The Encrypted Domain Name System (DNS) and Encrypted Server Name Indication (ESNI) are recently proposed to enhance network security and privacy protection; we refer to these schemes collectively as domain name encryp...
详细信息
ISBN:
(数字)9798350354232
ISBN:
(纸本)9798350354249
The Encrypted Domain Name System (DNS) and Encrypted Server Name Indication (ESNI) are recently proposed to enhance network security and privacy protection; we refer to these schemes collectively as domain name encryption technologies. Previous research has shown that the destination IP address accessed by the user cannot be associated with common web services such as websites because a large number of websites are hosted through cloud or CDN over IPv6. However, encrypted DNS, as an internet infrastructure service, is typically deployed independently by the service provider rather than hosted through cloud or CDN. In this paper, we propose a method to discover the unique service provider of encrypted DNS resolvers on a large-scale encrypted traffic with TLS1.3 support over IPv6. The model utilizes a Siamese network to determine whether two IPv6 resolver addresses belong to the same service provider of encrypted DNS, even if the DNS query is protected by ESNI. Through a comprehensive analysis of two real-world datasets, which include encrypted DNS data and common web data, we find that the implementation of TLS1.3, especially ESNI, does not impact the association of encrypted DNS server addresses. Our model achieves an accuracy rate of 95.29%.
Convolutional neural networks (CNNs) have been widely utilized as the main building block for many \textit{non-intrusive} speech quality assessment (NISQA) methods. A new trend is to add a self-attention mechanism bas...
详细信息
Pest detection is critical for achieving effective pest control. However, the current deep learning-based pest detection algorithm is unsuitable for deployment on resource-limited edge devices due to its extensive com...
Pest detection is critical for achieving effective pest control. However, the current deep learning-based pest detection algorithm is unsuitable for deployment on resource-limited edge devices due to its extensive computation and long inference time. Although lightweight models have been widely used for practical detection, their insufficient feature extraction capability leads to a decline in detection accuracy. This paper proposes a fast algorithm for crop pest detection based on lightweight feature extraction and knowledge distillation. Firstly, we introduce partial convolution and propose a lightweight feature extraction module, C3Faster, which reduces the model's computation and speeds up model inference while ensuring effective feature extraction. Secondly, we use knowledge distillation to improve the model's detection accuracy by using teacher networks to assist in training. Finally, we created a dataset, CropPest6, consisting of six crop pest categories and conducted experiments. The experimental results demonstrate that our method reduces the detection time, number of parameters, and computation by 17%, 38%, and 44%, respectively, compared to the baseline model. Furthermore, our method achieves 93.9% Precision, 93.6% Recall, and 97.5% mean Average Precision (mAP), demonstrating its practical suitability for fast crop pest detection.
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction...
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transactions. In this paper, we propose a method of cross-chain transactions based on zk_SNARKs in a trusted environment for cross-chain transactions for privacy protection. Cross-chain transactions are performed through the features of zk_SNARKs such as efficiency, privacy, and verifiability. zk_SNARKs needs to generate trusted settings with the help of a third party during the transaction, and the process has serious privacy issues, and the private parameters generated during the transaction may be maliciously attacked and thus obtained by attackers. To address this problem, we use a hardware technology SGX for trusted computing to encrypt and store some private parameters generated by zk_SNARKs, thus ensuring the security of cross-chain transactions. The experimental results show that the privacy protection scheme using SGX for cross-chain transactions takes less time than the traditional transaction privacy protection, with a verification time of 1.2s for a number of 10 sidechains, and is more efficient than the traditional cross-chain transaction privacy protection.
Speech quality is a critical consideration for applications such as speech enhancement, coding, transmission, and synthesis. Accurately evaluating the quality of degraded speech without a reference is particularly cha...
详细信息
With the help of special neuromorphic hardware, spiking neural networks (SNNs) are expected to realize artificial intelligence (AI) with less energy consumption. It provides a promising energy-efficient way for realis...
详细信息
With the help of special neuromorphic hardware, spiking neural networks (SNNs) are expected to realize artificial intelligence (AI) with less energy consumption. It provides a promising energy-efficient way for realistic control tasks by combining SNNs with deep reinforcement learning (DRL). In this paper, we focus on the task where the agent needs to learn multi-dimensional deterministic policies to control, which is very common in real scenarios. Recently, the surrogate gradient method has been utilized for training multi-layer SNNs, which allows SNNs to achieve comparable performance with the corresponding deep networks in this task. Most existing spike-based RL methods take the firing rate as the output of SNNs, and convert it to represent continuous action space (i.e., the deterministic policy) through a fully-connected (FC) layer. However, the decimal characteristic of the firing rate brings the floating-point matrix operations to the FC layer, making the whole SNN unable to deploy on the neuromorphic hardware directly. To develop a fully spiking actor network without any floating-point matrix operations, we draw inspiration from the non-spiking interneurons found in insects and employ the membrane voltage of the non-spiking neurons to represent the action. Before the non-spiking neurons, multiple population neurons are introduced to decode different dimensions of actions. Since each population is used to decode a dimension of action, we argue that the neurons in each population should be connected in time domain and space domain. Hence, the intra-layer connections are used in output populations to enhance the representation capacity. This mechanism exists extensively in animals and has been demonstrated effectively. Finally, we propose a fully spiking actor network with intra-layer connections (ILC-SAN). Extensive experimental results demonstrate that the proposed method outperforms the state-of-the-art performance on continuous control tasks from OpenAI gym.
Nowadays, the subsistent anisotropic non-Kolmogorov (ANK) turbulence models are all established on the supposition that the long axis of turbulence cell ought to be level with the ground. Nevertheless, Beason et al. a...
详细信息
Industrial control systems have been deeply involved in industrial facilities and infrastructure. With the integrated development of industry and information technology, industrial control systems are tied to the Inte...
详细信息
Despite the notable advancements of existing prompting methods, such as In-Context Learning and Chain-of-Thought for Large Language Models (LLMs), they still face challenges related to various biases. Traditional debi...
详细信息
Combining multiple patterning lithography (MPL) and optical proximity correction (OPC) pushes the limit of 193-nm wavelength lithography to go further. Considering that layout decomposition may generate plenty of solu...
详细信息
暂无评论