Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se...
详细信息
A surveillance system detects emergency vehicles stuck in traffic. This system helps manage traffic because the number of vehicles on the road has been increasing daily for years, causing congestion. This project impl...
详细信息
The common target speech separation directly estimates the target source, ignoring the interrelationship between different speakers at each frame. We propose a multiple-target speech separation (MTSS) model to simulta...
详细信息
As satellite network communication systems become an increasingly pivotal role in modern life, The routine maintenance of satellite networks is challenging due to limited resources and their susceptibility to interfer...
详细信息
ISBN:
(数字)9798331518677
ISBN:
(纸本)9798331518684
As satellite network communication systems become an increasingly pivotal role in modern life, The routine maintenance of satellite networks is challenging due to limited resources and their susceptibility to interference. Satellite networks are more reliant on interruption detection systems than terrestrial networks. The importance of interruption detection systems in satellite networks is becoming increasingly evident. In this paper, we propose a novel intrusion detection model based on Proximal Policy Optimization (PPO). This method interacts with the environment to learn and optimize detection strategies, allowing for dynamic adaptation to environmental changes and attack patterns. We evaluated our model on benchmark datasets and compared its performance metrics against existing models. The results demonstrate that our proposed model significantly enhances overall accuracy and precision, and outperforms baseline models in terms of training convergence speed.
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities at a single granularity (i.e., slice-level or function-level). In practice, slice-level vulnerability detection is fine-grained but may contain incomplete vulnerability details. Function-level vulnerability detection includes full vulnerability semantics but may contain vulnerability-unrelated statements. Meanwhile, they pay more attention to predicting whether the source code is vulnerable and cannot pinpoint which statements are more likely to be vulnerable. In this paper, we design mVulPreter, a multi-granularity vulnerability detector that can provide interpretations of detection results. Specifically, we propose a novel technique to effectively blend the advantages of function-level and slice-level vulnerability detection models and output the detection results' interpretation only by the model itself. We evaluate mVulPreter on a dataset containing 5,310 vulnerable functions and 7,601 non-vulnerable functions. The experimental results indicate that mVulPreter outperforms existing state-of-the-art vulnerability detection approaches (i.e., Checkmarx, FlawFinder, RATS, TokenCNN, StatementLSTM, SySeVR, and Devign). IEEE
Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation mapping. This paper pro...
详细信息
User authentication on smart devices is crucial to protecting user privacy and device *** to the development of emerging attacks,existing physiological feature-based authentication methods,such as fingerprint,iris,and...
详细信息
User authentication on smart devices is crucial to protecting user privacy and device *** to the development of emerging attacks,existing physiological feature-based authentication methods,such as fingerprint,iris,and face recognition are vulnerable to forgery and *** this paper,GestureID,a system that utilizes acoustic sensing technology to distinguish hand features among users,is *** involves using a speaker to send acoustic signals and a microphone to receive the echoes affected by the reflection of the hand movements of the *** ensure system accuracy and effectively distinguish users’gestures,a second-order differential-based phase extraction method is *** method calculates the gradient of received signals to separate the effects of the user’s hand movements on the transmitted signal from the background ***,the secondorder differential phase and phase-dependent acceleration information are used as inputs to a Convolutional Neural Networks-Bidirectional Long Short-Term Memory(CNN-BiLSTM)model to model hand motion *** decrease the time it takes to collect data for new user registration,a transfer learning method is *** involves creating a user authentication model by utilizing a pre-trained gesture recognition *** a result,accurate user authentication can be achieved without requiring extensive amounts of training *** demonstrate that GestureID can achieve 97.8%gesture recognition accuracy and 96.3%user authentication accuracy.
Serverless computing is an emerging paradigm of cloud computing, allowing developers to focus only on application logic development without the need to manage complex underlying tasks. This paradigm allows developers ...
详细信息
Twitter is one of Indonesia's most widely used social media to express positive and negative emotions. Negative emotions are referred to as emotional reactivity, an example of which is depression. To detect emotio...
详细信息
Alzheimer's disease (AD) is a widespread neurolog-ical condition affecting millions globally. It gradually advances, leading to memory loss, cognitive deterioration, and a substantial decline in overall quality of...
详细信息
暂无评论