Cross-network user matching is one of the basic issues for realizing social network data integration. Existing research based on structure features provides a good matching method for nodes with high-degree, but ignor...
详细信息
As machine learning models are widely used in malicious traffic detection, model security has become an important research topic. Aiming at the problems that the model refactor attack methods need a large amount of pr...
详细信息
The covert communication technology represented by image steganography can realize the safe and reliable information transmission over an open network. Steganalysis is an important way to measure the security of stega...
The covert communication technology represented by image steganography can realize the safe and reliable information transmission over an open network. Steganalysis is an important way to measure the security of steganography. The application of deep learning in the field of steganalysis has begun to emerge and achieved certain results. However, the existing steganalysis methods based on deep learning extract limited global features and the detection accuracy still needs to be improved. Therefore, this manuscript proposes an improving CoatNet for spatial and JPEG domain steganalysis (IMCoatNet). Firstly, the SKAttention structure is used to extract fine-grained features. Then, the convolution layer, Transformer layer and the pyramid squeezed attention is used to capture multi-scale spatial features. Finally, a weighted loss is designed to enhance the expression ability of the model. The results show that compared with the traditional Spatial Rich Model (SRM) method, the classical deep residual network for steganalysis (SRNet), and the latest siamese CNN for steganalysis (SiaStegNet), the detection accuracy of the proposed CoatNet method for WOW steganography is improved by 19.61%, 4.33% and 5.04%, respectively; The proposed IMCoatNet is also superior on JPEG domain detection.
This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to...
详细信息
By establishing a mathematical model, the intelligent RGV scheduling scheme is optimized to design an efficient and stable intelligent RGV simulation scheduling system. This paper studies two different situations, inc...
详细信息
This paper proposes a new thermoviscoelastic finite deformation model incorporating dual relaxation mechanisms to predict the complete thermo-mechanical response of amorphous shape memory *** model is underpinned by t...
详细信息
This paper proposes a new thermoviscoelastic finite deformation model incorporating dual relaxation mechanisms to predict the complete thermo-mechanical response of amorphous shape memory *** model is underpinned by the detailed microscopic molecular mechanism and effectively reflects the current understanding of the glass transition *** evolution rules are obtained from the model to characterize the viscous flow,and a new theory named an internal stress model is introduced and combined with the dual relaxation mechanisms to capture the stress *** rationality of the constitutive model is verified as the theoretical results agree well with the experimental ***,the constitutive model is further simplified to facilitate engineering applications,and it can roughly capture the characteristics of shape memory polymers.
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ...
详细信息
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not...
详细信息
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS...
详细信息
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi...
详细信息
暂无评论