Few-shot learning aims to build a classification model by training a small amount of labeled sample data, which can be well adapted to new domains. The key point of few-shot learning is that a small amount of sample d...
详细信息
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ...
详细信息
To solve the problem of modeling the intrusion in Intrusion Tolerance System, an intrusion model of state transition and its constructing algorithm is presented in this paper, which places its emphasis on the influenc...
详细信息
To solve the problem of modeling the intrusion in Intrusion Tolerance System, an intrusion model of state transition and its constructing algorithm is presented in this paper, which places its emphasis on the influence of the intrusion upon the system and describes the intrusion as the state transitions of the attackers' capability. Firstly, we correlate the alerts into meta-attack in the constructing algorithm, and then define Cover as the reduction of meta-attack. Secondly, we transform the cover of meta-attack to intrusion model and give the proofs of the equivalences among intrusion model, meta-attack and its cover. Thirdly, we present an algorithm for describing the intrusion model without employing manual work, which makes it superior to the existing methods. Finally, we do some correlation experiments to evaluate and show the performances of both the intrusion model and the algorithms for constructing and describing this model.
Since existing methods using entropy are less effective in characterizing encrypted traffic, this paper proposes an encrypted traffic identification method based on n-gram entropy and cumulative sum. This method analy...
详细信息
Graph neural networks (GNNs) have achieved promising performance on semantic dependency parsing (SDP), owing to their powerful graph representation learning ability. However, training a high-performing GNN-based model...
详细信息
In this paper, we explore the design of interpersonal bodily intertwinement through a VR social game, "Light Up Fireflies". Inspired by works of virtual co-embodiment, our game lets two players embody a sing...
详细信息
Behind the booming decentralized finance (DeFi) ecosystem driven by blockchain technology, various financial risks lurking, including money laundering, gambling, Ponzi schemes, and phishing. Due to the decentralizatio...
详细信息
In mobile data collector (MDC)-based wireless sensor networks, we need to design paths for MDCs for better data collection. In this paper, we use predictable mobility pattern and apply a heuristic algorithm to design ...
详细信息
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel...
详细信息
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel attention selection mechanism (PASM).In detail,a schismatic receptive field block(SRF)combined with an attention mechanism for low-level information is performed to learn texture features in one branch,and an integration of the SRF,a hybrid attention mechanism (HAM),and a depth feature polymerization module (DFPM)is employed for high-level information to extract detection features in the other ***,both texture features and detection features are input into the PASM to acquire selective expression ***,the final result is obtained after further selective matrix optimization with atrous spatial pyramid pooling (ASPP)and a residual channel attention block (RCAB)being applied *** results on three public datasets verify that our method outperforms the state-of-the-art methods in terms of four evaluation metrics,i.e.,mean absolute error (MAE),weighted F βmeasure (Fβω),structural measure (Sα),and E-measure (Eφ)
An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the...
详细信息
An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the relay-destination(R-D) link. A special XOR vector is defined using the correlated hard decision information blocks from two decoders and the extrinsic information exchanged between the two decoders is derived by the log-likelihood ratio(LLR) associated with the XOR vector. Such the decoding scheme is different from the traditional turbo-like detection/decoding algorithm, where the extrinsic information is computed by the side information and the soft decoder outputs. Simulations show that the presented algorithm has a slightly better performance than the traditional turbo-like algorithm(Taking the(255,175) EG-LDPC code as an example, it achieves about 0.1 dB performance gains aroundBLER=10^(-4)). Furthermore, the presented algorithm requires fewer computing operations per iteration and has faster convergence rate. For example, the average iteration of the presented algorithm is 33 at SNR=1.8 dB, which is about twice faster than that of the turbo-like algorithm, when decoding the(961,721) QC-LDPC code. Therefore, the presented decoding algorithm of correlated sources provides an alternative decoding solution for the LDPC-based relay systems.
暂无评论