Joint video moment retrieval and highlight detection is a video understanding task that requires the model to construct multimodal interaction between heterogeneous features. Recent Transformer-based models mainly foc...
详细信息
Large Multimodal Models (LMMs) have achieved strong performance across a range of vision and language tasks. However, their spatial reasoning capabilities are under-investigated. In this paper, we construct a novel VQ...
详细信息
Tropical cyclones, characterized by strong winds and heavy rainfall, threaten human life in coastal regions crucial to the economy, including fisheries, agriculture, tourism, and infrastructure. Their frequent occurre...
详细信息
Evolutionary reinforcement learning algorithms (ERLs), which combine evolutionary algorithms (EAs) with reinforcement learning (RL), have demonstrated significant success in enhancing RL performance. However, most ERL...
详细信息
Image compression is a technique that reduces storage space and transmission bandwidth requirements by reducing the amount of image data, aiming to improve storage and transmission efficiency while maintaining accepta...
详细信息
Concurrent programs have brought about higher resource utilization and faster response times. However, the non-determinism in concurrent programs introduces concurrency bugs that are harder to detect than traditional ...
详细信息
Log-based anomaly detection plays a crucial role in maintaining the reliability of software systems. Unsupervised models are more suitable for real-world usage because they do not rely on huge data labeling efforts. H...
详细信息
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network *** Detection Systems(IDS)are essential for safeguardin...
详细信息
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network *** Detection Systems(IDS)are essential for safeguarding network *** address the low accuracy of existing intrusion detection models in identifying network attacks,this paper proposes an intrusion detection method based on the fusion of Spatial Attention mechanism and Residual Neural Network(SA-ResNet).Utilizing residual connections can effectively capture local features in the data;by introducing a spatial attention mechanism,the global dependency relationships of intrusion features can be extracted,enhancing the intrusion recognition model’s focus on the global features of intrusions,and effectively improving the accuracy of intrusion *** proposed model in this paper was experimentally verified on theNSL-KDD *** experimental results showthat the intrusion recognition accuracy of the intrusion detection method based on SA-ResNet has reached 99.86%,and its overall accuracy is 0.41% higher than that of traditional Convolutional Neural Network(CNN)models.
Tracking the flow of external inputs in a program with taint-analysis techniques can help developers better identify potential security vulnerabilities in the software. However, directly using the static taint analysi...
详细信息
With the expansion of network services,large-scale networks have progressively become *** network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are als...
详细信息
With the expansion of network services,large-scale networks have progressively become *** network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are also very ***,no matter what changes,the network must ensure the correct conditions,such as isolating tenants from each other or guaranteeing essential *** changes occur,it is necessary to verify the after-changed ***,for the verification of large-scale network configuration changes,many current verifiers show poor *** order to solve the problem ofmultiple global verifications caused by frequent updates of local configurations in large networks,we present a fast configuration updates verification tool,FastCUV,for distributed control *** aims to enhance the efficiency of distributed control plane verification for medium and large networks while ensuring *** paper presents a method to determine the network range affected by the configuration *** present a flow model and graph structure to facilitate the design of verification algorithms and speed up *** scheme verifies the network area affected by obtaining the change of the Forwarding Information Base(FIB)before and *** supports rich network attributes,meanwhile,has high efficiency and correctness *** experimental verification and result analysis,our method outperforms the state-of-the-art method to a certain extent.
暂无评论