Most existing multimodal named entity recognition (MNEr) methods cannot align image and text well, and fail to effectively fuse image-text semantic information, leading to suboptimal MNEr accuracy. To this end, this p...
详细信息
With the advent of the "Internet +"era, various network media have developedrapidly, and network communication methods have emerged one after another. The development of social networks has further expanded...
详细信息
Network Function Virtualization (NFV) is proposed as new technology to address massive proprietary devices, high operation costs, poor flexibility and other problems in current traditional network. By separating netwo...
详细信息
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and...
详细信息
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature ***,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in ***,we analyze the security of MVX theory from the perspective of formal *** we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation *** propose SecMVX,a secure MVX architecture and variant generation *** evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX.
Network virtualization has been a particularly important driving force behind the development of NGN. Finding effective ways to control self-adapting virtual networks has become a research hot spot. This paper tries t...
详细信息
Network virtualization has been a particularly important driving force behind the development of NGN. Finding effective ways to control self-adapting virtual networks has become a research hot spot. This paper tries to find an efficient way in combining dynamic resource sensing with traffic character andrequirements in virtual network, based on that an intelligent cognition based virtual network resources management model has been put forward. We design a network topology view by coloring network topology matrix with current resources model. We present an intelligent virtual resource management mechanism based on the proposed network topology view. Experiment results illustrate that the proposed mechanism can improve VN capacity by automatic resource adjust-ment, which can obtain high utilization of VN resources without increasing computational expenses.
recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence(AI),fueling the jump in ChatGPT-like large language models(LLMs).As with any emerging technology,it is a two-sided coin,...
详细信息
recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence(AI),fueling the jump in ChatGPT-like large language models(LLMs).As with any emerging technology,it is a two-sided coin,bringing not only vast social impacts but also significant security concerns,especially in the socio-cognitive *** this back-ground,this work starts with an inherent mechanism analysis of cognitive domain games,from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune ***,inspired by behavioral mimicry in biology,this work will elaborate on new approaches to cognitive security from three aspects:Mimicry Computing,Mimicry defense,and Mimicry Intelligence.
The next generation of wireless technology, 6G, will likely incorporate advanced technologies such as extremely large-scale antenna arrays (ELAA) and millimeter wave (mmWave) communication. These cutting-edge features...
详细信息
Many networks in the real world are dynamically changing over time, and the community structure also changes accordingly. The community detection in the dynamic and constantly evolving network has received great atten...
详细信息
As a fundamental problem in the field of the network science,the study of topological evolution model is of great significance forrevealing the inherent dynamics and mechanisms of complex network *** order to study t...
详细信息
As a fundamental problem in the field of the network science,the study of topological evolution model is of great significance forrevealing the inherent dynamics and mechanisms of complex network *** order to study the influence of different scales of preferential attachment on topological evolution,a topological evolution model based on the attraction of the motif vertex is *** the perspective of network motif,this model proposes the concept of attraction of the motif vertex based on the degree of the motif,quantifies the influence of local structure on the node preferential attachment,and performs the preferential selection of the new link based on the Local World *** simulation experiments show that the model has the small world characteristic apparently,and the clustering coefficient varies with the scale of the local *** degree distribution of the model changes from power-law distribution to exponential distribution with the change of *** some cases,the piecewise power-law distribution is *** addition,the proposed model can present a network with different matching patterns as the parameters change.
dear editor,Physical-layer security (PLS) has been regarded as a prominent technique to achieve secure communications for heterogeneous networks (HetNets)with simultaneous wireless information and power transfer (SWIP...
详细信息
dear editor,Physical-layer security (PLS) has been regarded as a prominent technique to achieve secure communications for heterogeneous networks (HetNets)with simultaneous wireless information and power transfer (SWIPT)[1].
暂无评论