This paper investigates the critical role of network survivability under random failures or targeted attacks in Network Function Virtualization (NFV) environments and assesses the survivability of NFV networks under d...
详细信息
Widespread availability of ChatGPT has posed new challenges for teaching and learning. The paper examines whether and how the chat can be used to support teaching and self-learning in engineering and technical s...
详细信息
Several variants of analytical conversion of the Strejc model to the First-Order Time Delay (FOTD) model have been proposed. This conversion extends the applicability of control system design methods that are based on...
详细信息
In this paper the MILP model for Vehicle Routing Problem with Time Windows (VRPTW) is presented in application of building facilities maintenance. Real-life constraints such as time limit constraint and penalties for ...
详细信息
With the successive application of deep learning(DL)in classification tasks,the DL-based modulation classification method has become the preference for its state-of-the-art ***,once the DL recognition model is pre-tra...
详细信息
With the successive application of deep learning(DL)in classification tasks,the DL-based modulation classification method has become the preference for its state-of-the-art ***,once the DL recognition model is pre-trained with fixed classes,the pre-trained model tends to predict incorrect results when identifying incremental ***,the incremental classes are usually emergent without label information or only a few labeled samples of incremental classes can be *** this context,we propose a graphbased semi-supervised approach to address the fewshot classes-incremental(FSCI)modulation classification *** proposed method is a twostage learning method,specifically,a warm-up model is trained for classifying old classes and incremental classes,where the unlabeled samples of incremental classes are uniformly labeled with the same label to alleviate the damage of the class imbalance *** the warm-up model is regarded as a feature extractor for constructing a similar graph to connect labeled samples and unlabeled samples,and the label propagation algorithm is adopted to propagate the label information from labeled nodes to unlabeled nodes in the graph to achieve the purpose of incremental classes *** results prove that the proposed method is superior to other finetuning methods and retrain methods.
Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(C...
详细信息
Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(CD-FSL).Utilizing more source domain data is an effective way to improve the performance of ***,knowledge from different source domains may entangle and confuse with each other,which hurts the performance on the target ***,we propose team-knowledge distllation networks(TKD-Net)to tackle this problem,which explores a strategy to help the cooperation of multiple ***,we distill knowledge from the cooperation of teacher networks to a single student network in a meta-learning *** incorporates task-oriented knowledge distillation and multiple cooperation among teachers to train an efficient student with better generalization ability on unseen ***,our TKD-Net employs both response-based knowledge and relation-based knowledge to transfer more comprehensive and effective *** experimental results on four fine-grained datasets have demonstrated the effectiveness and superiority of our proposed TKD-Net approach.
A cyber-physical attack is a security breach in cyber space that impacts on the physical environment. The number and diversity of such attacks against Cyber-Physical Systems (CPSs) are increasing at impressive rates. ...
详细信息
security assurance is a critical aspect in determining the trustworthiness of information and communicationtechnology systems. security assurance evaluation (SAE) is the process responsible for gathering assurance sh...
详细信息
Cybersecurity has become a paramount concern in light of the potential consequences of disruptions within the energy sector, such as widespread outages resulting from successful cyber-attacks. To meet this challenge t...
详细信息
This article proposes an intelligent frequency agile strategy design for radar network using coalition game theory to counter wideband sweep jamming, which is formulated as a two-stage decision-making problem. In the ...
详细信息
暂无评论