Nowadays,cyberspace has become the "fifth frontier"after the ocean,land,air,and *** the globalization of information,cyberspace has never faced so many challenges,such as principle innovation,theory innovati...
详细信息
Nowadays,cyberspace has become the "fifth frontier"after the ocean,land,air,and *** the globalization of information,cyberspace has never faced so many challenges,such as principle innovation,theory innovation,technology innovation,and application ***,the transition from traditional cyberspace to new cyberspace is inevitable. In the future,cyberspace will have many important characteristics,such as openness,heterogeneity,mobility,dynamism,and security.
Software-defined Networking (SdN) is a promising method to simplify network management and facilitate network evolution. However, SdN is a logically centralized technology with global network-wide view. It faces the p...
详细信息
In order to solve the problem of sparse training samples in logo recognition task, a multi-type context-based logo data synthesis algorithm is proposed. The algorithm comprehensively utilizes the local and full contex...
In order to solve the problem of sparse training samples in logo recognition task, a multi-type context-based logo data synthesis algorithm is proposed. The algorithm comprehensively utilizes the local and full context of the logo object and the scene image to guide the synthesis of the logo image. The experimental results on the FlickrLogos-32 show that the proposed algorithm can greatly improve the performance of the logo recognition algorithm without relying on additional manual annotation, verify the validity of the synthesis algorithm, and further prove that multi-type context can improve the performance of the object recognition algorithm.
dear editor,Several studies have recently reported on major vulnerabilities in the Signaling system No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal ...
详细信息
dear editor,Several studies have recently reported on major vulnerabilities in the Signaling system No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal acquisition and tampering of mobile communication userdata, known as cellphone userdata. The cellphone userdata contain important information such as identity identification, location identification, security parameter-set. due to
Activation functions play a key role in providing remarkable performance in deep neural networks, and the rectified linear unit (reLU) is one of the most widely used activation functions. Various new activation functi...
详细信息
This letter proposes a tunable balanceddual-band bandpass filter (BPF) with high common-mode (CM) suppression based on tri-stub loadedresonator (TSLr). Two TSLrs terminated with varactordiodes are employed to obtai...
This letter proposes a tunable balanceddual-band bandpass filter (BPF) with high common-mode (CM) suppression based on tri-stub loadedresonator (TSLr). Two TSLrs terminated with varactordiodes are employed to obtain the tunable seconddifferential-mode (dM) passband, which is independent of the first one. For validation, a tunable balanceddual-band BPF is designed, fabricated and measured that achieve the continuous frequency-tuning range of the seconddM passband from 5.968 to 6.368 GHz with constant 3dB fractional bandwidth (FBW) of 6.8% ± 0.17% and CM rejection levels of over 30 dB. The measuredresults agree well with the simulated ones.
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key m...
详细信息
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key module. To lower the reasoning complexity and shorten the decision time, an intelligent evaluation model based on Stacked Auto-Encoder(SAE) is proposed, which simulates the reasoning mode of human decision-making, and learns commander's knowledge and experience through unsupervised and supervised training. Then, to improve the robustness and generalization ability of the deep learning model, a de-noising training method and sparsity constraints are introduced. Finally, simulation experiment is carried out to verify the scientificity and effectiveness of the proposed model.
The 5 th-generation mobile communication system(5 G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing exten...
详细信息
The 5 th-generation mobile communication system(5 G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5 G security technology. This paper analyzes the security requirements of 5 G business applications, network architecture, the air interface, and user privacy. The development trends of5 G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5 G security development. Several incremental 5 G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5 G.
Aiming at the problem of limited presentation ability and easy drift of results for a single feature, a joint fingerprint feature extraction algorithm based on the complexity and entropy of instantaneous parameter (C-...
详细信息
Aiming at the problem of limited presentation ability and easy drift of results for a single feature, a joint fingerprint feature extraction algorithm based on the complexity and entropy of instantaneous parameter (C-E) is proposed. From the perspective of signal information integrity, this paper multi-extract the secondary features of instantaneous amplitude, frequency and phase, and obtain the box dimension, information dimension, information entropy, as well as the Hilbert envelope spectrum information entropy newly proposed in this paper. Finally, the features are fused into C-E features to identify the individual radiation source. Compared with single class features, the recognition rate of the joint features is greatly improved at little time cost. In simulation experiment, the accuracy increases by 15.2% and 19.7% than fractal dimension and entropy respectively. And features have good independence and noise resistance underdifferent environments.
Traditional network routing protocol exhibits high statics and singleness, which provide significant advantages for the attacker. There are two kinds of attacks on the network: active attacks and passive attacks. Exis...
详细信息
Traditional network routing protocol exhibits high statics and singleness, which provide significant advantages for the attacker. There are two kinds of attacks on the network: active attacks and passive attacks. Existing solutions for those attacks are based on replication ordetection, which can deal with active attacks; but are helpless to passive attacks. In this paper, we adopt the theory of network coding to fragment the data in the Software-defined Networks and propose a network coding-basedresilient multipath routing scheme. First, we present a new metric named expected eavesdropping ratio to measure the resilience in the presence of passive attacks. Then, we formulate the network coding-basedresilient multipath routing problem as an integer-programming optimization problem by using expected eavesdropping ratio. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results demonstrate that the proposed algorithms improve the defense performance against passive attacks by about 20% when compared with baseline algorithms.
暂无评论