Network traffic anomaly detection plays a crucial role in today's network security and performance management. In response to the challenges in current network traffic data processing, such as insufficient structu...
详细信息
Federated Learning (FL) is a distributed privacy-protecting machine learning paradigm that enables collaborative training among multiple parties without the need to share raw data. This mode of training renders FL par...
详细信息
In the education sector, an increasing amount of research is beginning to explore the application of blockchain technology to credit banks. This paper proposes a consortium blockchain consensus mechanism tailored for ...
详细信息
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other ***,with the continuous expansion of the scale and increasing complexit...
详细信息
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other ***,with the continuous expansion of the scale and increasing complexity of IoT systems,the stability and security issues of IoT systems have become increasingly ***,it is crucial to detect anomalies in the collected IoT time series from various ***,deep learning models have been leveraged for IoT anomaly ***,owing to the challenges associated with data labeling,most IoT anomaly detection methods resort to unsupervised learning ***,the absence of accurate abnormal information in unsupervised learning methods limits their *** address these problems,we propose AS-GCN-MTM,an adaptive structural Graph Convolutional Networks(GCN)-based framework using a mean-teacher mechanism(AS-GCN-MTM)for anomaly *** performs better than unsupervised methods using only a small amount of labeled *** Teachers is an effective semi-supervised learning method that utilizes unlabeled data for training to improve the generalization ability and performance of the ***,the dependencies between data are often unknown in time series *** solve this problem,we designed a graph structure adaptive learning layer based on neural networks,which can automatically learn the graph structure from time series *** not only better captures the relationships between nodes but also enhances the model’s performance by augmenting key *** have demonstrated that our method improves the baseline model with the highest F1 value by 10.4%,36.1%,and 5.6%,respectively,on three real datasets with a 10%data labeling rate.
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the coupling strength via a unidirectional waveguide(IWG)can induce chaotic *** underlying reason for this phenomenon is that adjusting the phase and coupling strength via the phase shifter and IWG bring the system close to an exceptional point(EP),where field localization dynamically enhances the optomechanical nonlinearity,leading to the generation of chaotic *** addition,due to the sensitivity of chaos to phase in the vicinity of the EP,we propose a theoretical scheme to measure the optical phase perturbations using *** work may offer an alternative approach to chaos generation with current experimental technology and provide theoretical guidance for optical signal processing and chaotic secure communication.
Unmanned aerial vehicles(UAVs) can be effectively used as serving stations in emergency communications because of their free movements, strong flexibility, and dynamic coverage. In this paper, we propose a coordinated...
详细信息
Unmanned aerial vehicles(UAVs) can be effectively used as serving stations in emergency communications because of their free movements, strong flexibility, and dynamic coverage. In this paper, we propose a coordinated multiple points based UAV deployment framework to improve system average ergodic rate, by using the fuzzy C-means algorithm to cluster the ground users and considering exclusive forest channel models for the two cases, i.e., associated with a broken base station or an available base station. In addition, we derive the upper bound of the average ergodic rate to reduce computational complexity. Since deep reinforcement learning(DRL) can deal with the complex forest environment while the large action and state space of UAVs leads to slow convergence, we use a ratio cut method to divide UAVs into groups and propose a hierarchical clustering DRL(HC-DRL) approach with quick convergence to optimize the UAV deployment. Simulation results show that the proposed framework can effectively reduce the complexity, and outperforms the counterparts in accelerating the convergence speed.
Stroke is a kind of acute cerebrovascular disease, which is caused by the sudden rupture of blood vessels in the brain or the blockage of blood vessels that can not flow into the brain and cause brain tissue damage. S...
详细信息
Although matrix multiplication plays an essential role in a wide range of applications,previous works only focus on optimizing dense or sparse matrix *** Sparse Approximate Matrix Multiply(SpAMM)is an algorithm to acc...
详细信息
Although matrix multiplication plays an essential role in a wide range of applications,previous works only focus on optimizing dense or sparse matrix *** Sparse Approximate Matrix Multiply(SpAMM)is an algorithm to accelerate the multiplication of decay matrices,the sparsity of which is between dense and sparse *** addition,large-scale decay matrix multiplication is performed in scientific applications to solve cutting-edge *** optimize large-scale decay matrix multiplication using SpAMM on supercomputers such as Sunway Taihulight,we present swSpAMM,an optimized SpAMM algorithm by adapting the computation characteristics to the architecture features of Sunway ***,we propose both intra-node and inter-node optimizations to accelerate swSpAMM for large-scale *** intra-node optimizations,we explore algorithm parallelization and block-major data layout that are tailored to better utilize the architecture advantage of Sunway *** inter-node optimizations,we propose a matrix organization strategy for better distributing sub-matrices across nodes and a dynamic scheduling strategy for improving load balance across *** compare swSpAMM with the existing GEMM library on a single node as well as large-scale matrix multiplication methods on multiple *** experiment results show that swSpAMM achieves a speedup up to 14.5×and 2.2×when compared to xMath library on a single node and 2D GEMM method on multiple nodes,respectively.
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and...
详细信息
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and then they are open as public *** make the chaotic sequence more random,a mathematical model is constructed to improve the random ***,the plain image is compressed and encrypted to obtain the secret ***,the secret image is inserted with numbers zero to extend its size same to the plain *** applying IWT to the carrier image and discrete wavelet transformation(DWT)to the inserted image,the secret image is embedded into the carrier ***,a meaningful carrier image embedded with secret plain image can be obtained by inverse ***,the measurement matrix is built by both chaotic system and Hadamard matrix,which not only retains the characteristics of Hadamard matrix,but also has the property of control and synchronization of chaotic ***,information entropy of the plain image is employed to produce the initial conditions of chaotic *** a result,the proposed algorithm can resist known-plaintext attack(KPA)and chosen-plaintext attack(CPA).By the help of asymmetric cipher algorithm RSA,no extra transmission is needed in the *** simulations show that the normalized correlation(NC)values between the host image and the cipher image are *** is to say,the proposed encryption algorithm is imperceptible and has good hiding effect.
With the increasing complexity of graph query processing tasks, it is difficult for users to obtain the accurate cardinality before or during the execution of query tasks. Accurate estimate query cardinality is crucia...
详细信息
暂无评论