With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become in...
详细信息
With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become increasingly prominent. Network security should be paid more and more attention to. Mimicry defense is one of active defense technologies. We focused on the dHr architecture and give a research on mimicry scheduling mechanism based on negative feedback and we have analyzed the feasibility of this method in theory.
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain r...
详细信息
ISBN:
(纸本)9781538683408
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain routing system, and find that it is constructed by two stages as key nodes/links failure andrelated nodes/links cascading failure. The first stage is shorter as the onset time is seconds' level, while the second stage is longer as the onset time is at least one hour. Then a two-phase detection method Fd-SP mechanism is put forward, the first stage of which adopts real-time detection methods to identify the initial failure nodes and links and the second stage uses dF 2 -CFM model to predict the damage range of cascade failure before true propagation. To validate Fd-SP, it is applied to security events containing cascading failures and the results of Fd-SP are compared with the datasets collected from rIPE during security events. Using the number of Update messages received by nodes as the metric, the maximum relative error is 1.69 and the average one is 0.92. As our prediction is a little large than reality, the false negative rate of Fd-SP is low.
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest ...
详细信息
ISBN:
(纸本)9781538695722;9781538695715
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest analysis methods based on the eye movement do not determine whether the area contains targets or not, in this paper a method was presented to predict the targets in the regions of interest using cognitive activities from eye movement. The methodrealized the detection and location of targets in remote-sensing images through the combination of fixation location and cognitive activity in eye movements. Experiments showed that the cognitive activities related to fixations make significant contribution to target prediction in the remote sensing image with complex backgrounds.
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt...
详细信息
ISBN:
(纸本)9781538683408
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt heterogeneity philosophy to improve the resilience of the network. For example, diverse variants are placed to nodes in the network. However, the existing works assume that diverse variants do not have common vulnerabilities, which is an invalid assumption in some real networks. Therefore, the existing diverse variant placement algorithms could not achieve optimal performance. In this paper, we consider the situation that some variants have common vulnerabilities. We model the correlation-aware diverse variant placement problem as an integer-programming optimization problem. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results show that compared with baseline algorithms, the proposed algorithms can effectively improve network resilience about 15%.
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by ...
详细信息
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by reducing the noise in Feature Maps (FMs). Our approach is divided into three steps. Firstly, we separate all the FMs into n blocks equally. Then, the weighted summation of FMs at the same position in all blocks constitutes a new block of FMs. Finally, we replicate this new block into n copies and concatenate them as the input to the FC layer. This sharing of FMs couldreduce the noise in them apparently and avert the impact by a particular FM on the specific part weight of hidden layers, hence preventing the network from overfitting to some extent. Using the Fermat Lemma, we prove that this method could make the global minima value range of the loss function wider, by which makes it easier for neural networks to converge and accelerates the convergence process. This methoddoes not significantly increase the amounts of network parameters (only a few more coefficients added), and the experiments demonstrate that this method could increase the convergence speed and improve the classification performance of neural networks.
Multi-label learning aims to predict the label sets an instance belongs *** Learning Machine(ELM),as a single-hidden layer feedforward neural network algorithm,has been extended to multi-label scenarios because of fas...
详细信息
ISBN:
(纸本)9781509036202
Multi-label learning aims to predict the label sets an instance belongs *** Learning Machine(ELM),as a single-hidden layer feedforward neural network algorithm,has been extended to multi-label scenarios because of faster learning speed and less human *** at dealing with the problem of ignoring the inter-label dependencies,the proposed method,ELM-LMF,decomposes the label matrix into latent label matrix mapping the label space to the latent space and the k-label dependency matrix preserving the interlabel relationships,classifies in latent space with ELM,and maps the predicted labels back to the original *** on 3 benchmark multi-label data sets with 3 other state-of-art methods prove the feasibility of ELM-LMF.
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern cl...
详细信息
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern classification; closed loop systems; anddigital simulation.
An collaborative filtering algorithm based on denoising Auto-Encoder and item embedding(CdAWE) was proposed to solve the absent analysis of item co-occurrence relation and the cold start of model para
ISBN:
(纸本)9781467389808
An collaborative filtering algorithm based on denoising Auto-Encoder and item embedding(CdAWE) was proposed to solve the absent analysis of item co-occurrence relation and the cold start of model para
To investigate the predictive ability of radiomics signature for preoperative pathological grading of Hepatocellular Carcinomas (HCC), the no contrast MrI images were integrated and a comprehensive analysis was conduc...
详细信息
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform ...
详细信息
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform deployment and allocation of the acceleration resources is an urgent problem to be solved. Thus in this paper, a unifieddeployment architecture of acceleration resource for VNF is proposed firstly. On the basis of architecture, the problem of acceleration resource allocation is modeled. By analyzing the influence of acceleration resource for VNF on deployment of service chains, we propose the evaluation index of acceleration resource allocation algorithm for VNF. Finally, we design a two-stage acceleration resource allocation algorithm to solve the problem. The experimental results show that the proposed algorithm can rationally allocate acceleration resources to nodes in the entire network and improve the efficiency of acceleration resource utilization.
暂无评论