The QoS-aware traffic classification techniques of SdN networks is the basis for network to provide fine-grained QoS traffic engineering. In this paper, we propose an architecture which combines deep packet detection ...
详细信息
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key m...
详细信息
Studying and constructing the intelligent decision-making model for simulation entity can effectively improve the credibility and immersion of wargaming, in which intelligent evaluation of decision scheme is the key module. To lower the reasoning complexity and shorten the decision time, an intelligent evaluation model based on Stacked Auto-Encoder(SAE) is proposed, which simulates the reasoning mode of human decision-making, and learns commander's knowledge and experience through unsupervised and supervised training. Then, to improve the robustness and generalization ability of the deep learning model, a de-noising training method and sparsity constraints are introduced. Finally, simulation experiment is carried out to verify the scientificity and effectiveness of the proposed model.
With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become in...
详细信息
relation classification plays an important role in the field of natural language processing (NLP). Previous research on relation classification has verified the effectiveness of using convolutional neural network (CNN...
详细信息
relation classification plays an important role in the field of natural language processing (NLP). Previous research on relation classification has verified the effectiveness of using convolutional neural network (CNN) andrecurrent neural network (rNN). In this paper, we proposed a model that combine the rNN and CNN (rCNN), which will Give full play to theirrespective advantages: rNN can learn temporal and context features, especially long-term dependency between two entities, while CNN is capable of catching more potential features. We experiment our model on the SemEval-2010 Task 8 dataset 1 , and the result shows that our method is superior to most of the existing methods.
The 5 th-generation mobile communication system(5 G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing exten...
详细信息
The 5 th-generation mobile communication system(5 G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5 G security technology. This paper analyzes the security requirements of 5 G business applications, network architecture, the air interface, and user privacy. The development trends of5 G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5 G security development. Several incremental 5 G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5 G.
Aiming at the problem of limited presentation ability and easy drift of results for a single feature, a joint fingerprint feature extraction algorithm based on the complexity and entropy of instantaneous parameter (C-...
详细信息
Aiming at the problem of limited presentation ability and easy drift of results for a single feature, a joint fingerprint feature extraction algorithm based on the complexity and entropy of instantaneous parameter (C-E) is proposed. From the perspective of signal information integrity, this paper multi-extract the secondary features of instantaneous amplitude, frequency and phase, and obtain the box dimension, information dimension, information entropy, as well as the Hilbert envelope spectrum information entropy newly proposed in this paper. Finally, the features are fused into C-E features to identify the individual radiation source. Compared with single class features, the recognition rate of the joint features is greatly improved at little time cost. In simulation experiment, the accuracy increases by 15.2% and 19.7% than fractal dimension and entropy respectively. And features have good independence and noise resistance underdifferent environments.
Traditional network routing protocol exhibits high statics and singleness, which provide significant advantages for the attacker. There are two kinds of attacks on the network: active attacks and passive attacks. Exis...
详细信息
Traditional network routing protocol exhibits high statics and singleness, which provide significant advantages for the attacker. There are two kinds of attacks on the network: active attacks and passive attacks. Existing solutions for those attacks are based on replication ordetection, which can deal with active attacks; but are helpless to passive attacks. In this paper, we adopt the theory of network coding to fragment the data in the Software-defined Networks and propose a network coding-basedresilient multipath routing scheme. First, we present a new metric named expected eavesdropping ratio to measure the resilience in the presence of passive attacks. Then, we formulate the network coding-basedresilient multipath routing problem as an integer-programming optimization problem by using expected eavesdropping ratio. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results demonstrate that the proposed algorithms improve the defense performance against passive attacks by about 20% when compared with baseline algorithms.
role/block discovery is an essential task in network analytics so it has attracted significant attention recently. Previous studies on role discovery eitherrelied on first or second-order structural information to gr...
详细信息
ISBN:
(数字)9781450368681
ISBN:
(纸本)9781450368681
role/block discovery is an essential task in network analytics so it has attracted significant attention recently. Previous studies on role discovery eitherrelied on first or second-order structural information to group nodes but neglected the higherorder information orrequired the number of roles/blocks as the input which may be unknown in practice. To overcome these limitations, in this paper we propose a novel generative model, infinite motif stochastic blockmodel (IMM), forrole discovery in networks. IMM takes advantage of high-order motifs in the generative process and it is a nonparametric Bayesian model which can automatically infer the number of roles. To validate the effectiveness of IMM, we conduct experiments on synthetic andreal-world networks. The obtainedresults demonstrate IMM outperforms other blockmodels in role discovery task.
In this paper, we investigate the effect of different hyperparameters as well as different combinations of hyperparameters settings on the performance of the Attention-Gated Convolutional Neural Networks (AGCNNs), e.g...
详细信息
A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity ...
A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity and service quality. Combined with the historical information of the arbiter in the mimicry defense system, this paper proposed a random seed scheduling algorithm based on historical confidence for maximum heterogeneity and quality of service. First, the seed performer is randomly selected in the historical confidence executor that satisfies the threshold, and then the scheduling scheme is determined according to the maximum heterogeneity type and the quality of service indicator. The simulation results showed that the scheduling period of the algorithm is lower than the random scheduling algorithm. However, the scheduling effect is higher than the random scheduling algorithm, which achieved a gooddynamic balance between dynamics, security, and quality of service.
暂无评论