Intrusion detection plays an important role in ensuring network information security. Traditional machine learning technology does not work well enough with massive data and various intrusion classes, and detection ac...
Intrusion detection plays an important role in ensuring network information security. Traditional machine learning technology does not work well enough with massive data and various intrusion classes, and detection accuracy turns unsatisfied with unknown intrusions. This paper proposes a new network intrusion detection model (conv1d-GRU) that combines one-dimensional convolution and GRU for multi-class intrusion detection scenarios, and improves data imbalance by weighting the samples of each category. NSL-KDD as an improved version of the KDD CUP99 dataset is selected for our intrusion detection system. Experimental results on this dataset show that the proposed deep learning method is superior to present intrusion detection methods based on machine learning and deep learning, and has better feature representation learning and classification capabilities.
Few-shot learning (FSL) has emerged as an effective learning method and shows great potential. Despite the recent creative works in tackling FSL tasks, learning valid information rapidly from just a few or even zero s...
详细信息
The performance of modular multiplication directly influences the efficiency of a majority of encryption ***, there are numerous FPGA-based acceleration techniques targeting modular ***, many of these implementations ...
详细信息
In public-key encryption (PKE), ciphertexts received by a receiver may be possibly correlated and the security of a PKE relies on honestly generated system parameters. Security against selective opening attacks (SOA) ...
详细信息
QLC (4-bit-per-cell) and more-bit-per-cell 3D NAND flash memories are increasingly adopted in large storage systems. While achieving significant cost reduction, these memories face degraded performance and reliability...
详细信息
QLC (4-bit-per-cell) and more-bit-per-cell 3D NAND flash memories are increasingly adopted in large storage systems. While achieving significant cost reduction, these memories face degraded performance and reliability issues. The industry has adopted two-step programming (TSP), rather than one-step programming, to perform fine-granularity program control and choose gray-code encoding, as well as LDPC (Low-Density Parity-Check code) for error correction. Different flash manufacturers often integrate different gray-codes in their products, which exhibit different performance and reliability characteristics. Unfortunately, a fixed gray-code encoding design lacks the ability to meet the dynamic read and program performance requirements at both application and device *** this paper, we propose MGC, a multiple-gray-code encoding strategy, that adaptively chooses the best gray-code to meet the optimization goals at runtime. In particular, MGC first extracts the performance and reliability requirements based on application-level access patterns and detects the reliability degree of SSD. It then determines the appropriate gray-code to encode the data, either from host/user application or due to garbage collection, before writing the pages to the flash memory. MGC is integrated in FTL (flash translation layer) and enhances the flash controller to enable runtime gray-code arbitration. We evaluate the proposed MGC scheme. The results show that MGC achieves better performance and lifetime guarantee compared with state-of-the-arts and introduces little overhead.
Model-Based Systems engineering (MBSE) is a new method to engineer the modern large, complex systems. MBSE has a good guarantee for system reliability and it can improve the efficiency of system development. So, MBSE ...
Model-Based Systems engineering (MBSE) is a new method to engineer the modern large, complex systems. MBSE has a good guarantee for system reliability and it can improve the efficiency of system development. So, MBSE has received extensive attention from academia and industry. SysML is an auxiliary language for MBSE. SysML activity diagram can model the behavior of the system. In this paper, we use SysML activity diagram to generate test case. There are two main things in our work. One is that we have designed an automated SysML activity diagram test case generation method. Second, we develop a test case generation tool to support related applications in the industry.
In this paper, a novel model-free control scheme is proposed for synchronous motion control of multiple continuum robots. The control problem is formulated as two convex optimization routines in an adaptive and model-...
详细信息
ISBN:
(纸本)9781665405362
In this paper, a novel model-free control scheme is proposed for synchronous motion control of multiple continuum robots. The control problem is formulated as two convex optimization routines in an adaptive and model-free closed-loop framework. The proposed approach is heading to address cooperative task execution for multiple continuum robots. The model-free feedback control guarantees the high portability for a wide range of continuum robots. Simulation studies are conducted on two kinds of tasks, which are cooperative task execution with two robots and simultaneously tracking control with three robots. Besides, the superiority of proposed approach is validated through comparisons with other methods. Simulation results prove the high accuracy and efficiency of this model-free feedback control scheme.
The blockchain technology is complex and involves a wide range of fields, which leads to the lack of uniform specifications for the development of blockchain applications. Although blockchain used to be divided accord...
The blockchain technology is complex and involves a wide range of fields, which leads to the lack of uniform specifications for the development of blockchain applications. Although blockchain used to be divided according to the decentralized degree by some organizations, which are difficult to give developers specific guidance and results. To this end, this paper proposed a feature-oriented classification method of blockchain applications based on the analysis and comparison of current typical blockchain applications and frameworks, including digital currency blockchain, development platform blockchain, decentralized application and extended blockchain, helping developer create blockchain applications of a targeted manner and clarifying the functional architecture of different types of above various blockchain applications. Finally, the above classification method has been verified by the analysis of an extended blockchain.
暂无评论