Interpolation methodologies have been widely used within the domain of indoor positioning systems. However, existing indoor positioning interpolation algorithms exhibit several inherent limitations, including reliance...
详细信息
A student portal is a regularly utilized expression to describe the login page where students can give a username and password to access an instruction association's projects and other learning related materials. ...
详细信息
Security and safety emerged as an interconnected concept for Cyber-Physical Systems (CPS). In recent years, CPS witnessed an enormous cyber-attack that endorsed the significance of security over safety of the CPS. Man...
Security and safety emerged as an interconnected concept for Cyber-Physical Systems (CPS). In recent years, CPS witnessed an enormous cyber-attack that endorsed the significance of security over safety of the CPS. Many cyber incidents have been recorded where intruders exploit security vulnerabilities that result in safety hazards. In literature, often times security and safety are discussed as a combined concern. This presses the need to treat security and safety as a mutual apprehension. However, more empirical evidence is required to support this mutuality of security and safety. To close this gap, we conducted an empirical study to identify hazard(s) using several methods including the Systematic Theoretical Accidental Model and Process (STAMP), Systematic Theoretic Process Analysis (STPA), Hazard and Operability Study (HAZOP) of a CPS i.e., case study of a Dam , and to performed the risk management (risk identification, risk analysis and mitigation) for the mentioned case study. Our focus remained on security and safety risks only. As a result, we identified all the possible unsafe control events and their potential hazards along with the severity level. Moreover, we suggested the risk mitigation mechanism against the identified hazards which may contribute to the accidents. This study holds implications for CPS practitioners and researchers exploring risk in CPS.
GPT-4 is often heralded as a leading commercial AI offering, sparking debates over its potential as a steppingstone toward artificial general intelligence. But does it possess consciousness? This paper investigates th...
详细信息
Syslog-based anomaly detection is crucial for protecting the systems from malicious attacks or malfunctions. System logs are semi-structured text messages printed by logging statements to record the system’s run-time...
Syslog-based anomaly detection is crucial for protecting the systems from malicious attacks or malfunctions. System logs are semi-structured text messages printed by logging statements to record the system’s run-time status, involving rich semantic information. However, the existing BERT-based log anomaly detection method is based on the log key sequence, does not consider the semantics of the log data, and discards the variable part, resulting in a high rate of missed detection. In this paper, we propose SemLog, a self-supervised framework for log anomaly detection based on BERT. By incorporating log semantics and variables and employing multi-feature fusion, we mitigate the independent assumption issue in the Masked Language Modeling model. The experimental results on three benchmarks show that SemLog achieves high performance compared with the state-of-the-art approaches for anomaly detection.
Introduction: The single space and the double space (DS). In this procedure, an image is used to watermark a digital database, where the image bytes are divided into binary strings that block the text attributes of th...
详细信息
In cross-domain few-shot classification, nearest centroid classifier (NCC) aims to learn representations to construct a metric space where few-shot classification can be performed by measuring the similarities between...
详细信息
Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channel...
详细信息
Traditional centralized multi-agent reinforcement learning (MARL) algorithms are sometimes unpractical in complicated applications due to non-interactivity between agents, the curse of dimensionality, and computation ...
详细信息
Traditional centralized multi-agent reinforcement learning (MARL) algorithms are sometimes unpractical in complicated applications due to non-interactivity between agents, the curse of dimensionality, and computation complexity. Hence, several decentralized MARL algorithms are motivated. However, existing decentralized methods only handle the fully cooperative setting where massive information needs to be transmitted in training. The block coordinate gradient descent scheme they used for successive independent actor and critic steps can simplify the calculation, but it causes serious bias. This paper proposes a exible fully decentralized actor-critic MARL framework, which can combine most of the actor-critic methods and handle large-scale general cooperative multi-agent settings. A primal-dual hybrid gradient descent type algorithm framework is designed to learn individual agents separately for decentralization. From the perspective of each agent, policy improvement and value evaluation are jointly optimized, which can stabilize multi-agent policy learning. Furthermore, the proposed framework can achieve scalability and stability for the large-scale environment. This framework also reduces information transmission by the parameter sharing mechanism and novel modeling-other-agents methods based on theory-of-mind and online supervised learning. Sufficient experiments in cooperative Multi-agent Particle Environment and StarCraft II show that the proposed decentralized MARL instantiation algorithms perform competitively against conventional centralized and decentralized methods.
Insider threats present a critical concern for network security of organizations, as malicious activities (data theft, hacking, security breaching, etc.) perpetrated by insiders with privileged access systems can resu...
详细信息
暂无评论