The QoS-aware traffic classification techniques of SdN networks is the basis for network to provide fine-grained QoS traffic engineering. In this paper, we propose an architecture which combines deep packet detection ...
详细信息
The QoS-aware traffic classification techniques of SdN networks is the basis for network to provide fine-grained QoS traffic engineering. In this paper, we propose an architecture which combines deep packet detection and semi-supervised machine learning of multi-classifier in SdN. This architecture can classify flows into different QoS categories. Based on this, network can achieve fine-grained adaptive QoS traffic engineering. Moreover, through deep packet detection techniques, network can maintain a dynamic flow database. Classifier can adapt to the rapid emergence of network application and fickle traffic characteristics of current network by periodically re-training with the dynamic flow database. Experiments verify that our classification framework can achieve good classification accuracy.
Quantitative evaluations are of great importance in network security *** recent years,moving target defense(MTd)has appeared to be a promising defense approach that blocks asymmetrical advantage of attackers and favor...
详细信息
Quantitative evaluations are of great importance in network security *** recent years,moving target defense(MTd)has appeared to be a promising defense approach that blocks asymmetrical advantage of attackers and favors the defender-notwithstanding,it has a limiteddeployment due to its uncertain efficiency and effectiveness in *** that case,quantitative metrics and evaluations of MTd are essential to prove its capability and impulse its further *** article presents a comprehensive survey on state-of-the-art quantitative ***,taxonomy of MTd techniques is stated according to the software stack ***,a concrete review and comparison on existing quantitative evaluations of MTd is ***,notice-worthy open issues regarding this topic are proposed along with the conclusions of previous studies.
In the 5 G mobile communication network virtualization scenario, how to deploy service function chaining of the core network efficiently is the key problem to realize the efficient deployment of virtual Evolved Packet...
详细信息
In the 5 G mobile communication network virtualization scenario, how to deploy service function chaining of the core network efficiently is the key problem to realize the efficient deployment of virtual Evolved Packet Core network services. In order to solve the problem that the existing deployment methods are difficult to meet the requirement of the mobile communication with low latency, this paper proposed a method for service function chaining deployment based on Q-learning. This method solved the problem by applying establish a Markov decision process model to the latency optimization in the context of VNF deployment, and then design a Q-learning algorithm to found the deployment solutions with minimum delay cost of network services. Simulation results show that the proposed method achieves better performances in terms of average processing time, request acceptance rate, gain and execution time.
The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G *** propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy **...
详细信息
The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G *** propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy ***,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current *** this way,the AN can only be eliminated from the jammed codeword by the legitimate *** the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit errorrate of the *** and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN.
In order to solve the problem of insufficient accuracy of the existing person re-identification *** propose a neural network model for identifying pedestrian properties and pedestrian Id. Compared with the existing me...
详细信息
In order to solve the problem of insufficient accuracy of the existing person re-identification *** propose a neural network model for identifying pedestrian properties and pedestrian Id. Compared with the existing methods, the model mainly has the following three advantages. First, our network adds extra full connection layer, ensure model migration ability. Second,based on the number of samples in each attribute, the loss function of each attribute has been normalized, avoid number unbalanced among the attributes to effect the identification accuracy. Third, we use the distribution of the attribute data in the prior knowledge, through the number to adjust the weight of each attribute in the loss layer, avoid the number of data sets for each attribute of positive and negative samples uneven impact on recognition. Experimental results show that the algorithm proposed in this paper has high recognition rate, and the rank-1 accuracy rate on dukeMTMC dataset is 72.83%,especially on Market1501 dataset. The rank-1 accuracy rate is up to 86.90%.
In order to solve the problem of sparse training samples in logo recognition task,a multi-type context-based logo data synthesis algorithm is *** algorithm comprehensively utilizes the local and full context of the lo...
详细信息
In order to solve the problem of sparse training samples in logo recognition task,a multi-type context-based logo data synthesis algorithm is *** algorithm comprehensively utilizes the local and full context of the logo object and the scene image to guide the synthesis of the logo *** experimental results on the FlickrLogos-32 show that the proposed algorithm can greatly improve the performance of the logo recognition algorithm without relying on additional manual annotation,verify the validity of the synthesis algorithm,and further prove that multi-type context can improve the performance of the object recognition algorithm.
The deep learning-based speech enhancement has shown considerable ***,it still suffers performance degradation under mismatch *** this paper,an adaptation method is proposed to improve the performance under noise mism...
详细信息
ISBN:
(纸本)9781510871076
The deep learning-based speech enhancement has shown considerable ***,it still suffers performance degradation under mismatch *** this paper,an adaptation method is proposed to improve the performance under noise mismatch ***,we advise a noise aware training by supplying identity vectors(ivectors) as parallel input features to adapt dNN acoustic models with the target ***,given a small amount adaptation data,the noise-dependent dNN is obtained by using Euclidean distance regularization from a noiseindependent dNN,and forcing the estimated masks to be close to the unadapted ***,experiments were carried out on different noise and SNr conditions,and the proposed method has achieved significantly 29% benefits of STOI at most and provided consistent improvement in PESQ and seg SNr against the baseline systems.
With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become in...
详细信息
With the popularization of the Internet, the production and living of people and even the security development of the country have been more and more dependent on cyberspace, the importance of cyberspace has become increasingly prominent. Network security should be paid more and more attention to. Mimicry defense is one of active defense technologies. We focused on the dHr architecture and give a research on mimicry scheduling mechanism based on negative feedback and we have analyzed the feasibility of this method in theory.
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt...
详细信息
ISBN:
(纸本)9781538683408
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt heterogeneity philosophy to improve the resilience of the network. For example, diverse variants are placed to nodes in the network. However, the existing works assume that diverse variants do not have common vulnerabilities, which is an invalid assumption in some real networks. Therefore, the existing diverse variant placement algorithms could not achieve optimal performance. In this paper, we consider the situation that some variants have common vulnerabilities. We model the correlation-aware diverse variant placement problem as an integer-programming optimization problem. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results show that compared with baseline algorithms, the proposed algorithms can effectively improve network resilience about 15%.
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by ...
详细信息
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by reducing the noise in Feature Maps (FMs). Our approach is divided into three steps. Firstly, we separate all the FMs into n blocks equally. Then, the weighted summation of FMs at the same position in all blocks constitutes a new block of FMs. Finally, we replicate this new block into n copies and concatenate them as the input to the FC layer. This sharing of FMs couldreduce the noise in them apparently and avert the impact by a particular FM on the specific part weight of hidden layers, hence preventing the network from overfitting to some extent. Using the Fermat Lemma, we prove that this method could make the global minima value range of the loss function wider, by which makes it easier for neural networks to converge and accelerates the convergence process. This methoddoes not significantly increase the amounts of network parameters (only a few more coefficients added), and the experiments demonstrate that this method could increase the convergence speed and improve the classification performance of neural networks.
暂无评论