Named Data Networking (NDN) shifts the network from host-centric to data-centric with a clean-slate design, in which packet forwarding is based on names, and the data plane maintains per-packet state. Different forwar...
详细信息
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user expe...
详细信息
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user experience. The exponential increase in worldwide Internet users and network traffic is continuously augmenting the diversity and complexity of network applications, rendering the Internet environment increasingly intricate and dynamic. Conventional machine learning techniques possess restricted processing abilities for network traffic attributes and struggle to address the progressively intricate traffic classification tasks in contemporary networks. In recent years, the swift advancement of deep learning technologies, particularly Graph Neural Networks (GNN), has yielded significant improvements in network traffic classification. GNN can capture the structured information among network nodes and extract the latent features of network traffic. Nonetheless, current network traffic classification models continue to exhibit deficiencies in the thoroughness of feature extraction. To tackle the problem, this research proposes a method for constructing traffic graphs utilizing numerical similarity and byte distance proximity by exploring the latent correlations among bytes, and it constructs a model, SDA-GNN, based on Graph Isomorphic Networks (GIN) for the categorization of network traffic. In particular, the Dynamic Time Warping (DTW) distance is employed to evaluate the disparity in byte distributions, a channel attention mechanism is utilized to extract additional features, and a Long Short-Term Memory Network (LSTM) enhances the stability of the training process by extracting sequence characteristics. Experimental findings on two actual datasets indicate that the SDA-GNN model surpasses other baseline techniques across multiple assessment parameters in the network traffic classification task, achieving classification accuracy enhancements of 2.19% and 1.49%
Task scheduling, which is important in cloud computing, is one of the most challenging issues in this area. Hence, an efficient and reliable task scheduling approach is needed to produce more efficient resource employ...
详细信息
Resistive random access memory(RRAM)enables the functionality of operating massively parallel dot prod-ucts and ***-based accelerator is such an effective approach to bridging the gap between Internet of Things device...
详细信息
Resistive random access memory(RRAM)enables the functionality of operating massively parallel dot prod-ucts and ***-based accelerator is such an effective approach to bridging the gap between Internet of Things devices'constrained resources and deep neural networks'tremendous *** to the huge overhead of Analog to Digital(A/D)and digital accumulations,analog RRAM buffer is introduced to extend the processing in analog and in *** analog RRAM buffer offers potential solutions to A/D conversion issues,the energy consumption is still challenging in resource-constrained environments,especially with enormous intermediate data ***,criti-cal concerns over endurance must also be resolved before the RRAM buffer could be frequently used in reality for DNN in-ference *** we propose LayCO,a layer-centric co-optimizing scheme to address the energy and endurance con-cerns altogether while strictly providing an inference accuracy *** relies on two key ideas:1)co-optimizing with reduced supply voltage and reduced bit-width of accelerator architectures to increase the DNN's error tolerance and achieve the accelerator's energy efficiency,and 2)efficiently mapping and swapping individual DNN data to a correspond-ing RRAM partition in a way that meets the endurance *** evaluation with representative DNN models demonstrates that LayCO outperforms the baseline RRAM buffer based accelerator by 27x improvement in energy effi-ciency(over TIMELY-like configuration),308x in lifetime prolongation and 6x in area reduction(over RAQ)while main-taining the DNN accuracy loss less than 1%.
With the rapid development and widespread application of information, computer, and communication technologies, Cyber-Physical-Social Systems (CPSS) have gained increasing importance and attention. To enable intellige...
详细信息
Generative Artificial Intelligence (GAI) possesses the capabilities of generating realistic data and facilitating advanced decision-making. By integrating GAI into modern Internet of Things (IoT), Generative Internet ...
详细信息
With the advent of Internet technologies, the concept of conventional vehicular ad hoc network is gradually migrating into the Internet of Vehicles (IoV). Meanwhile, as a common data structure composed of vertices and...
详细信息
With the advent of Internet technologies, the concept of conventional vehicular ad hoc network is gradually migrating into the Internet of Vehicles (IoV). Meanwhile, as a common data structure composed of vertices and edges, graph commonly used to represent road network typologies, are also outsourced to Internet servers for the convenience of people in IoV accessing the road network anytime and anywhere. However, it introduces much potential risks on people's privacy as the Internet servers are often assumed semi-honest. As an essential component in IoV, privacy-preserving shortest distance query has been researched many years in the cryptographic community. Unfortunately, most of solutions are designed under symmetric key setting and employ some off-the-shelf cryptographic primitives. They are impractical in the multi-user IoV environment due to an inherent weakness-key agreement required between each pair of a graph data provider and a user since the symmetric key encryption was born. Moreover, these off-the-shelf primitives ask multiple Internet servers or graph data providers to interact in the test process in order to assist one Internet server returning the shortest distance to users, both of which thereby raise a significant communication cost. To overcome these drawbacks, in this paper we propose an asymmetric searchable encryption scheme supporting shortest distance query, which is quite suitable for multi-user IoV environment since the key agreement is no longer required between each pair of a graph data provider and a user. In particular, we present a new cryptographic primitive instead of leveraging any ready-made one, that enables only one server in IoV to be required for returning the final query result - shortest distance to users without any interaction with others, thereby reducing the communication cost. Finally, a strict mathematical security proof is offered as well as some security attacks are analyzed, followed by an experimental evaluation an
In the realm of medical diagnostics, particularly in differential diagnosis, where differentiating between illnesses or ailments with comparable symptoms is essential, deep learning has gained importance. Recent devel...
详细信息
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ...
详细信息
In today's intelligent transportation systems, the effectiveness of image-based analysis relies heavily on image quality. To enhance images while preserving reversibility, this paper proposes a histogram matching-...
详细信息
暂无评论