Deep learning models are widely used in security-sensitive tasks such as facial recognition and autonomous driving. security issues in deep models could have serious implications for people’s lives, such as life-thre...
详细信息
In recent years, with the rapid development of deep learning technology, researchers in the field of network security have begun to explore the use of deep learning to solve the problem of encrypted traffic classifica...
详细信息
Purifying and reconstructing adversarial examples into benign ones by generative models is a class of defense methods to eliminate adversarial perturbations. These methods do not make assumptions on adversarial attack...
详细信息
The use of malware for illicit cyber activities, including network attacks and information theft, poses a severe threat to cybersecurity. In comparison to traditional malware detection methods based on signature and h...
详细信息
Deep neural networks have been widely applied in various critical domains. However, they are vulnerable to the threat of adversarial examples. It is challenging to make deep neural networks inherently robust to advers...
详细信息
Two-dimensional vibration measurement is essential for monitoring structure and machine health, especially providing more information than those 1D solutions. However, most existing 2D vibration monitoring methods req...
详细信息
Intelligent penetration testing is of great significance for the improvement of the security of informationsystems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t...
详细信息
Intelligent penetration testing is of great significance for the improvement of the security of informationsystems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers to obtain complete network information in realistic network scenarios,Reinforcement Learning(RL)is a promising solution to discover the optimal penetration path under incomplete information about the target *** RL-based methods are challenged by the sizeable discrete action space,which leads to difficulties in the ***,most methods still rely on experts’*** address these issues,this paper proposes a penetration path planning method based on reinforcement learning with episodic ***,the penetration testing problem is formally described in terms of reinforcement *** speed up the training process without specific prior knowledge,the proposed algorithm introduces episodic memory to store experienced advantageous strategies for the first ***,the method offers an exploration strategy based on episodic memory to guide the agents in *** design makes full use of historical experience to achieve the purpose of reducing blind exploration and improving planning ***,comparison experiments are carried out with the existing RL-based *** results reveal that the proposed method has better convergence *** running time is reduced by more than 20%.
Aiming at evaluating and predicting rapidly and accurately a high sensitivity receiver’s adaptability in complex electromagnetic environments,a novel testing and prediction method based on dual-channel multi-frequenc...
详细信息
Aiming at evaluating and predicting rapidly and accurately a high sensitivity receiver’s adaptability in complex electromagnetic environments,a novel testing and prediction method based on dual-channel multi-frequency is proposed to improve the traditional two-tone ***,two signal generators are used to generate signals at the radio frequency(RF)by frequency scanning,and then a rapid measurement at the intermediate frequency(IF)output port is carried out to obtain a huge amount of sample data for the subsequent ***,the IF output response data are modeled and analyzed to construct the linear and nonlinear response constraint equations in the frequency domain and prediction models in the power domain,which provide the theoretical criteria for interpreting and predicting electromagnetic susceptibility(EMS)of the *** experiment performed on a radar receiver confirms the reliability of the method proposed in this *** shows that the interference of each harmonic frequency and each order to the receiver can be identified and predicted with the sensitivity *** on this,fast and comprehensive evaluation and prediction of the receiver’s EMS in complex environment can be efficiently realized.
The energy efficiency issue caused by the memory wall in traditional von Neumann architecture is difficult to reconcile. In-memory computing(CIM) based on emerging nonvolatile memory(NVM) is a promising solution to av...
详细信息
The energy efficiency issue caused by the memory wall in traditional von Neumann architecture is difficult to reconcile. In-memory computing(CIM) based on emerging nonvolatile memory(NVM) is a promising solution to avoid data movement between storage and processors and realize highly energy-efficient computing. Compared with other NVM technologies, phase change random access memory(PCM) exhibits comprehensive performance for analog computing. In this paper, we review advanced PCM techniques,including phase-change materials, mechanisms, and unique properties, as a foundation and inspiration for implementing CIM architecture. Meanwhile, state-of-the-art PCM-based CIM systems are well discussed for high energy efficiency in artificial neural networks, spiking neural networks, and other artificial intelligence(AI) applications. Finally, we present the remaining challenges and potential solutions of CIM for further investigation.
Machine Learning and Artificial Intelligence technology accelerates technological progress and promotes social development, but also brings many security problems. Machine learning models may be affected, deceived, co...
详细信息
暂无评论