This paper introduces the application of unconditionally stable locally one-dimensional finite-difference time-domain(LOD-FDTD) method to 3D multi-pole Debye dispersive media model. Compared with other methods for dis...
详细信息
There are increasing cases where the class labels of test samples are unavailable, creating a significant need and challenge in measuring the discrepancy between training and test distributions. This distribution disc...
ISBN:
(纸本)9798331314385
There are increasing cases where the class labels of test samples are unavailable, creating a significant need and challenge in measuring the discrepancy between training and test distributions. This distribution discrepancy complicates the assessment of whether the hypothesis selected by an algorithm on training samples remains applicable to test samples. We present a novel approach called Importance Divergence (I-Div) to address the challenge of test label unavailability, enabling distribution discrepancy evaluation using only training samples. I-Div transfers the sampling patterns from the test distribution to the training distribution by estimating density and likelihood ratios. Specifically, the density ratio, informed by the selected hypothesis, is obtained by minimizing the Kullback-Leibler divergence between the actual and estimated input distributions. Simultaneously, the likelihood ratio is adjusted according to the density ratio by reducing the generalization error of the distribution discrepancy as transformed through the two ratios. Experimentally, I-Div accurately quantifies the distribution discrepancy, as evidenced by a wide range of complex data scenarios and tasks.
A hybrid subgrid scheme based on the conventional finite-difference time-domain (FDTD) schemes are proposed. The alternating-direction-implicit FDTD (ADI-FDTD) is used to calculate electromagnetic fields in fine grid ...
详细信息
A low coupling sparse array (LCSA) is presented, analyzed and discussed on the basis of the recent proposed uniform linear array (ULA) fitting scheme with close-expressions, and its performance with different uniform ...
详细信息
System programs are frequently coded in memory-unsafe languages such as C/C++, rendering them susceptible to a variety of memory corruption attacks. Among these, just-in-time return-oriented programming (JIT-ROP) stan...
详细信息
System programs are frequently coded in memory-unsafe languages such as C/C++, rendering them susceptible to a variety of memory corruption attacks. Among these, just-in-time return-oriented programming (JIT-ROP) stands out as an advanced form of code-reuse attack designed to circumvent code randomization defenses. JIT-ROP leverages memory disclosure vulnerabilities to dynamically harvest reusable code gadgets and construct attack payloads in real-time. To counteract JIT-ROP threats, researchers have developed multiple execute-only memory (XoM) prototypes to prevent dynamic reading and disassembly of memory pages. XoM, akin to the widely deployed W⊕X protection, holds promise in enhancing security. However, existing XoM solutions may not be compatible with legacy and commercial off-the-shelf (COTS) programs, or they may require patching the protected binary to separate code and data areas, leading to poor reliability. In addition, some XoM methods have to modify the underlying architectural mechanism, compromising compatibility and performance. In this paper, we present PXoM, a practical technique to seamlessly retrofit XoM into stripped binaries on the x86-64 platform. As handling the mixture of code and data is a well-known challenge for XoM, most existing methods require the strict separation of code and data areas via either compile-time transformation or binary patching, so that the unreadable permission can be safely enforced at the granularity of memory pages. In contrast to previous approaches, we provide a fine-grained memory permission control mechanism to restrict the read permission of code while allowing legitimate data reads within code pages. This novelty enables PXoM to harden stripped binaries but without resorting to error-prone embedded data relocation. We leverage Intel’s hardware feature, Memory Protection keys, to offer an efficient fine-grained permission control. We measure PXoM’s performance with both micro- and macrobenchmarks, and it only
The Cauchy loss function is robust to large outliers and has successful applications in signal processing. In this paper, a DOA estimation algorithm based on adaptive zero technology is proposed, which updates the wei...
The Cauchy loss function is robust to large outliers and has successful applications in signal processing. In this paper, a DOA estimation algorithm based on adaptive zero technology is proposed, which updates the weight of the filter by applying the Cauchy loss function, and further improves the algorithm performance by using the variable step size method. The algorithm step size is adjusted by accumulating errors and establishing a nonlinear function with instantaneous errors. The DOA estimation ability, estimation error and accuracy of the improved Cauchy algorithm in the impulse noise environment are analyzed. The algorithm is verified by simulation experiments.
Recent years have witnessed a growing interest in implementing mobile edge computing (MEC) into mine Internet of Things (IoT) networks to enable real-time monitoring and safety management. However, the spatial blockag...
详细信息
Two sparse adaptive filtering (AF) algorithms based on Andrew's sine estimator (ASE) are presented to achieve improved performance for identifying sparse systems, where the ASE is derived within the least-square f...
详细信息
In this paper, we introduce the interpolated multiple t-values of general level and represent a generating function for sums of interpolated multiple t-values of general level with fixed weight, depth, and height in t...
详细信息
A high-order spatial filtering-symplectic finite difference time domain (SF-SFDTD) scheme with controllable stability condition is proposed to solve the time-dependent Schrödinger equation (TDSE). Firstly, the hi...
详细信息
暂无评论