There is considerable interest in the use of fractional programming (FP) for the communication system design because many problems in this area are fractionally structured. Notably, max-FP and min-FP are not interchan...
There is considerable interest in the use of fractional programming (FP) for the communication system design because many problems in this area are fractionally structured. Notably, max-FP and min-FP are not interchangeable in general if there are multiple ratios, so the two types of FP are often dealt with separately in the existing literature. As a result, an FP method for maximizing the signal-to-interference-plus-noise ratios (SINRs) typically cannot be used for minimizing the Cramér-Rao bounds (CRBs). In contrast, this work proposes a unified approach that bridges the gap between max-FP and min-FP. Particularly, we examine the theoretical basis of this unified approach from a minorization-maximization (MM) perspective, and in return obtain a matrix extension of this new FP technique. Moreover, this work presents two application cases: (i) joint radar sensing and (ii) multi-cell secure transmission, neither of which can be efficiently addressed by the existing FP tools.
In this paper we present the results of the Interactive Argument-Pair Extraction in Judgement Document Challenge held by both the Chinese AI and Law Challenge(CAIL)and the Chinese National Social Media Processing Conf...
详细信息
In this paper we present the results of the Interactive Argument-Pair Extraction in Judgement Document Challenge held by both the Chinese AI and Law Challenge(CAIL)and the Chinese National Social Media Processing Conference(SMP),and introduce the related data *** task challenged participants to choose the correct argument among five candidates proposed by the defense to refute or acknowledge the given argument made by the plaintiff,providing the full context recorded in the judgement documents of both *** received entries from 63 competing teams,38 of which scored higher than the provided baseline model(BERT)in the first phase and entered the second *** best performing system in the two phases achieved accuracy of 0.856 and 0.905,*** this paper,we will present the results of the competition and a summary of the systems,highlighting commonalities and innovations among participating *** SMP-CAIL2020-Argmine data set and baseline modelshave been already released.
Cyber-Physical System (CPS) integrates sensing, computation, cybernetics, and networking to control a hybrid physical system consisting of different functional subsystems, making the production process more intelligen...
Cyber-Physical System (CPS) integrates sensing, computation, cybernetics, and networking to control a hybrid physical system consisting of different functional subsystems, making the production process more intelligent and controllable. However, cyber-attacks during its operation will lead to abnormal system behaviors or even system breakdowns. In recent years, data-driven anomaly detection methods have been adopted to judge whether the CPS system is under cyber-attacks based on rich sensor measurements to avoid further economic losses or safety issues. However, the multi-process essence of CPS has not been adequately addressed in existing works to locate the processes or points being attacked for in-time actions. In this work, we proposed a Multi-Process Generative Adversarial Network (MP-GAN) framework to detect anomalous CPS statuses and locate cyber-attacks. Specifically, the Long-Short-Term-Memory Recurrent Neural Networks (LSTM-RNN) was adopted as the base model to capture the temporal correlation of time series distributions, and the data was transferred between latent space and data space in a bi-directional manner, which regulated the generator to generate more realistic samples and thus better grasping the underline principles of the system. Moreover, parallel generators were employed to capture system performances at different physical processes, thus localizing the attacked CPS processes. Experiments on three CPS datasets, two collected from the Secure Water Treatment (SWaT) system and one collected from the water Distribution (WADI) system, showed that the proposed MP-GAN framework effectively reported anomalies caused by various cyber-attacks inserted in these complex multiprocess CPSs, which outperforms the state-of-the-art methods and can also locate most of the detected irregularities at the corresponding stages where the attacks were inserted.
Deriving a priority vector from a pairwise comparison matrix (PCM) is a crucial step in the Analytical Hierarchy Process (AHP). Although there exists a priority vector that satisfies the conditions of order preservati...
详细信息
Recursive linear structural equation models and the associated directed acyclic graphs (DAGs) play an important role in causal discovery. The classic identifiability result for this class of models states that when on...
详细信息
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious JavaScript, among which static analysis-based methods play an important role because of their high effectiveness and efficiency. However, obfuscation techniques are commonly used in JavaScript, which makes the features extracted by static analysis contain many useless and disguised features, leading to many false positives and false negatives in detection results. In this paper, we propose a novel method to find out the essential features related to the semantics of JavaScript code. Specifically, we develop JS-Revealer, a robust, effective, scalable, and interpretable detector for malicious JavaScript. To test the capabilities of JSRevealer, we conduct comparative experiments with four other state-of-the-art malicious JavaScript detection tools. The experimental results show that JSRevealer has an average F1 of 84.8% on the data obfuscated by different obfuscators, which is 21.6%, 22.3%, 18.7%, and 22.9% higher than the tools CUJO, ZOZZLE, JAST, and JSTAP, respectively. Moreover, the detection results of JSRevealer can be interpreted, which can provide meaningful insights for further security research.
Large-scale scene point cloud registration with limited overlap is a challenging task due to computational load and constrained data acquisition. To tackle these issues, we propose a point cloud registration method, M...
详细信息
Purpose This paper aims to investigate the role of institutional quality in the relationship between mobile money and financial inclusion among Sub-Saharan Africa (SSA) from 2002 to 2022. Design/methodology/appro...
详细信息
Purpose This paper aims to investigate the role of institutional quality in the relationship between mobile money and financial inclusion among Sub-Saharan Africa (SSA) from 2002 to 2022. Design/methodology/approach The paper uses annual data from SSA on a bundle of four financial inclusion variables, six institutional quality indicators (i.e. rule of law, government effectiveness, control of corruption, voice and accountability, regulatory quality and political stability) and total volume of mobile money transaction in a year. The two-stage least squares regression was used to validate the hypotheses. Also, the random effects model was also used to account for potential unobserved heterogeneity across countries in SSA. Findings The empirical results reveal that institutional quality and mobile money have direct impact on financial inclusion. Also, institutional quality plays a positive and significant contingency role in the relationship between mobile money and financial inclusion. Originality/value The study contributes to financial inclusion theory by providing multi-country empirical evidence to validate the theory in explaining mobile money’s role in expanding financial access. It also highlights the key insight from financial inclusion theory regarding the need for strong governance institutions for technology-enabled inclusion. By examining interactions between mobile money, institutions and financial inclusion across 15 African SSA economies, the study allows for more generalizable conclusions about contextual dependencies.
Target threat assessment involves many uncertainties and is a tactical decision assessment problem with incomplete and uncertain information. In traditional target threat assessment, only the influence of the target...
Target threat assessment involves many uncertainties and is a tactical decision assessment problem with incomplete and uncertain information. In traditional target threat assessment, only the influence of the target's state attributes on its threat level is considered, while the target's type is ignored. To address this issue, radar target recognition is incorporated into the threat assessment process, and a method based on radar target recognition is proposed to improve the accuracy of threat assessment by incorporating Radar Cross Section (RCS) feature classifier into a Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). Using simulations, the practicability and viability of the above method are examined.
Inverse material design is a cornerstone challenge in materials science, withsignificant applications across many industries. Traditional approaches thatinvert the structure-property (SP) linkage to identify microstru...
详细信息
暂无评论