Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th...
详细信息
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address this issue,this study proposes an innovative framework for correcting and predicting shipborne wind *** integrating a main network with a momentum updating network,the proposed framework effectively extracts features from the time and frequency domains,thereby allowing for precise adjustments and predictions of shipborne wind speed *** using real sensor data collected at the Qingdao Oceanographic Institute demonstrates that the proposed method outperforms existing approaches in single-and multi-step predictions compared to existing methods,achieving higher accuracy in wind speed *** proposed innovative approach offers a promising direction for future validation in more realistic maritime onboard scenarios.
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-...
详细信息
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-heterogeneous task ***,a variety of heterogeneous objects coexist in real-world SC *** dramatically expands the space for searching the optimal task allocation solution,affecting the quality and efficiency of data *** this paper,an aggregation-based dual heterogeneous task allocation algorithm is put *** investigates the impact of dual heterogeneous on the task allocation problem and seeks to maximize the quality of task completion and minimize the average travel *** problem is first proved to be ***,a task aggregation method based on locations and requirements is built to reduce task ***,a time-constrained shortest path planning is also developed to shorten the travel distance in a *** that,two evolutionary task allocation schemes are ***,extensive experiments are conducted based on real-world datasets in various *** with baseline algorithms,our proposed schemes enhance the quality of task completion by up to 25% and utilize 34% less average travel distance.
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil...
详细信息
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easily evade traditional signature-based methods. Due to the low requirements for computing resources compared to deep learning, many machine learning(ML)-based methods have been realistically deployed to address this issue. However, most existing ML-based DDo S detection methods are highly dependent on the features extracted from each flow, which incur remarkable detection delay and computation overhead. This article investigates the limitations of typical ML-based DDo S detection methods caused by the extraction of flow-level features. Moreover, we develop a cost-efficient window-based method that extracts features from a fixed number of packets periodically, instead of per flow, aiming to reduce the detection delay and computation overhead. The newly proposed window-based method has the advantages of well-controlled overhead and wide support of common routers due to its simplicity and high efficiency by design. Through extensive experiments on real datasets, we evaluate the performance of flow-based and window-based *** experimental results demonstrate that our proposed window-based method can significantly reduce the detection delay and computation overhead while ensuring detection accuracy.
The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new ***,existing research has largely overlooked the impact of noise and obfuscat...
详细信息
The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new ***,existing research has largely overlooked the impact of noise and obfuscation techniques commonly employed by malware authors to evade detection,and there is a critical gap in using noise simulation as a means of replicating real-world malware obfuscation techniques and adopting denoising framework to counteract these *** study introduces an image denoising technique based on a U-Net combined with a GAN framework to address noise interference and obfuscation challenges in image-based malware *** proposed methodology addresses existing classification limitations by introducing noise addition,which simulates obfuscated malware,and denoising strategies to restore robust image *** evaluate the approach,we used multiple CNN-based classifiers to assess noise resistance across architectures and datasets,measuring significant performance *** denoising technique demonstrates remarkable performance improvements across two multi-class public datasets,MALIMG and *** example,the MALIMG classification accuracy improved from 23.73%to 88.84%with denoising applied after Gaussian noise injection,demonstrating *** approach contributes to improving malware detection by offering a robust framework for noise-resilient classification in noisy conditions.
The importance of group communication in the context of the Internet of Things (IoT) is growing, yet the security and stability of this communication are facing significant challenges. The prevailing distributed group...
详细信息
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature o...
详细信息
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain *** such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication ***,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency *** mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for *** scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree *** divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and ***,we evaluate the performance of *** results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%.
With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,ad...
详细信息
With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,adversarial attacks on ICSs may compromise the ability of deep learning-based IDSs to accurately detect cyberattacks,leading to serious ***,in the process of generating adversarial samples,the selection of replacement models lacks an effective method,which may not fully expose the vulnerabilities of the *** authors first propose an automated FL-based method to generate adversarial samples in ICSs,called AFL-GAS,which uses the prin-ciple of transfer attack and fully considers the importance of replacement models during the process of adversarial sample *** the proposed AFL-GAS method,a lightweight neural architecture search method is developed to find the optimised replacement model composed of a combination of four lightweight basic ***,to enhance the adversarial robustness,the authors propose a multi-objective neural archi-tecture search-based IDS method against adversarial attacks in ICSs,called MoNAS-IDSAA,by considering both classification performance on regular samples and adver-sarial robustness *** experimental results on three widely used intrusion detection datasets in ICSs,such as secure water treatment(SWaT),Water Distribution,and Power System Attack,demonstrate that the proposed AFL-GAS method has obvious advantages in evasion rate and lightweight compared with other four ***,the proposed MoNAS-IDSAA method not only has a better classification performance,but also has obvious advantages in model adversarial robustness compared with one manually designed federated adversarial learning-based IDS method.
作者:
Gu, QiliangLu, Qin
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science
Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ...
详细信息
With the advancement of deep learning techniques,the number of model parameters has been increasing,leading to significant memory consumption and limits in the deployment of such models in real-time *** reduce the num...
详细信息
With the advancement of deep learning techniques,the number of model parameters has been increasing,leading to significant memory consumption and limits in the deployment of such models in real-time *** reduce the number of model parameters and enhance the generalization capability of neural networks,we propose a method called Decoupled MetaDistil,which involves decoupled *** method utilizes meta-learning to guide the teacher model and dynamically adjusts the knowledge transfer strategy based on feedback from the student model,thereby improving the generalization ***,we introduce a decoupled loss method to explicitly transfer positive sample knowledge and explore the potential of negative samples *** experiments demonstrate the effectiveness of our method.
作者:
Zhao, YueWang, JizhiKong, LingruiSui, TongtongShandong Computer Science Center
National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory
Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address...
详细信息
暂无评论