Network traffic identification is critical for maintaining network security and further meeting various demands of network ***,network traffic data typically possesses high dimensionality and complexity,leading to pra...
详细信息
Network traffic identification is critical for maintaining network security and further meeting various demands of network ***,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data *** the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic ***,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal ***,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal ***,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate *** the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)*** simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO *** experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,***,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identificati
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired c...
详细信息
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired candidates in point-to-point ***,such patterns could yield a high number of false-positive co-peaks,resulting in over-segmentation whenever there are mutual *** tackle with this issue,this paper proposes an instance co-segmentation method via tensor-based salient co-peak search(TSCPS-ICS).The proposed method explores high-order correlations via triple-to-triple matching among feature maps to find reliable co-peaks with the help of co-saliency *** proposed method is shown to capture more accurate intra-peaks and inter-peaks among feature maps,reducing the false-positive rate of co-peak *** having accurate co-peaks,one can efficiently infer responses of the targeted *** on four benchmark datasets validate the superior performance of the proposed method.
Branched polyolefins with controllable topology structures were generated from the chain-walking(co)polymerizations of ethylene,1-pentene(1P)and 2-pentene(2P)using Brookhart-typeα-diimine Ni(II)-based catalysts posse...
详细信息
Branched polyolefins with controllable topology structures were generated from the chain-walking(co)polymerizations of ethylene,1-pentene(1P)and 2-pentene(2P)using Brookhart-typeα-diimine Ni(II)-based catalysts possessing different para-substituted groups,{[(4-R-2-Et-6-Me-C6H2N=C)2Nap]NiBr2,Nap:1,8-naphthdiyl;R=CHMePh,Ni1;R=Ph,Ni2;R=H,Ni3}.The X-ray diffraction analysis demonstrated that the crystalline structure of Ni1′is in centrosymmetric dimer structure mode with the bimetallic Ni center connected by two bromide *** para-sec-phenethyl moiety in the catalyst Ni1 obviously improved its catalytic performance and thermal stability in the ethylene *** Ni1/Et2AlCl system showed great catalytic activities(up to 7.73×106 g·mol-1·h-1)and achieved polyethylene(PE)with alkyl chains,including Me,Et,n-Pr,n-Bu,sec-Bu branches and longer chains(Lg).Compared with the 1-pentene polymerization,this catalyst system successfully mediated the polymerization of 2P to give highly branched polymers with approximately 195 branches/1000C possessing Me,Et,and n-Pr branches and a long methylene sequence due to the monomer *** Et branches derived from 2,3-insertion is slightly less than the sum of Me and n-Pr branches derived from 3,2-insertion,indicating that the 3,2-insertion mode is a slightly favorable pathway in the polymerization of 2P.
In this paper, different from previous traditional multi-exposure image fusion (MEF) algorithms that use handdesigned feature extraction approaches or deep learning-based algorithms that utilize convolutional neural n...
详细信息
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ...
详细信息
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance b...
详细信息
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance but suffer from error accumulation problems caused by mistakenly disambiguated instances. Although co-training can alleviate this issue by training two networks simultaneously and allowing them to interact with each other, most existing co-training methods train two structurally identical networks with the same task, i.e., are symmetric, rendering it insufficient for them to correct each other due to their similar limitations. Therefore, in this paper, we propose an asymmetric dual-task co-training PLL model called AsyCo,which forces its two networks, i.e., a disambiguation network and an auxiliary network, to learn from different views explicitly by optimizing distinct tasks. Specifically, the disambiguation network is trained with a self-training PLL task to learn label confidence, while the auxiliary network is trained in a supervised learning paradigm to learn from the noisy pairwise similarity labels that are constructed according to the learned label confidence. Finally, the error accumulation problem is mitigated via information distillation and confidence refinement. Extensive experiments on both uniform and instance-dependent partially labeled datasets demonstrate the effectiveness of AsyCo.
Depending on large-scale devices, the Internet of Things (IoT) provides massive data support for resource sharing and intelligent decision, but privacy risks also increase. As a popular distributed learning framework,...
详细信息
Depending on large-scale devices, the Internet of Things (IoT) provides massive data support for resource sharing and intelligent decision, but privacy risks also increase. As a popular distributed learning framework, Federated Learning (FL) is widely used because it does not need to share raw data while only parameters to collaboratively train models. However, Federated Learning is not spared by some emerging attacks, e.g., membership inference attack. Therefore, for IoT devices with limited resources, it is challenging to design a defense scheme against the membership inference attack ensuring high model utility, strong membership privacy and acceptable time efficiency. In this paper, we propose MemDefense, a lightweight defense mechanism to prevent membership inference attack from local models and global models in IoT-based FL, while maintaining high model utility. MemDefense adds crafted pruning perturbations to local models at each round of FL by deploying two key components, i.e., parameter filter and noise generator. Specifically, the parameter filter selects the apposite model parameters which have little impact on the model test accuracy and contribute more to member inference attacks. Then, the noise generator is used to find the pruning noise that can reduce the attack accuracy while keeping high model accuracy, protecting each participant's membership privacy. We comprehensively evaluate MemDefense with different deep learning models and multiple benchmark datasets. The experimental results show that lowcost MemDefense drastically reduces the attack accuracy within limited drop of classification accuracy, meeting the requirements for model utility, membership privacy and time efficiency. IEEE
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
Pedestrian re-identification technology enables accurate identification of individuals and is widely used in modern intelligent video surveillance systems to aid law enforcement, including criminal apprehension and lo...
详细信息
With the rapid development of nuclear energy,the removal of radioactive iodine generated during spent fuel reprocessing has become increasingly *** on the unique straw-like structure of populus tomentosa fiber(PTF)and...
详细信息
With the rapid development of nuclear energy,the removal of radioactive iodine generated during spent fuel reprocessing has become increasingly *** on the unique straw-like structure of populus tomentosa fiber(PTF)and the highly active iodine vapor capture ability of zero-valent silver nanoparticles(PTF@Ag^(0)NP),an Ag^(0)NP composite functional material with highly efficient iodine vapor capture capability was synthesized from biowaste PTF through ultrasonic and hightemperature hydrothermal methods in this *** iodine capture experiment demonstrated that PTF@Ag^(0)NP exhibits rapid iodine capture efficiency,reaching dynamic equilibrium within 4 h and a maximum capture capacity of 1008.1 mg/*** functional theory calculations show that PTF@Ag^(0)NP exhibits extremely high chemical reactivity toward iodine,with a reaction binding energy of-2.88 e ***,the molecular dynamics of PTF@Ag^(0)NP indicate that there is no atomic displacement at 77?C,indicating the excellent temperature stability of the material at the operating *** capture mechanism suggests that iodine vapor primarily reacts with Ag^(0)NP to form Ag I,and that the hydroxyl groups in PTF can also effectively capture iodine vapor by adsorption *** conclusion,PTF@Ag^(0)NP is expected to be an effective candidate adsorbent material for removing radioactive iodine vapor from exhaust gases during spent fuel reprocessing.
暂无评论