Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
To address the matching problem caused by the significant differences in spatial features, spectrum and contrast between heterologous images, a heterologous image matching method based on salience region is proposed i...
详细信息
The development of IOT smart devices has necessitated increasingly stringent requirements for DC power sources in terms of output voltage, size, and cost. For instance, Avalanche Photodiodes (APDs), utilized as photod...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we...
详细信息
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some well-known schemes, including the full-domain hash(FDH) signature(Eurocrypt1996) and the Boneh-Franklin identity-based encryption(IBE) scheme(Crypto 2001), are provably secure under CPReds;(2) we prove that a CPRed associated with an instance-extraction algorithm implies a reduction in the quantum ROM(QROM). This unifies several recent results, including the security of the Gentry-Peikert-Vaikuntanathan IBE scheme by Zhandry(Crypto 2012) and the key encapsulation mechanism(KEM) variants using the Fujisaki-Okamoto transform by Jiang et al.(Crypto 2018) in the ***, we show that CPReds are incomparable to non-programming reductions(NPReds) and randomly-programming reductions(RPReds) formalized by Fischlin et al.(Asiacrypt 2010).
Using large language model to generate vehicle type recognition algorithm can reduce the burden of developers and realize the rapid development of projects. In this paper, LangChain large model interface provided by B...
详细信息
Owing to the challenge of target occlusion leading to tracking failure during the target tracking process, achieving efficient and robust tracking of targets under occlusion scenarios has become a focal point of resea...
详细信息
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M...
详细信息
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and ...
详细信息
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and there is a relative lack of research on mass gathering *** believe real-time detection and monitoring of mass gathering behaviors are essential formigrating potential security risks and ***,it is imperative to develop a method capable of accurately identifying and localizing mass gatherings before disasters occur,enabling prompt and effective *** address this problem,we propose an innovative Event-Driven Attention Network(EDAN),which achieves image-text matching in the scenario of mass gathering events with good results for the first *** image-text retrieval methods based on global alignment are difficult to capture the local details within complex scenes,limiting retrieval *** local alignment-based methods aremore effective at extracting detailed features,they frequently process raw textual features directly,which often contain ambiguities and redundant information that can diminish retrieval efficiency and degrade model *** overcome these challenges,EDAN introduces an Event-Driven AttentionModule that adaptively focuses attention on image regions or textual words relevant to the event *** calculating the semantic distance between event labels and textual content,this module effectively significantly reduces computational complexity and enhances retrieval *** validate the effectiveness of EDAN,we construct a dedicated multimodal dataset tailored for the analysis of mass gathering events,providing a reliable foundation for subsequent *** conduct comparative experiments with other methods on our dataset,the experimental results demonstrate the effectiveness of *** the image-to-text retrieval task,EDAN achieved the best performance on the R@5 metric,w
With the scaling up of high-performance computing systems in recent years,their reliability has been descending ***,system resilience has been regarded as one of the critical challenges for large-scale HPC *** techniq...
详细信息
With the scaling up of high-performance computing systems in recent years,their reliability has been descending ***,system resilience has been regarded as one of the critical challenges for large-scale HPC *** techniques and systems have been proposed to ensure the correct execution and completion of parallel *** paper provides a comprehensive survey of existing software resilience ***,a classification of software resilience approaches is presented;then we introduce major approaches and techniques,including checkpointing,replication,soft error resilience,algorithmbased fault tolerance,fault detection and *** addition,challenges exposed by system-scale and heterogeneous architecture are also discussed.
暂无评论