network intrusion detection system (NIDS) is a tool that can detect various network attacks by analyzing network traffic. In recent years, traditional machine learning and deep learning methods have been widely used i...
详细信息
Anomaly detection becomes an interesting and significant problem in data mining area. It, in turn, generates many promising applications such as Intrusion Detection, Fraud Detection, Mobile cellular network fraud, and...
详细信息
Euphemism is a type of figurative language broadly adopted in social media and daily conversations. People use euphemisms for politeness or to conceal what they are discussing. Euphemism detection is a challenging tas...
详细信息
With the rapid development of deep learning, many instance segmentation models have achieved good results in accuracy and time. But here are still many problems. In this paper, we proposed a two-stage model CarfRCNN. ...
详细信息
Convolutional Neural networks (CNN) and the locally connected layer are limited in capturing the importance and relations of different local receptive fields, which are often crucial for tasks such as face verificatio...
详细信息
In this paper we report on our participation in the TREC 2019 Conversational Assistance Track which focuses on Conversational Information Seeking(CIS)namely understand the dialogue context and retrieve candidate res...
详细信息
Efficient, temperature-insensitive electromagnetic attenuation materials are critical for high microwave absorption at high temperatures. This study presents SiC/TiC/SiTiOC hybrid nanofiber mats constructed using an i...
Efficient, temperature-insensitive electromagnetic attenuation materials are critical for high microwave absorption at high temperatures. This study presents SiC/TiC/SiTiOC hybrid nanofiber mats constructed using an in-situ synthesis method;these mats incorporate SiC/TiC as the microwave loss unit and SiTiOC as the antioxidant unit, offering an innovative approach to high-temperature microwave absorption. The introduction of high-conductivity TiC not only optimizes the dielectric constant and impedance matching of the material but also enhances its thermal cycling stability. This design ensures steady electromagnetic attenuation, enabling the hybrid nanofiber mats to maintain robust absorption performance in the X-band, even at high temperatures. At 873 K, the material demonstrates an effective absorption bandwidth of 3.6 GHz and a minimum reflection loss of-45.55 dB. Compared to single-system absorbers, such as SiC/C nanofiber materials, with a single system, the multicomponent SiC/TiC/SiTiOC hybrid nanofiber mats deliver reliable absorption performance in the temperature range of 293–873 K. This study confirms that highly conductive titanium-based ceramic materials used for dielectric property regulation effectively address the challenges of poor temperature stability and limited reusability in high-temperature carbon-ceramic absorbing materials, providing valuable insights and guidance for designing efficient microwave absorbers that can operate across a wide temperature range.
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If these param...
详细信息
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing...
详细信息
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing limited samples,multiple types,and various sizes of regions remains a multitude of *** issues impede the model’s universality and generalization capability and detrimentally affect its *** tackle these issues,we propose FL-MobileViT-an improved MobileViT model devised for image tampering *** proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain,and captures richer traces of tampering through dual-stream ***,the model incorporating the Focused Linear Attention mechanism within the lightweight network(MobileViT).This substitution significantly diminishes computational complexity and resolves homogeneity problems associated with traditional Transformer attention mechanisms,enhancing feature extraction diversity and improving the model’s localization *** comprehensively fuse the generated results from both feature extractors,we introduce the ASPP architecture for multi-scale feature *** facilitates a more precise localization of tampered regions of various ***,to bolster the model’s generalization ability,we adopt a contrastive learning method and devise a joint optimization training strategy that leverages fused features and captures the disparities in feature distribution in tampered *** strategy enables the learning of contrastive loss at various stages of the feature extractor and employs it as an additional constraint condition in conjunction with cross-entropy *** a result,overfitting issues are effectively alleviated,and the differentiation between tampered and untampered regions is *** evaluations on five benchmark datasets(IMD-20,CASIA,NIST-16,Columbia and Coverage)validat
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...
详细信息
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.
暂无评论