Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca...
详细信息
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing scale and monotonous strategies of existing RLbased automated penetration testing methods make them less effective in practical *** this paper,we present CLAP(Coverage-Based Reinforcement Learning to Automate Penetration Testing),an RL penetration testing agent that provides comprehensive network security assessments with diverse adversary testing behaviours on a massive *** employs a novel neural network,namely the coverage mechanism,to address the enormous and growing action spaces in large *** also utilizes a Chebyshev decomposition critic to identify various adversary strategies and strike a balance between *** results across various scenarios demonstrate that CLAP outperforms state-of-the-art methods,by further reducing attack operations by nearly 35%.CLAP also provides enhanced training efficiency and stability and can effectively perform pen-testing over large-scale networks with up to 500 ***,the proposed agent is also able to discover pareto-dominant strategies that are both diverse and effective in achieving multiple objectives.
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
Managing camping tools is crucial to ensure the safety of campers and extend the life of the tools. Frequent Pattern-Growth (FP-Growth) Association Rule Algorithms have emerged as a powerful tool for managing assets e...
详细信息
The attenuation and scattering of light in underwater environments often lead to degradation issues such as image blurring, color cast, and low contrast. Due to the lack of high-quality paired datasets, the performanc...
详细信息
The roll-out of a flexible ramping product provides independent system operators(ISOs)with the ability to address the issues of ramping capacity *** procure flexible ramping capability by committing more generating un...
详细信息
The roll-out of a flexible ramping product provides independent system operators(ISOs)with the ability to address the issues of ramping capacity *** procure flexible ramping capability by committing more generating units or reserving a certain amount of headrooms of committed *** this paper,we raise the concern of the possibility that the procured flexible ramping capability cannot be deployed in realtime operations due to the unit shut-down in a look-ahead commitment(LAC)*** a solution to the issues of ramping capacity shortage,we provide a modified ramping product formulation designed to improve the reliability and reduce the expected operating *** trajectories of start-up and shutdown processes are also considered in determining the ramping capability.A new optimization problem is formulated using mixed integer linear programming(MILP)to be readily applied to the practical power system *** performance of this proposed method is verified through simulations using a small-scale system and IEEE 118-bus *** simulation results demonstrate that the proposed method can improve the generation scheduling by alleviating the ramping capacity shortages.
Coronavirus disease 2019 (COVID-19) is one of the most dangerous diseases in recorded human history due to its high contagiousness and rapid dissemination. Moreover, people who already have medical issues like cardiov...
详细信息
We show reference-less transmission matrix measurements using a neural network operating with up to 23 modes in real-time. We use synthetic training data enabling optical predistortion through an SLM for light control...
详细信息
Advances in algorithmic studies have been made recently, especially in the area of finding the shortest path. Despite taking a greedy approach, the Dijkstra algorithm is well recognized for its efficacy and has establ...
详细信息
In Artificial Intelligence (AI) and high-performance computing (HPC), growing data and model sizes require distributed processing across multiple nodes due to single-node limitations, increasing inter-node communicati...
详细信息
Nowadays in Ukraine, there is a need to automate the routine work of coaches and sports managers in the preliminary selection of athletes. In the process of selecting athletes for competitions of various levels, the h...
详细信息
暂无评论