The security of vehicle-to-everything (V2X) communication systems is of critical importance for intelligent transportation systems. This paper discusses the use of reconfigurable intelligent surface (RIS) technology t...
详细信息
Learners' affective states play a crucial role in learning evaluation, and the external expressions that can directly reflect affect are facial expressions. However, the sample size of the database for the learnin...
详细信息
Edge computation offloading has made some progress in the fifth generation mobile network(5G).However,load balancing in edge computation offloading is still a challenging ***,with the continuous pursuit of low executi...
详细信息
Edge computation offloading has made some progress in the fifth generation mobile network(5G).However,load balancing in edge computation offloading is still a challenging ***,with the continuous pursuit of low execution latency in 5G multi-scenario,the functional requirements of edge computation offloading are further *** the above challenges,we raise a unique edge computation offloading method in 5G multi-scenario,and consider user *** method consists of three functional parts:offloading strategy generation,offloading strategy update,and offloading strategy ***,the offloading strategy is generated by means of a deep neural network(DNN),then update the offloading strategy by updating the DNN ***,we optimize the offloading strategy based on changes in user *** summary,compared to existing optimization methods,our proposal can achieve performance close to the *** simulation results indicate the latency of the execution of our method on the CPU is under 0.1 seconds while improving the average computation rate by about 10%.
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee...
详细信息
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing deep learning compilers,TVM is well known for its efficiency in code generation and optimization across diverse hardware *** the meanwhile,the Sunway many-core processor renders itself as a competitive candidate for its attractive computational power in both scientific computing and deep learning *** paper combines the trends in these two ***,we propose swTVM that extends the original TVM to support ahead-of-time compilation for architecture requiring cross-compilation such as *** addition,we leverage the architecture features during the compilation such as core group for massive parallelism,DMA for high bandwidth memory transfer and local device memory for data locality,in order to generate efficient codes for deep learning workloads on *** experiment results show that the codes generated by swTVM achieve 1.79x improvement of inference latency on average compared to the state-of-the-art deep learning framework on Sunway,across eight representative *** work is the first attempt from the compiler perspective to bridge the gap of deep learning and Sunway processor particularly with productivity and efficiency in *** believe this work will encourage more people to embrace the power of deep learning and Sunwaymany-coreprocessor.
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
As an important computer vision task that can be used in many areas, facial expression recognition (FER) has been widely studied which much progress has been obtained especially when deep learning (DL) approaches have...
详细信息
Data-free generative modeling (GM) methods have gained much attention because pseudo data avoids security and privacy issues, and no amount limitation for storing real data in Class-Incremental Learning (CIL). However...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most circumstances,binary-level code similarity analysis(BCSA)has been paid much attention *** recent years,many BCSA studies incorporating Al techniques focus on deriving semantic information from binary functions with code representations such as assembly code,intermediate representations,and control flow graphs to measure the ***,due to the impacts of different compilers,architectures,and obfuscations,binaries compiled from the same source code may vary considerably,which becomes the major obstacle for these works to obtain robust *** this paper,we propose a solution,named UPPC(Unleashing the Power of Pseudo-code),which leverages the pseudo-code of binary function as input,to address the binary code similarity analysis challenge,since pseudocode has higher abstraction and is platform-independent compared to binary *** selectively inlines the functions to capture the full function semantics across different compiler optimization levels and uses a deep pyramidal convolutional neural network to obtain the semantic embedding of the *** evaluated UPPC on a data set containing vulnerabilities and a data set including different architectures(X86,ARM),different optimization options(O0-O3),different compilers(GCC,Clang),and four obfuscation *** experimental results show that the accuracy of UPPC in function search is 33.2%higher than that of existing methods.
The tracking performance of Multi-Object Tracking (MOT) has recently been improved by using discriminative appearance and motion features. However, dense crowds and occlusions significantly reduce the reliability of t...
详细信息
Aimed to mitigate the challenges associated with manual detection, such as elevated risks and limited accuracy, a machine vision-based automatic measurement method is proposed for determining the area of a ring cooler...
详细信息
暂无评论