The oscillatory movement, aerodynamic damping effect, gyroscopic effect, and other phenomena in floating wind turbines result in distinct response characteristics of output and load under varying wind-wave coupling sc...
详细信息
This work proposes a robust control technique to mitigate false data injection (FDI) attacks on multi-region interconnected power systems. The strategy is based on unknown input observer (UIO) and adaptive control. In...
详细信息
An end-to-end unsupervised domain adaptation method for hyperspectral image (HSI) classification based on a graph dual adversarial network is proposed in this article. First, in order to extract the domain-invariant f...
详细信息
Magnetic resonance imaging (MRI) is widely used in clinical scenarios. However, acquisition of certain image modalities may be in limitation due to multiple considerations such as time duration and labor costs. Hence,...
详细信息
A recent trend dictating evolution of management and orchestration of computer networks is constituted by the softwarization and virtualization of them, which have drastically simplified the deployment and real-time r...
详细信息
Semantic segmentation of high-resolution traffic scene images is a challenging task due to complex backgrounds, diverse object shapes, similar appearances of multiple objects, and multi-scale characteristics of the sa...
详细信息
Based on the substation outdoor box cabinet in the operation process, which is prone to condensation and overheating, this paper designs a temperature and humidity control device for outdoor box cabinet of substation ...
详细信息
This study investigates the effectiveness of haptic feedback in hand rehabilitation exercises, within both virtual reality (VR) and real-world settings, to enhance upper limb functionality in post-stroke recovery. We ...
详细信息
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-ga...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequent identification presents a formidable *** existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets,with the dataset’s imbalance significantly affecting the model’s *** the present study,a new model,referred to as UD-VLD(Unbalanced Dataset-VAE-LSTM-DRN),was proposed to address above *** proposed model is an encrypted traffic identification model for handling unbalanced *** encoder of the variational autoencoder(VAE)is combined with the decoder and Long-short term Memory(LSTM)in UD-VLD model to realize the data enhancement processing of the original unbalanced *** enhanced data is processed by transforming the deep residual network(DRN)to address neural network gradient-related ***,the data is classified and *** UD-VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique,thereby solving the processing problem for unbalanced *** UD-VLD model was tested using the publicly available Tor dataset and VPN *** UD-VLD model is evaluated against other comparative models in terms of accuracy,loss rate,precision,recall,F1-score,total time,and ROC *** results reveal that the UD-VLD model exhibits better performance in both binary and multi classification,being higher than other encrypted traffic recognition models that exist for unbalanced ***,the evaluation performance indicates that the UD-VLD model effectivelymitigates the impact of unbalanced data on traffic *** can serve as a novel solution for encrypted traffic identification.
暂无评论