Recently, cross-modal hashing has become a promising line of research in cross-modal retrieval. It not only takes advantage of complementary multiple heterogeneous data modalities for improved retrieval accuracy, but ...
详细信息
As one of the primary concerns of people, air quality, its pollution and management is an important topic. Air pollution can cause harm to human health, ecological environment, and social economy, and its pollution le...
详细信息
As satellite network communication systems become an increasingly pivotal role in modern life, The routine maintenance of satellite networks is challenging due to limited resources and their susceptibility to interfer...
详细信息
ISBN:
(数字)9798331518677
ISBN:
(纸本)9798331518684
As satellite network communication systems become an increasingly pivotal role in modern life, The routine maintenance of satellite networks is challenging due to limited resources and their susceptibility to interference. Satellite networks are more reliant on interruption detection systems than terrestrial networks. The importance of interruption detection systems in satellite networks is becoming increasingly evident. In this paper, we propose a novel intrusion detection model based on Proximal Policy Optimization (PPO). This method interacts with the environment to learn and optimize detection strategies, allowing for dynamic adaptation to environmental changes and attack patterns. We evaluated our model on benchmark datasets and compared its performance metrics against existing models. The results demonstrate that our proposed model significantly enhances overall accuracy and precision, and outperforms baseline models in terms of training convergence speed.
Due to high proliferation of unsolicited information in the text, image and video files, the social media analytics engine suffers from losing its user, user privacy and others. The unsolicited information is been a h...
详细信息
Efficient computation of graph diffusion equations (GDEs), such as Personalized PageRank, Katz centrality, and the Heat kernel, is crucial for clustering, training neural networks, and many other graph-related problem...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities at a single granularity (i.e., slice-level or function-level). In practice, slice-level vulnerability detection is fine-grained but may contain incomplete vulnerability details. Function-level vulnerability detection includes full vulnerability semantics but may contain vulnerability-unrelated statements. Meanwhile, they pay more attention to predicting whether the source code is vulnerable and cannot pinpoint which statements are more likely to be vulnerable. In this paper, we design mVulPreter, a multi-granularity vulnerability detector that can provide interpretations of detection results. Specifically, we propose a novel technique to effectively blend the advantages of function-level and slice-level vulnerability detection models and output the detection results' interpretation only by the model itself. We evaluate mVulPreter on a dataset containing 5,310 vulnerable functions and 7,601 non-vulnerable functions. The experimental results indicate that mVulPreter outperforms existing state-of-the-art vulnerability detection approaches (i.e., Checkmarx, FlawFinder, RATS, TokenCNN, StatementLSTM, SySeVR, and Devign). IEEE
User authentication on smart devices is crucial to protecting user privacy and device *** to the development of emerging attacks,existing physiological feature-based authentication methods,such as fingerprint,iris,and...
详细信息
User authentication on smart devices is crucial to protecting user privacy and device *** to the development of emerging attacks,existing physiological feature-based authentication methods,such as fingerprint,iris,and face recognition are vulnerable to forgery and *** this paper,GestureID,a system that utilizes acoustic sensing technology to distinguish hand features among users,is *** involves using a speaker to send acoustic signals and a microphone to receive the echoes affected by the reflection of the hand movements of the *** ensure system accuracy and effectively distinguish users’gestures,a second-order differential-based phase extraction method is *** method calculates the gradient of received signals to separate the effects of the user’s hand movements on the transmitted signal from the background ***,the secondorder differential phase and phase-dependent acceleration information are used as inputs to a Convolutional Neural Networks-Bidirectional Long Short-Term Memory(CNN-BiLSTM)model to model hand motion *** decrease the time it takes to collect data for new user registration,a transfer learning method is *** involves creating a user authentication model by utilizing a pre-trained gesture recognition *** a result,accurate user authentication can be achieved without requiring extensive amounts of training *** demonstrate that GestureID can achieve 97.8%gesture recognition accuracy and 96.3%user authentication accuracy.
The common target speech separation directly estimates the target source, ignoring the interrelationship between different speakers at each frame. We propose a multiple-target speech separation (MTSS) model to simulta...
详细信息
Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation mapping. This paper pro...
详细信息
Analyzing traffic accident data is crucial for pinpointing contributing factors’ forecasting accident patterns’ and informing effective safety measures. This insight leads to enhanced road safety’ decreased fatalit...
详细信息
暂无评论