Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existin...
详细信息
Quantum machine learning has been developing in recent years, demonstrating great potential in various research domains and promising applications for pattern recognition. However, due to the constraints of quantum ha...
详细信息
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien...
详细信息
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition...
详细信息
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de...
详细信息
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th...
详细信息
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio...
详细信息
In recent years, with the continuous development of machine learning and deep learning, their related applications have gradually appeared in our field of vision, showing explosive growth. A deep learning compiler opt...
详细信息
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method...
详细信息
To solve the shortcomings of Particle Swarm Optimization(PSO)algorithm,local optimization and slow convergence,an Opposition-based Learning Adaptive Chaotic PSO(LCPSO)algorithm was *** chaotic elite opposition-based l...
详细信息
To solve the shortcomings of Particle Swarm Optimization(PSO)algorithm,local optimization and slow convergence,an Opposition-based Learning Adaptive Chaotic PSO(LCPSO)algorithm was *** chaotic elite opposition-based learning process was applied to initialize the entire population,which enhanced the quality of the initial individuals and the population diversity,made the initial individuals distribute in the better quality areas,and accelerated the search efficiency of the *** inertia weights were adaptively customized during evolution in the light of the degree of premature convergence to balance the local and global search abilities of the algorithm,and the reverse search strategy was introduced to increase the chances of the algorithm escaping the local *** LCPSO algorithm is contrasted to other intelligent algorithms on 10 benchmark test functions with different characteristics,and the simulation experiments display that the proposed algorithm is superior to other intelligence algorithms in the global search ability,search accuracy and convergence *** addition,the robustness and effectiveness of the proposed algorithm are also verified by the simulation results of engineering design problems.
暂无评论