Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,mos...
详细信息
Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,most existing traffic classification techniques are inapplicable to the high-speed network *** this paper,we propose a High-speed Encrypted Traffic Classification(HETC)method containing two ***,to efficiently detect whether traffic is encrypted,HETC focuses on randomly sampled short flows and extracts aggregation entropies with chi-square test features to measure the different patterns of the byte composition and distribution between encrypted and unencrypted ***,HETC introduces binary features upon the previous features and performs fine-grained traffic classification by combining these payload features with a Random Forest *** experimental results show that HETC can achieve a 94%F-measure in detecting encrypted flows and a 85%–93%F-measure in classifying fine-grained flows for a 1-KB flow-length dataset,outperforming the state-of-the-art comparison ***,HETC does not need to wait for the end of the flow and can extract mass computing *** average time for HETC to process each flow is only 2 or 16 ms,which is lower than the flow duration in most cases,making it a good candidate for high-speed traffic classification.
The factors like production accuracy and completion time are the determinants of the optimal scheduling of the complex products work-flow,so the main research direction of modern work-flow technology is how to assure ...
详细信息
The factors like production accuracy and completion time are the determinants of the optimal scheduling of the complex products work-flow,so the main research direction of modern work-flow technology is how to assure the dynamic balance between the *** on the work-flow technology,restraining the completion time,and analyzing the deficiency of traditional minimum critical path algorithm,a virtual iterative reduction algorithm(VIRA)was proposed,which can improve production accuracy effectively with time *** VIRA with simplification as the core abstracts a virtual task that can predigest the process by combining the complex structures which are cyclic or parallel,finally,by using the virtual task and the other task in the process which is the iterative reduction strategy,determines a path which can make the production accuracy and completion time more balanced than the minimum critical path *** deadline,the number of tasks,and the number of cyclic structures were used as the factors affecting the performance of the algorithm,changing the influence factors can improve the performance of the algorithm effectively through the analysis of detailed ***,comparison experiments proved the feasibility of the VIRA.
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and so...
详细信息
Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack (PIA) against FedGNNs. Compared with prior works on centralized GNNs, in PIAFGNN, the attacker can only obtain the global embedding gradient distributed by the central server. The attacker converts the task of stealing the target user’s local embeddings into a regression problem, using a regression model to generate the target graph node embeddings. By training shadow models and property classifiers, the attacker can infer the basic property information within the target graph that is of interest. Experiments on three benchmark graph datasets demonstrate that PIAFGNN achieves attack accuracy of over 70% in most cases, even approaching the attack accuracy of inference attacks against centralized GNNs in some instances, which is much higher than the attack accuracy of the random guessing method. Furthermore, we observe that common defense mechanisms cannot mitigate our attack without affecting the model’s performance on mainly classification tasks.
The main aim of Interactive image segmentation is to accurately segment regions of interest by utilizing simple user-provided interactive information. Currently, the most popular training approach involves using the p...
详细信息
The effect of Mn element on shock response of CoCrFeNiMn_(x) high entropy alloys(HEAs)are investigated using molecular dynamics *** analysis shows that Mn-rich CoCrFeNiMn_(x) HEA has a larger average atomic *** elasti...
详细信息
The effect of Mn element on shock response of CoCrFeNiMn_(x) high entropy alloys(HEAs)are investigated using molecular dynamics *** analysis shows that Mn-rich CoCrFeNiMn_(x) HEA has a larger average atomic *** elastic properties of CoCrFeNiMn_(x) HEAs under various hydrostatic pressures are studied,revealing that the elastic modulus decreases with increasing of Mn *** shock thermodynamic parameters are quantitatively *** Mn-dependent shock Hugoniot relationship of CoCrFeNiMn_(x) HEAs is obtained:Us=1.25+(5.21–0.011x)*** relatively high shock pressure,the increase in Mn content promotes the formation of clustered BCC structures and hinders the development of *** addition,more FCC structures in Mn-rich CoCrFeNiMn_(x) HEAs transform into disordered structures during *** strength decreases with increasing Mn *** study can provide a reference for the design and application of CoCrFeNiMn HEAs under shock loading.
Segmented Active Constrained Layer Damping(SACLD)is an intelligent vibration-damping structure,which could be applied to the sectors of aviation,aerospace,and transportation engineering to reduce the vibration of flex...
详细信息
Segmented Active Constrained Layer Damping(SACLD)is an intelligent vibration-damping structure,which could be applied to the sectors of aviation,aerospace,and transportation engineering to reduce the vibration of flexible ***,machine learning technology is widely used in the engineering field because of its efficient multi-objective *** dynamic simulation of a rotational segmental flexible manipulator system is presented,in which enhanced active constrained layer damping is carried out,and the neural network model of Genetic Algorithm-Back Propagation(GA-BP)algorithm is *** suppression and structural optimization of the SACLD manipulator model are studied based on vibration mode and damping *** modal responses of the SACLD manipulator model at rest and rotation are *** addition,the four model indices are optimized using the GA-BP neural network:axial incision size,axial incision position,circumferential incision size,and circumferential incision ***,the best model for vibration suppression is obtained.
Balancing time,cost,and quality is crucial in intelligent ***,finding the optimal value of production parameters is a challengingnon-deterministic polynomial(NP)-hard *** the actual production process,the production p...
详细信息
Balancing time,cost,and quality is crucial in intelligent ***,finding the optimal value of production parameters is a challengingnon-deterministic polynomial(NP)-hard *** the actual production process,the production process has the characteristics of multi-stage ***,aiming at the difficult problem of multi-stage nonlinear production process optimization,this paper proposes a workflow optimization algorithm based on virtualization and nonlinear production quality under time constraints(T-OVQT).The algorithm proposed in this paper first abstracts the actual production process into a virtual workflow model,which is divided into three layers:The bottom production process collection layer,the middle layer of service node partial order composition layer,and the high level of virtual node collection ***,the virtual technology is used to reconstruct the node set and divide the task *** optimal solution is obtained through inverse iterative normalization and forward scheduling,and the global optimal solution is obtained by algorithm *** results demonstrate that this algorithm better meets actual production requirements than the traditional minimum critical path(MCP)algorithm.
To analyze the impact of solar eclipse attacks on the block-chain network and comprehensively and accurately evaluate the security of the current system,a method based on the Markov differential is proposed to solve t...
详细信息
To analyze the impact of solar eclipse attacks on the block-chain network and comprehensively and accurately evaluate the security of the current system,a method based on the Markov differential is proposed to solve the problem that it is difficult to meet the multi-stage continuous real-time randomness in the current block-chain network attack and defense ***-chain network security situation awareness method based on game *** method analyzes the security data generated by the solar eclipse attack,establishes the corresponding attack graph,and classifies the offensive and defensive strengths of the offensive and defensive *** a multi-stage offensive and defensive game,the security level of each node of the blockchain system is combined with the final objective function value comprehensively evaluates the real-time security status of the *** results of simulation experiments show that the proposed model and algorithm can not only effectively evaluate the overall security of the blockchain network,but also have feasibility in predicting the future security status.
The classical Ambarzumyan’s theorem states that if the Neumann eigenvalues of the Sturm-Liouville operator-d^(2)/dx^(2)+q with an integrable real-valued potential q on[0,π] are {n^(2):n≥0},then q=0 for almost all x...
详细信息
The classical Ambarzumyan’s theorem states that if the Neumann eigenvalues of the Sturm-Liouville operator-d^(2)/dx^(2)+q with an integrable real-valued potential q on[0,π] are {n^(2):n≥0},then q=0 for almost all x∈[0,π].In this work,the classical Ambarzumyan’s theorem is extended to the Dirac operator on equilateral tree *** prove that if the spectrum of the Dirac operator on graphs coincides with the unperturbed case,then the potential is identically zero.
暂无评论