In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ...
详细信息
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge for malicious traffic *** have extensive studies on malicious traffic detection with single challenge,but the detection of complex traffic has not been widely *** adaptive random forests(QARF) is proposed to detect traffic streams with concept drift,imbalance and lack of labeled *** is an online active learning based approach which combines adaptive random forests method and adaptive margin sampling *** achieves querying a small number of instances from unlabeled traffic streams to obtain effective *** conduct experiments using the NSL-KDD dataset to evaluate the performance of *** is compared with other state-of-the-art *** experimental results show that QARF obtains 98.20% accuracy on the NSL-KDD *** performs better than other state-of-the-art methods in comparisons.
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not eff...
详细信息
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not effectively solve the problems such as the weak feature extraction ability of poetry text,which leads to the low performance of the model on sentiment analysis for Chinese classical *** this research,we offer the SA-Model,a poetic sentiment analysis ***-Model firstly extracts text vector information and fuses it through Bidirectional encoder representation from transformers-Whole word masking-extension(BERT-wwmext)and Enhanced representation through knowledge integration(ERNIE)to enrich text vector information;Secondly,it incorporates numerous encoders to remove text features at multiple levels,thereby increasing text feature information,improving text semantics accuracy,and enhancing the model’s learning and generalization capabilities;finally,multi-feature fusion poetry sentiment analysis model is *** feasibility and accuracy of the model are validated through the ancient poetry sentiment *** with other baseline models,the experimental findings indicate that SA-Model may increase the accuracy of text semantics and hence improve the capability of poetry sentiment analysis.
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different layers. Thirdly, a new decoupled detection head is proposed by redesigning the original network head based on the Diverse Branch Block module to improve detection accuracy and reduce missed and false detections. Finally, the Minimum Point Distance based Intersection-over-Union (MPDIoU) is used to replace the original YOLOv8 Complete Intersection-over-Union (CIoU) to accelerate the network’s training convergence. Comparative experiments and dehazing pre-processing tests were conducted on the RTTS and VOC-Fog datasets. Compared to the baseline YOLOv8 model, the improved algorithm achieved mean Average Precision (mAP) improvements of 4.6% and 3.8%, respectively. After defogging pre-processing, the mAP increased by 5.3% and 4.4%, respectively. The experimental results demonstrate that the improved algorithm exhibits high practicality and effectiveness in foggy traffic scenarios.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of the discrete map. In this work, the SC and CSC systems of the original map are derived, which enhance the chaotic performance while preserving the fundamental dynamical characteristics of the original map. Higher Lyapunov exponent of chaotic sequences corresponding to higher frequency are obtained in SC and CSC systems. Meanwhile, the Lyapunov exponent could be linearly controlled with greater flexibility in the CSC system. The verification of the numerical simulation and theoretical analysis is carried out based on the platform of CH32.
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tiles in turn until they complete a winning hand. An important notion in Mahjong is the deficiency number(*** number in Japanese Mahjong) of a hand, which estimates how many tile changes are necessary to complete the hand into a winning hand. The deficiency number plays an essential role in major decision-making tasks such as selecting a tile to discard. This paper proposes a fast algorithm for computing the deficiency number of a Mahjong hand. Compared with the baseline algorithm, the new algorithm is usually 100 times faster and, more importantly,respects the agent's knowledge about available tiles. The algorithm can be used as a basic procedure in all Mahjong variants by both rule-based and machine learning-based Mahjong AI.
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio...
详细信息
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial *** there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains *** this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start *** proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread *** core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear *** experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and ***,we find that our method maintains robustness irrespective of the number of sources and the average degree of *** with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
暂无评论