Random testing is scalable but often fails to hit corner program behaviors,while systematic testing (e.g.,concolic execution) is promising to cover corner program behaviors but is not scalable to explore all program...
详细信息
Random testing is scalable but often fails to hit corner program behaviors,while systematic testing (e.g.,concolic execution) is promising to cover corner program behaviors but is not scalable to explore all program *** attempts to integrate random testing with systematic testing lack targeted *** this paper,we propose a guided hybrid testing approach,named BATON,to synergize random testing with concolic *** integrates the knowledge inside test cases and their executions into a conditional execution graph,and uses such knowledge to guide test case ***,we learn classification models for some conditionals in the conditional execution graph in a demand-driven *** models are used to guide random testing to reach and cover partially-covered *** further employ targeted concolic testing to cover conditionals that cannot be fully covered by guided random *** implemented BATONfor Java and evaluated it on three *** results show that BATONimproved branch coverage and mutation score over random testing by 16.2%–29.4%and 19.0%–30.0%,over adaptive random testing by 16.8%–33.8%and 19.4%–34.2%,over concolic testing by 2.3%–29.9%and 2.9%–30.1%,and over simple hybrid testing by 1.6%–14.5%and 1.4%–18.7%.
Most of current semantic communication (SemCom) frameworks focus on the image transmission, which, however, do not address the problem on how to deliver digital signals without any semantic features. This paper propos...
详细信息
To solve the privacy leakage problem of truck trajectories in intelligent logistics,this paper proposes a quadtreebased personalized joint location perturbation(QPJLP)algorithm using location generalization and local ...
详细信息
To solve the privacy leakage problem of truck trajectories in intelligent logistics,this paper proposes a quadtreebased personalized joint location perturbation(QPJLP)algorithm using location generalization and local differential privacy(LDP)***,a flexible position encoding mechanism based on the spatial quadtree indexing is designed,and the length of the encoding can be adjusted freely according to data ***,to meet the privacy needs of different locations of users,location categories are introduced to classify locations as sensitive and ordinary ***,the truck invokes the corresponding mechanism in the QPJLP algorithm to locally perturb the code according to the location category,allowing the protection of non-sensitive locations to be reduced without weakening the protection of sensitive locations,thereby improving data *** experiments demonstrate that the proposed algorithm effectively meets the personalized trajectory privacy requirements while also exhibiting good performance in trajectory proportion estimation and top-k classification.
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurat...
详细信息
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries,we propose an intra-inter network(IIN)for face forgery detection(FFD)in videos with continual *** proposed IIN mainly consists of three modules,i.e.,intra-module,inter-module,and forged trace masking module(FTMM).Specifically,the intra-module is trained for each kind of face forgeries by supervised learning to extract special features,while the inter-module is trained by self-supervised learning to extract the common *** a result,the common and special features of the different forgeries are decoupled by the two feature learning modules,and then the decoupled common features can be utlized to achieve high generalization ability for ***,the FTMM is deployed for contrastive learning to further improve detection *** experimental results on FaceForensic++dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in ***,the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.
Federated Class-Incremental Learning (FCIL) aims to design privacy-preserving collaborative training methods to continuously learn new classes from distributed datasets. In these scenarios, federated clients face the ...
详细信息
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the...
详细信息
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the constraint of a reconfigurable array,the LSLGM algorithm schedules node from a ready queue to the current reconfigurable cell array *** mapping a node,its successor’s indegree value will be dynamically *** its successor’s indegree is zero,it will be directly scheduled to the ready queue;otherwise,the predecessor must be dynamically *** the predecessor cannot be mapped,it will be scheduled to a blocking *** dynamically adjust the ready node scheduling order,the scheduling function is constructed by exploiting factors,such as node number,node level,and node *** with the loop subgraph-level mapping algorithm,experimental results show that the total cycles of the LSLGM algorithm decreases by an average of 33.0%(PEA44)and 33.9%(PEA_(7×7)).Compared with the epimorphism map algorithm,the total cycles of the LSLGM algorithm decrease by an average of 38.1%(PEA_(4×4))and 39.0%(PEA_(7×7)).The feasibility of LSLGM is verified.
Secure vector dominance is a key cryptographic primitive in secure computational geometry (SCG), determining the dominance relationship of vectors between two participants without revealing their private information. ...
详细信息
As a key communication technology in IEEE 802.15.4, Time Slot Channel Hopping (TSCH) enhances transmission reliability and interference immunity by scheduling of time slots and channel assignments. This paper presents...
详细信息
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user expe...
详细信息
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user experience. The exponential increase in worldwide Internet users and network traffic is continuously augmenting the diversity and complexity of network applications, rendering the Internet environment increasingly intricate and dynamic. Conventional machine learning techniques possess restricted processing abilities for network traffic attributes and struggle to address the progressively intricate traffic classification tasks in contemporary networks. In recent years, the swift advancement of deep learning technologies, particularly Graph Neural Networks (GNN), has yielded significant improvements in network traffic classification. GNN can capture the structured information among network nodes and extract the latent features of network traffic. Nonetheless, current network traffic classification models continue to exhibit deficiencies in the thoroughness of feature extraction. To tackle the problem, this research proposes a method for constructing traffic graphs utilizing numerical similarity and byte distance proximity by exploring the latent correlations among bytes, and it constructs a model, SDA-GNN, based on Graph Isomorphic Networks (GIN) for the categorization of network traffic. In particular, the Dynamic Time Warping (DTW) distance is employed to evaluate the disparity in byte distributions, a channel attention mechanism is utilized to extract additional features, and a Long Short-Term Memory Network (LSTM) enhances the stability of the training process by extracting sequence characteristics. Experimental findings on two actual datasets indicate that the SDA-GNN model surpasses other baseline techniques across multiple assessment parameters in the network traffic classification task, achieving classification accuracy enhancements of 2.19% and 1.49%
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhau...
详细信息
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhaust the UAV energy. The UAV anti-jamming communication performance, such as the outage probability, degrades if the robot relay is not aware of the jamming policies and the UAV network topology. In this paper, we propose a robot relay scheme for UAVs against smart jamming, which combines reinforcement learning with a function approximation approach named tile coding, to jointly optimize the robot moving distance and relay power with the unknown jamming channel states and locations. The robot mobility and relay policy are chosen based on the received jamming power, the robot received signal quality,location and energy consumption, and the bit error rate of the UAV messages. We also present a deep reinforcement learning version for the robot with sufficient computing resources. It uses three deep neural networks to choose the robot mobility and relay policy with reduced sample complexity, so as to avoid exploring dangerous policies that lead to the high outage probability of the UAV messages. The network architecture of the three networks is designed with fully connected layers instead of convolutional layers to reduce the computational complexity, which is analyzed by theoretical analyses. We provide the performance bound of the proposed schemes in terms of the bit error rate, robot energy consumption and utility based on a game-theoretic study. Simulation results show that the performance of our proposed relay schemes,including the bit error rate, the outage probability, and the robot energy consumption outperforms the existing schemes.
暂无评论