In this paper, we investigate secure communication over cellular uplinks in device-to-device(d2 d)-enabled cellular networks. We consider a more general scenario, in which multiple d2 d pairs could simultaneously shar...
详细信息
In this paper, we investigate secure communication over cellular uplinks in device-to-device(d2 d)-enabled cellular networks. We consider a more general scenario, in which multiple d2 d pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of d2 d pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users andd2 d pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding d2 d pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security andreliability of the typical cellular andd2 d links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability(COP)of d2 d pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.
The deep learning-based speech enhancement has shown considerable ***,it still suffers performance degradation under mismatch *** this paper,an adaptation method is proposed to improve the performance under noise mism...
详细信息
ISBN:
(纸本)9781510871076
The deep learning-based speech enhancement has shown considerable ***,it still suffers performance degradation under mismatch *** this paper,an adaptation method is proposed to improve the performance under noise mismatch ***,we advise a noise aware training by supplying identity vectors(ivectors) as parallel input features to adapt dNN acoustic models with the target ***,given a small amount adaptation data,the noise-dependent dNN is obtained by using Euclidean distance regularization from a noiseindependent dNN,and forcing the estimated masks to be close to the unadapted ***,experiments were carried out on different noise and SNr conditions,and the proposed method has achieved significantly 29% benefits of STOI at most and provided consistent improvement in PESQ and seg SNr against the baseline systems.
With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become in...
详细信息
With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become increasingly prominent. Network security should be paid more and more attention to. Mimicry defense is one of active defense technologies. We focused on the dHr architecture and give a research on mimicry scheduling mechanism based on negative feedback and we have analyzed the feasibility of this method in theory.
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt...
详细信息
ISBN:
(纸本)9781538683408
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt heterogeneity philosophy to improve the resilience of the network. For example, diverse variants are placed to nodes in the network. However, the existing works assume that diverse variants do not have common vulnerabilities, which is an invalid assumption in some real networks. Therefore, the existing diverse variant placement algorithms could not achieve optimal performance. In this paper, we consider the situation that some variants have common vulnerabilities. We model the correlation-aware diverse variant placement problem as an integer-programming optimization problem. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results show that compared with baseline algorithms, the proposed algorithms can effectively improve network resilience about 15%.
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by ...
详细信息
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by reducing the noise in Feature Maps (FMs). Our approach is divided into three steps. Firstly, we separate all the FMs into n blocks equally. Then, the weighted summation of FMs at the same position in all blocks constitutes a new block of FMs. Finally, we replicate this new block into n copies and concatenate them as the input to the FC layer. This sharing of FMs couldreduce the noise in them apparently and avert the impact by a particular FM on the specific part weight of hidden layers, hence preventing the network from overfitting to some extent. Using the Fermat Lemma, we prove that this method could make the global minima value range of the loss function wider, by which makes it easier for neural networks to converge and accelerates the convergence process. This methoddoes not significantly increase the amounts of network parameters (only a few more coefficients added), and the experiments demonstrate that this method could increase the convergence speed and improve the classification performance of neural networks.
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain r...
详细信息
ISBN:
(纸本)9781538683408
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain routing system, and find that it is constructed by two stages as key nodes/links failure andrelated nodes/links cascading failure. The first stage is shorter as the onset time is seconds' level, while the second stage is longer as the onset time is at least one hour. Then a two-phase detection method Fd-SP mechanism is put forward, the first stage of which adopts real-time detection methods to identify the initial failure nodes and links and the second stage uses dF 2 -CFM model to predict the damage range of cascade failure before true propagation. To validate Fd-SP, it is applied to security events containing cascading failures and the results of Fd-SP are compared with the datasets collected from rIPE during security events. Using the number of Update messages received by nodes as the metric, the maximum relative error is 1.69 and the average one is 0.92. As our prediction is a little large than reality, the false negative rate of Fd-SP is low.
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest ...
详细信息
ISBN:
(纸本)9781538695722;9781538695715
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest analysis methods based on the eye movement do not determine whether the area contains targets or not, in this paper a method was presented to predict the targets in the regions of interest using cognitive activities from eye movement. The methodrealized the detection and location of targets in remote-sensing images through the combination of fixation location and cognitive activity in eye movements. Experiments showed that the cognitive activities related to fixations make significant contribution to target prediction in the remote sensing image with complex backgrounds.
The manual expert scheduling, currently utilized in shortwave position system, is unable to satisfy the modern scenario of intensive tasks anddeficient resources, thus resulting in the low position accuracy. To addre...
详细信息
ISBN:
(纸本)9781450352895
The manual expert scheduling, currently utilized in shortwave position system, is unable to satisfy the modern scenario of intensive tasks anddeficient resources, thus resulting in the low position accuracy. To address the problem, we propose a shortwave-position-resource scheduling method based on Back Propagating Neural Network(BPNN) anddynamic Weight Adjustment(dWA). Firstly, we conceive a basic centralized optimization model for problem formulation, constructing an objective function consisted by Geometrical dilution of Precision(GdOP) and signal quality via linear weight summation. Furthermore, we study the dynamic adjustment strategy of weights. With weights updated according to the gradients of factors, the objective function inclines to the factor of better performance during iterations, thus leading to a better optimization searching ability. Moreover, by introducing the Bayesian regulation(Br) and Levenberg-Marquardt(LM) algorithm, we make an improvement on the generalization performance of BPNN, then achieving the signal quality estimation in the shortwave channel. Simulations indicate that the proposed method obtains an excellent robustness in scenes of different tasks number. When compared with other scheduling methods, the proposed method can effectively enhance the location accuracy. Experiments also show that the timeliness of the method is relatively low and needs further improvement.
Multi-label learning aims to predict the label sets an instance belongs *** Learning Machine(ELM),as a single-hidden layer feedforward neural network algorithm,has been extended to multi-label scenarios because of fas...
详细信息
ISBN:
(纸本)9781509036202
Multi-label learning aims to predict the label sets an instance belongs *** Learning Machine(ELM),as a single-hidden layer feedforward neural network algorithm,has been extended to multi-label scenarios because of faster learning speed and less human *** at dealing with the problem of ignoring the inter-label dependencies,the proposed method,ELM-LMF,decomposes the label matrix into latent label matrix mapping the label space to the latent space and the k-label dependency matrix preserving the interlabel relationships,classifies in latent space with ELM,and maps the predicted labels back to the original *** on 3 benchmark multi-label data sets with 3 other state-of-art methods prove the feasibility of ELM-LMF.
An collaborative filtering algorithm based on denoising Auto-Encoder and item embedding(CdAWE) was proposed to solve the absent analysis of item co-occurrence relation and the cold start of model para
ISBN:
(纸本)9781467389808
An collaborative filtering algorithm based on denoising Auto-Encoder and item embedding(CdAWE) was proposed to solve the absent analysis of item co-occurrence relation and the cold start of model para
暂无评论