We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio...
详细信息
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien...
详细信息
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition...
详细信息
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method...
详细信息
Binary function naming is a code analysis task that generates functional descriptions of functions, and its results can be applied in the fields of malicious code analysis, vulnerability causation analysis, and algori...
详细信息
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n...
详细信息
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby network ***,current computation offloading studies in the heterogeneous edge environment face multifaceted challenges:Dependencies among computational tasks,resource competition among multiple users,and diverse long-term *** applications typically consist of several functionalities,and one huge category of the applications can be viewed as a series of sequential *** this study,we first proposed a novel multiuser computation offloading framework for long-term sequential ***,we presented a comprehensive analysis of the task offloading process in the framework and formally defined the multiuser sequential task offloading ***,we decoupled the long-term offloading problem into multiple single time slot offloading problems and proposed a novel adaptive method to solve *** further showed the substantial performance advantage of our proposed method on the basis of extensive experiments.
The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of information transmission between IoT devices and servers. Recently, r...
详细信息
In recent years, HPC and AI fusion, which refers to applying AI technology to traditional HPC applications, has become a new trend. HPC and AI fusion requires supports for multiple precisions used in both domains. Whi...
详细信息
Accurate prediction of short-term electricity price is the key to obtain economic benefit and also an important index of power system planning and management. Support vector regression (SVR) based ensemble works have ...
详细信息
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist...
详细信息
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assistance of a server trusted by both the clients via an unprotected network communication environment. The 3 PAKE protocols can be applied to various scenarios, including mobile commerce environment.
暂无评论