With the rapid development of tourism, more and more people choose to travel by air, and the price fluctuation of air tickets is large and the law is not significant, which makes it necessary to use some bigdata tech...
详细信息
In order to resist network attacks on IoT devices, identifying IoT devices is the first step for ensuring device security. The traditional passive method identifies IoT devices by mining the potential relationship bet...
详细信息
ISBN:
(数字)9798350350128
ISBN:
(纸本)9798350350135
In order to resist network attacks on IoT devices, identifying IoT devices is the first step for ensuring device security. The traditional passive method identifies IoT devices by mining the potential relationship between traffic characteristics and devices. However, the form of selected traffic features are too singular without considering device behavioral characteristics and the classifier used is too specific with simple structure in these methods. This paper proposes a stacking ensemble learning approach for IoT device identification, ENSIOT, which fully considering the behavioral characteristics of devices and integrating the advantages of various machine learning methods to achieve efficient identification of IoT devices. Firstly, in the process of traffic processing, our method selects features from activity cycles, port numbers, signalling patterns, and cipher suites. Then, in model integration, many machine learning methods are used as base models to learn features selected, and output preliminary recognition results. Finally, the meta model learns the relationship between label and the recognition results of each base model and outputs the final device identification result. This stacking structure stacks the base models and the meta model to make a classifier with strong identification and generalization ability. Incremental learning is used to improve identification accuracy when traffic pattern changing. Comparative experiments are conducted on two datasets of UNSW and TMA-2021. The experimental results verify the effectiveness of ENSIOT, which achieve the accuracy of over 98% on two dataset and bring a noticeable improvement in terms of both accuracy and macro F1 score.
Generating coherent and credible explanations remains a significant challenge in the field of AI. In recent years, researchers have delved into the utilization of entailment trees to depict explanations, which exhibit...
详细信息
Sequential Recommendation (SR) intends to model user interests based on historical behavior sequences and suggest the next item. Most existing sequential models primarily focus on learning users’ preferences on the r...
详细信息
ISBN:
(数字)9798350354096
ISBN:
(纸本)9798350354102
Sequential Recommendation (SR) intends to model user interests based on historical behavior sequences and suggest the next item. Most existing sequential models primarily focus on learning users’ preferences on the relevance objective of the target item. However, the investigation of personalized preferences on the diversity objective of SR results is usually ignored. Evolutionary algorithms have amply demonstrated effectiveness in solving multi-objective problems but encounter efficiency bottlenecks when applied to multi-objective recommendation tasks due to the limited scalability at the user level. To address the problem, this study proposes to facilitate diversified SR via a multi-objective transfer optimization algorithm, in which each optimization task corresponds to the recommendation for a target user. With the optimization knowledge of user preference transferred within and across tasks, the diversified SR of a set of users can synchronously proceed. The novelty of our proposed algorithm is fully utilizing the outstanding global search capability of evolutionary multi-objective optimization without hindering the efficiency of sequential models.
In this paper, the discrete-time modified algebraic Riccati equation (MARE) is solved when the system model is completely unavailable. To achieve this, firstly a brand new iterative method based on the standard discre...
详细信息
In this research, a novel deep time-series model, MSIPA, is introduced for predicting complications and deterioration in ICU patients. Unlike conventional models, MSIPA efficiently handles data across varied time inte...
In this research, a novel deep time-series model, MSIPA, is introduced for predicting complications and deterioration in ICU patients. Unlike conventional models, MSIPA efficiently handles data across varied time intervals, offering enhanced accuracy, particularly with discontinuous time series. It outperforms other deep learning models in multiple tasks, emphasizing the promise of deep time series prediction in healthcare.
This paper proposes an ocean front database and a method for its construction tailored for studying the dynamic evolution of ocean fronts. Ocean fronts play a crucial role in the interactions between the ocean and atm...
This paper proposes an ocean front database and a method for its construction tailored for studying the dynamic evolution of ocean fronts. Ocean fronts play a crucial role in the interactions between the ocean and atmosphere, affecting the transfer of heat and matter in the ocean. In recent years, research on ocean fronts has emerged as a significant and rapidly evolving area within oceanography. With the development of ocean remote sensing technology, the amount of available ocean remote sensing data has been increasing. However, the potential of this expanding volume of ocean front data remains largely untapped. The lag in data processing technology has hindered research progress in understanding ocean fronts despite the growing amount of data available. To bridge this gap, this paper proposes an ocean front dynamic evolution database along with a method for its construction to further promote research into the variations and interactions of ocean fronts. This is especially relevant for studies utilizing deep learning to explore the dynamic evolution of ocean fronts. Specifically, the proposed database is designed to capture the variation processes of ocean front enhancement and attenuation, as well as the interactions during ocean front splitting and merging. The proposed database construction method allows for the segmentation and extraction of specific ocean fronts of interest from ocean front images. The proposed method is beneficial for analyzing the dynamic evolution between multiple ocean fronts on the same timeline.
Bug localization, which aims to automatically locate buggy source code files based on the given bug report, is a critical yet time-consuming task in the software engineering field. Existing advanced bug localization m...
Bug localization, which aims to automatically locate buggy source code files based on the given bug report, is a critical yet time-consuming task in the software engineering field. Existing advanced bug localization methods have successfully leveraged deep learning to bridge the lexical gap between bug reports and source code files at the semantic level. These methods usually first build the entire source code file semantic representation and then match it with the bug report. However, the bug described in the bug report may be related to only part of the source code file semantics. Directly constructing a semantic representation of the entire source code file would increase the difficulty of semantic matching between bug reports and source code files. In this paper, we propose a novel model named S-BugLocator, which decomposes source code file with the help of program slicing. Especially, our proposed S-BugLocator incorporates two distinctly structured slice feature extraction components in processing source code files to cope with the significant discrepancy between multi-row slices and single-row slices. For each multi-row slice, a CNN and Bi-LSTM network is firstly employed to extract its semantics and then a keywords supervised attention mechanism is designed to build its semantic representation by focusing on slices that have strong relevance with the bug report. For each single-row slice, the semantic representation is obtained by fusing word embeddings in single-row slices. The experimental results on four real-world large-scale projects indicate that our proposed model outperforms existing state-of-the-art bug localization methods.
Accurate solutions are needed for a variety of computer vision applications, including medical imaging, object detection, and recognition. Such complicated challenges are beyond the capabilities of artificial intellig...
详细信息
作者:
Zhang, BoZhang, ZhiqinSchool of Computer Science
Wuhan Donghu University Hubei Key Laboratory of Big Data in Science and Technology Wuhan Library of Chinese Academy of Science Wuhan430212 China
One belt, one road area, tourism research in the Tai Wan District of Guangdong, Hong Kong and Macao is mainly focused on the integration mechanism of culture, commerce and tourism in Guangdong, Hong Kong and Macau, an...
详细信息
暂无评论