIs)from compressive measurements is pivo...
详细信息
Spectral compressive imaging has emerged as a powerful technique to collect the 3D spectral information as 2D *** algorithm for restoring the original 3D hyperspectral images(HSIs)from compressive measurements is pivotal in the imaging *** approaches painstakingly designed networks to directly map compressive measurements to HSIs,resulting in the lack of interpretability without exploiting the imaging *** some recent works have introduced the deep unfolding framework for explainable reconstruction,the performance of these methods is still limited by the weak information transmission between iterative *** this paper,we propose a Memory-Augmented deep Unfolding Network,termed MAUN,for explainable and accurate HSI ***,MAUN implements a novel CNN scheme to facilitate a better extrapolation step of the fast iterative shrinkage-thresholding algorithm,introducing an extra momentum incorporation step for each iteration to alleviate the information ***,to exploit the high correlation of intermediate images from neighboring iterations,we customize a cross-stage transformer(CSFormer)as the deep denoiser to simultaneously capture self-similarity from both in-stage and cross-stage features,which is the first attempt to model the long-distance dependencies between iteration *** experiments demonstrate that the proposed MAUN is superior to other state-of-the-art methods both visually and *** code is publicly available at https://***/HuQ1an/MAUN.
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights o...
详细信息
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights of a pre-selected set of attention points, our approach learns to locate the best attention points to maximize the performance of a specific task, e.g., point cloud classification. Importantly, we advocate the use of single attention point to facilitate semantic understanding in point feature learning. Specifically,we formulate a new and simple convolution, which combines convolutional features from an input point and its corresponding learned attention point(LAP). Our attention mechanism can be easily incorporated into state-of-the-art point cloud classification and segmentation networks. Extensive experiments on common benchmarks, such as Model Net40, Shape Net Part, and S3DIS, all demonstrate that our LAP-enabled networks consistently outperform the respective original networks, as well as other competitive alternatives, which employ multiple attention points, either pre-selected or learned under our LAP framework.
As a near-net-shape technology,the twin-roll strip casting(TRC)process can be considered to apply to the fabrication of TiAl alloy ***,the control of the grain distribution is very important in strip casting because t...
详细信息
As a near-net-shape technology,the twin-roll strip casting(TRC)process can be considered to apply to the fabrication of TiAl alloy ***,the control of the grain distribution is very important in strip casting because the mechanical properties of strips are directly determined by the solidification microstructure.A three-dimensional(3D)cellular automation finite-element(CAFE)model based on ProCAST software was established to simulate the solidification microstructure of Ti-43Al ***,the influence of casting temperature and the maximum nucleation density(nmax)on the solidification microstructure was investigated in *** simulation results provide a good explanation and prediction for the solidification microstructure in the molten pool before leaving the kissing *** and simulated microstructure show the common texture<001>orientation in the columnar grains ***,the microstructure evolution of the Ti-43Al alloy was analyzed and the solidification phase transformation path during the TSC process was determined,i.e.,L→L+β→β→β+α→α+γ+β/B2 phase under a faster cooling rate and L→L+β→β→β+α→γ+lamellar(α_(2)+γ)+β/B2 phase under a slower cooling rate.
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more e...
详细信息
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more efficient and reliable intrusion detection systems(IDSs).However,the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based *** researchers used data preprocessing techniques such as feature selection and normalization to overcome such *** most of these researchers reported the success of these preprocessing techniques on a shallow level,very few studies have been performed on their effects on a wider ***,the performance of an IDS model is subject to not only the utilized preprocessing techniques but also the dataset and the ML/DL algorithm used,which most of the existing studies give little emphasis ***,this study provides an in-depth analysis of feature selection and normalization effects on IDS models built using three IDS datasets:NSL-KDD,UNSW-NB15,and CSE–CIC–IDS2018,and various AI algorithms.A wrapper-based approach,which tends to give superior performance,and min-max normalization methods were used for feature selection and normalization,*** IDS models were implemented using the full and feature-selected copies of the datasets with and without *** models were evaluated using popular evaluation metrics in IDS modeling,intra-and inter-model comparisons were performed between models and with state-of-the-art *** forest(RF)models performed better on NSL-KDD and UNSW-NB15 datasets with accuracies of 99.86%and 96.01%,respectively,whereas artificial neural network(ANN)achieved the best accuracy of 95.43%on the CSE–CIC–IDS2018 *** RF models also achieved an excellent performance compared to recent *** results show that normalization and feature selection positively affect IDS ***,while feature sel
Diabetes disease is prevalent worldwide, and predicting its progression is crucial. Several model have been proposed to predict such disease. Those models only determine the disease label, leaving the likelihood of de...
详细信息
Current emergency response systems are facing several challenges, including complex emergency network structure definition and inefficient emergency scheduling. For these problems, the paper analyzes the characteristi...
详细信息
Current emergency response systems are facing several challenges, including complex emergency network structure definition and inefficient emergency scheduling. For these problems, the paper analyzes the characteristics of emergency networks, and abstracts them into multiple interconnected, interdependent and interactive networks according to the characteristics of hierarchy, attribute and function, and then proposes a hypernetwork based model and its constraint conditions. Furthermore, the paper proposes an emergency scheduling method. This method fully considers the psychological factors of people and the rescue cost factors in disasters in order to balance the interests among different levels of network during rescue. The experiment results show that the model and the method proposed in this paper can not only better reveal the composition and structure of emergency response system, but also effectively balance the cost and the satisfaction in rescue.
Convolutional neural networks (CNNs) have exceptionally performed across various computer vision tasks. However, their effectiveness depends heavily on the careful selection of hyperparameters. Optimizing these hyperp...
详细信息
Over recent years, virtualization has worked as the powerhouse of the data centers. To positively influence datacenter utilization, power consumption, and management, live migration presents a technique which must be ...
详细信息
暂无评论