we propose a cutting-edge solution that leverages passive adaptive methods based on ensemble learning to effectively detect anomalous traffic in data streams. Our approach tackles the issue of concept drift by integra...
详细信息
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human ***,security pr...
详细信息
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human ***,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and *** constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is ***,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in ***,few related works systematically introduce dynamic defense mechanisms for cyber *** related concepts and development strategies of dynamic defense are rarely analyzed and *** bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber ***,we firstly introduce basic concepts and define dynamic defense in cyber ***,we review the architectures,enabling techniques and methods for moving target defense and mimic *** is followed by taxonomically summarizing the implementation and evaluation of dynamic ***,we discuss some open challenges and opportunities for dynamic defense in cyber security.
With the advancement of artificial intelligence technology, intelligent applications have permeated all aspects of human life, including automatic driving, intelligent security, and face recognition. Convolutional neu...
详细信息
Aiming at the unbalanced problem of big data classification, this paper proposes a classification method of unbalanced data on the ground of Bayesian optimal neural network model. The method firstly uses Optimized Gra...
详细信息
As one of the most effective methods to improve the accuracy and robustness of speech tasks,the audio-visual fusion approach has recently been introduced into the field of Keyword Spotting(KWS).However,existing audio-...
详细信息
As one of the most effective methods to improve the accuracy and robustness of speech tasks,the audio-visual fusion approach has recently been introduced into the field of Keyword Spotting(KWS).However,existing audio-visual keyword spotting models are limited to detecting isolated words,while keyword spotting for unconstrained speech is still a challenging *** this end,an Audio-Visual Keyword Transformer(AVKT)network is proposed to spot keywords in unconstrained video *** authors present a transformer classifier with learnable CLS tokens to extract distinctive keyword features from the variable-length audio and visual *** outputs of audio and visual branches are combined in a decision fusion *** humans can easily notice whether a keyword appears in a sentence or not,our AVKT network can detect whether a video clip with a spoken sentence contains a pre-specified ***,the position of the keyword is localised in the attention map without additional position ***-imental results on the LRS2-KWS dataset and our newly collected PKU-KWS dataset show that the accuracy of AVKT exceeded 99%in clean scenes and 85%in extremely noisy *** code is available at https://***/jialeren/AVKT.
The rapid development of computer networks and network applications, along with the present global increase in hacking and computer network attacks, has increased the demand for stronger intrusion detection and preven...
详细信息
作者:
Butola, RajatLi, YimingKola, Sekhar ReddyNational Yang Ming Chiao Tung University
Parallel and Scientific Computing Laboratory Electrical Engineering and Computer Science International Graduate Program Hsinchu300093 Taiwan Institute of Pioneer Semiconductor Innovation
The Institute of Artificial Intelligence Innovation National Yang Ming Chiao Tung University Parallel and Scientific Computing Laboratory Electrical Engineering and Computer Science International Graduate Program The Institute of Communications Engineering the Institute of Biomedical Engineering Department of Electronics and Electrical Engineering Hsinchu300093 Taiwan
In this work, a dynamic weighting-artificial neural network (DW-ANN) methodology is presented for quick and automated compact model (CM) generation. It takes advantage of both TCAD simulations for high accuracy and SP...
详细信息
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati...
详细信息
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examination has been embraced to decide,how much these invariants are related with a network graph or molecular *** this paper,it will discuss three different variants of bridge networks with good potential of prediction in the field of computerscience,mathematics,chemistry,pharmacy,informatics and biology in context with physical and chemical structures and networks,because k-banhatti sombor invariants are freshly presented and have numerous prediction qualities for different variants of bridge graphs or *** study solved the topology of a bridge graph/networks of three different types with two invariants KBanhatti Sombor Indices and its reduced *** deduced results can be used for the modeling of computer networks like Local area network(LAN),Metropolitan area network(MAN),and Wide area network(WAN),backbone of internet and other networks/structures of computers,power generation,bio-informatics and chemical compounds synthesis.
The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of electric power transmission. However, the current deploym...
详细信息
In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular *** challenges can be potentially overcome by integrating communicati...
详细信息
In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular *** challenges can be potentially overcome by integrating communication,computing,caching,and control(i4C)*** this survey,we first give a snapshot of different aspects of the i4C,comprising background,motivation,leading technological enablers,potential applications,and use ***,we describe different models of communication,computing,caching,and control(4C)to lay the foundation of the integration *** review current stateof-the-art research efforts related to the i4C,focusing on recent trends of both conventional and artificial intelligence(AI)-based integration *** also highlight the need for intelligence in resources ***,we discuss the integration of sensing and communication(ISAC)and classify the integration approaches into various ***,we propose open challenges and present future research directions for beyond 5G networks,such as 6G.
暂无评论