With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
详细信息
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d...
详细信息
A linearized transformed L1 Galerkin finite element method(FEM)is presented for numerically solving the multi-dimensional time fractional Schr¨odinger *** optimal error estimates of the fully-discrete scheme are ...
详细信息
A linearized transformed L1 Galerkin finite element method(FEM)is presented for numerically solving the multi-dimensional time fractional Schr¨odinger *** optimal error estimates of the fully-discrete scheme are *** error estimates are obtained by combining a new discrete fractional Gr¨onwall inequality,the corresponding Sobolev embedding theorems and some inverse *** the previous unconditional convergence results are usually obtained by using the temporal-spatial error spitting *** examples are presented to confirm the theoretical results.
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati...
详细信息
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentation,and LF ***,there is a contradiction between spatial and angular resolution during the LF image acquisition *** overcome the above problem,researchers have gradually focused on the light field super-resolution(LFSR).In the traditional solutions,researchers achieved the LFSR based on various optimization frameworks,such as Bayesian and Gaussian *** learning-based methods are more popular than conventional methods because they have better performance and more robust generalization *** this paper,the present approach can mainly divided into conventional methods and deep learning-based *** discuss these two branches in light field spatial super-resolution(LFSSR),light field angular super-resolution(LFASR),and light field spatial and angular super-resolution(LFSASR),***,this paper also introduces the primary public datasets and analyzes the performance of the prevalent approaches on these ***,we discuss the potential innovations of the LFSR to propose the progress of our research field.
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in...
详细信息
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to *** foundation of cloud computing is based on virtual machines where boundaries among the a...
详细信息
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to *** foundation of cloud computing is based on virtual machines where boundaries among the application data are very thin,and the potential of data leakage exists all the *** instance,a virtual machine covert timing channel is an aggressive mechanism to leak confidential information through shared components or networks by violating isolation and security policies in *** performance of a covert timing channel(covert channel)is crucial to adversaries and attempts have been made to improve the performance of covert timing channels by advancing the encoding mechanism and covert information *** promising,the redundancy of the covert message is mainly *** paper applies three encoding schemes namely run-length,Huffman,and arithmetic encoding schemes for data compression of a virtual machine covert timing channel by exploiting ***,the paper studies the performance of such channels according to their ***,we show that these encoding schemes still contain redundancy in a covert channel scenario,and thereby a new encoding scheme namely optimized Runlength encoding(OptRLE)is presented that greatly enhances the performance of a covert timing *** optimizations schemes adopted by OptRLE are also discussed,and a mathematical model of the behavior of an OptRLE-based covert timing channel is *** theoretical capacity of a channel can be obtained using the proposed *** analysis reveals that OptRLE further improves the performance of a covert timing channel,in addition to the effects of the *** result shows how OptRLE affects the size of covert data and the capacity of covert timing channels,and why the performance of the covert timing channel is improved.
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem...
详细信息
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
详细信息
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u...
详细信息
Directed greybox fuzzing directs fuzzers to specified code areas and has gained great achievements in 1-day vulnerability detection. However, existing directed graybox fuzzers fail to generate the crash sample even if...
详细信息
暂无评论