Encrypted traffic plays a crucial role in safeguarding network security and user ***,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic *** metho...
详细信息
Encrypted traffic plays a crucial role in safeguarding network security and user ***,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic *** methods for detecting encrypted traffic face two significant ***,relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network ***,machine learning and convolutional neural network methods lack sufficient network expression capabilities,hindering the full exploration of traffic’s potential *** address these limitations,this study introduces a traffic classification method that utilizes time relationships and a higher-order graph neural network,termed *** approach fully exploits the original byte information and chronological relationships of traffic packets,transforming traffic data into a graph structure to provide the model with more comprehensive context ***-ETC employs an innovative k-dimensional graph neural network to effectively capture the multi-scale structural features of traffic graphs,enabling more accurate *** select the ISCXVPN and the USTC-TK2016 dataset for our *** results show that compared with other state-of-the-art methods,our method can obtain a better classification effect on different datasets,and the accuracy rate is about 97.00%.In addition,by analyzing the impact of varying input specifications on classification performance,we determine the optimal network data truncation strategy and confirm the model’s excellent generalization ability on different datasets.
This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfigurati...
详细信息
This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfiguration of the datapath,allowing efficient balancing between computational performance and power *** is achieved through interchangeable components and clock gating mechanisms,which help the processor adapt to varying workloads.A prototype of the architecture was implemented on a Xilinx Artix 7 field programmable gate array(FPGA).Experimental results show significant improvements in power efficiency and *** mini configuration achieves an impressive reduction in power consumption,using only 36%of the baseline ***,the full configuration boosts performance by 8%over the *** flexible and adaptable nature of this architecture makes it highly suitable for a wide range of low-power IoT applications,providing an effective solution to meet the growing demands for energy efficiency in modern IoT devices.
Feature selection is a crucial step in EEG emotion recognition. However, it was often used as a single objective problem to either reduce the number of features or maximize classification accuracy, while neglecting th...
详细信息
Feature selection is a crucial step in EEG emotion recognition. However, it was often used as a single objective problem to either reduce the number of features or maximize classification accuracy, while neglecting their balance. To address the issue, we proposed Improved Multi-objective Grey Wolf Optimization Feature Selection (IMGWOFS). Firstly, we designed a population initialization operator via discriminability and independence of features to accelerate search speed. Secondly, we employed a two-stage update strategy to improve the global search capabilities of the EEG feature subsets. Finally, we incorporated an adaptive mutation operator to escape the local optima. We conducted experiments on SEED and DEAP datasets, and the accuracy were 86.87$\pm$1.62 % and 60.65$\pm$1.51 % in the beta band using a smaller number of EEG features. In addition, the frontal lobe was related to emotion processing. In conclusion, IMGWOFS is an effective and feasible feature selection method for EEG-based emotion recognition. IEEE
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra...
详细信息
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running graph processing workloads on conventional architectures(e.g.,CPUs and GPUs)often shows a significantly low compute-memory ratio with few performance benefits,which can be,in many cases,even slower than a specialized single-thread graph *** domain-specific hardware designs are essential for graph processing,it is still challenging to transform the hardware capability to performance boost without coupled software *** article presents a graph processing ecosystem from hardware to *** start by introducing a series of hardware accelerators as the foundation of this ***,the codesigned parallel graph systems and their distributed techniques are presented to support graph ***,we introduce our efforts on novel graph applications and hardware *** results show that various graph applications can be efficiently accelerated in this graph processing ecosystem.
This paper deals with numerical solutions for nonlinear first-order boundary value problems(BVPs) with time-variable delay. For solving this kind of delay BVPs, by combining Runge-Kutta methods with Lagrange interpola...
详细信息
This paper deals with numerical solutions for nonlinear first-order boundary value problems(BVPs) with time-variable delay. For solving this kind of delay BVPs, by combining Runge-Kutta methods with Lagrange interpolation, a class of adapted Runge-Kutta(ARK) methods are developed. Under the suitable conditions, it is proved that ARK methods are convergent of order min{p, μ+ν +1}, where p is the consistency order of ARK methods and μ, ν are two given parameters in Lagrange interpolation. Moreover, a global stability criterion is derived for ARK methods. With some numerical experiments, the computational accuracy and global stability of ARK methods are further testified.
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed n...
详细信息
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed natural fibers such as cotton, hemp, silk and wool to make fabrics(Fig. 1a). Chinese ancestors had mastered the art of natural fiber weaving as early as the Neolithic *** thousand years ago, people were already familiar with and adept at techniques for spinning natural fibers [1].
Side-channel attacks allow adversaries to infer sensitive information,such as cryptographic keys or private user data,by monitoring unintentional information leaks of running *** side-channel detection methods can ide...
详细信息
Side-channel attacks allow adversaries to infer sensitive information,such as cryptographic keys or private user data,by monitoring unintentional information leaks of running *** side-channel detection methods can identify numerous potential vulnerabilities in cryptographic implementations with a small amount of execution traces due to the high diffusion of secret inputs in crypto ***,because non-cryptographic programs cover different paths under various sensitive inputs,extending existing tools for identifying information leaks to non-cryptographic applications suffers from either insufficient path coverage or redundant *** address these limitations,we propose a new dynamic analysis framework named SPIDER that uses fuzzing,execution profiling,and clustering for a high path coverage and test suite reduction,and then speeds up the dynamic analysis of side-channel vulnerability detection in non-cryptographic *** analyze eight non-cryptographic programs and ten cryptographic algorithms under SPIDER in a fully automated way,and our results confirm the effectiveness of test suite reduction and the vulnerability detection accuracy of the whole framework.
In this paper, we consider a susceptible-infective-susceptible(SIS) reaction-diffusion epidemic model with spontaneous infection and logistic source in a periodically evolving domain. Using the iterative technique,the...
详细信息
In this paper, we consider a susceptible-infective-susceptible(SIS) reaction-diffusion epidemic model with spontaneous infection and logistic source in a periodically evolving domain. Using the iterative technique,the uniform boundedness of solution is established. In addition, the spatial-temporal risk index R0(ρ) depending on the domain evolution rate ρ(t) as well as its analytical properties are discussed. The monotonicity of R0(ρ)with respect to the diffusion coefficients of the infected dI, the spontaneous infection rate η(ρ(t)y) and interval length L is investigated under appropriate conditions. Further, the existence and asymptotic behavior of periodic endemic equilibria are explored by upper and lower solution method. Finally, some numerical simulations are presented to illustrate our analytical results. Our results provide valuable information for disease control and prevention.
The speeding-up and slowing-down(SUSD)direction is a novel direction,which is proved to converge to the gradient descent direction under some *** authors propose the derivative-free optimization algorithm SUSD-TR,whic...
详细信息
The speeding-up and slowing-down(SUSD)direction is a novel direction,which is proved to converge to the gradient descent direction under some *** authors propose the derivative-free optimization algorithm SUSD-TR,which combines the SUSD direction based on the covariance matrix of interpolation points and the solution of the trust-region subproblem of the interpolation model function at the current iteration *** analyze the optimization dynamics and convergence of the algorithm *** of the trial step and structure step are *** results show their algorithm’s efficiency,and the comparison indicates that SUSD-TR greatly improves the method’s performance based on the method that only goes along the SUSD *** algorithm is competitive with state-of-the-art mathematical derivative-free optimization algorithms.
We successfully constructed phase-change quantum dots string(PCQDS)systems and studied their signal *** PCQDs actually is a cascaded structure consisted of several stochastic resonance(SR)two-state systems,in which in...
详细信息
We successfully constructed phase-change quantum dots string(PCQDS)systems and studied their signal *** PCQDs actually is a cascaded structure consisted of several stochastic resonance(SR)two-state systems,in which inherent non-linearity,i.e.,phase-change of quantum dots(QDs),plays elementary and important roles to modulate signal *** established an SR model to simulate signal responses depending on stimulation *** know that some QDs will oscillate with input forcing frequency,while certain QDs will oscillate in their own frequency triggered by phase *** two effectscooperate togeneratepolymorphic response patterns,including action potential patterns exhibited by envelope of spike peak *** interesting and important simulation is that we replicate the memory effect in Nb-doped AINO,i.e.,a QDs dispersed *** result indicates that memory can occur in a system only constructed by volatile elementary units,implying memory existing in ***-term plasticity and spike-rate dependent plasticity can also be realized by using frequency and phase *** study provides a new scope to study signal handling and memory effect in quantum system.
暂无评论