This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-ga...
详细信息
Label enhancement (LE) is still a challenging task to mitigate the dilemma of the lack of label distribution. Existing LE work typically focuses on primarily formulating a projection between feature space and label di...
详细信息
The effective warning of dangerous events along long-distance pipelines is critical to ensure the safety of oil and gas transportation. Distributed optical fiber sensing (DOFS) technology can assist operators to ident...
详细信息
The rapidly evolving biometric recognition technology has been widely applied in the detection and diagnosis of biological diseases. However, in the poultry domain, the scarcity of case information and the difficulty ...
详细信息
Smart water management imposes higher demands on the real-time capabilities and intelligence of watershed information monitoring systems. Therefore, we propose an intelligent voice broadcast system for monitoring wate...
详细信息
The issues of limited communication distance and task capability are rarely discussed in designing multi-robot cooperative methods. However, these are important problems that cannot be avoided in practical application...
详细信息
Factors have always played an important role in stock analysis, but they are only effective for specific problems in specific scenarios. Therefore, constructing factors timely and quickly for different scenarios is an...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequent identification presents a formidable *** existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets,with the dataset’s imbalance significantly affecting the model’s *** the present study,a new model,referred to as UD-VLD(Unbalanced Dataset-VAE-LSTM-DRN),was proposed to address above *** proposed model is an encrypted traffic identification model for handling unbalanced *** encoder of the variational autoencoder(VAE)is combined with the decoder and Long-short term Memory(LSTM)in UD-VLD model to realize the data enhancement processing of the original unbalanced *** enhanced data is processed by transforming the deep residual network(DRN)to address neural network gradient-related ***,the data is classified and *** UD-VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique,thereby solving the processing problem for unbalanced *** UD-VLD model was tested using the publicly available Tor dataset and VPN *** UD-VLD model is evaluated against other comparative models in terms of accuracy,loss rate,precision,recall,F1-score,total time,and ROC *** results reveal that the UD-VLD model exhibits better performance in both binary and multi classification,being higher than other encrypted traffic recognition models that exist for unbalanced ***,the evaluation performance indicates that the UD-VLD model effectivelymitigates the impact of unbalanced data on traffic *** can serve as a novel solution for encrypted traffic identification.
Deep neural networks are powerful and popular learning models;however, recent studies have shown that deep neural network-based policies are susceptible to deception by adversarial attacks. A minimalistic attack is a ...
详细信息
Texture is a key and basic visual cue for various image processing applications. To capture rich and discriminative local texture information, this paper develops a completed region contrast binary pattern (CRCBP), wh...
详细信息
暂无评论