Dynamic graph link prediction is widely utilized in the complex web of the real world, such as social networks, citation networks, recommendation systems, etc. Recent Transformer-based link prediction methods on dynam...
详细信息
In a Population-Based Meta-Heuristic Optimization Algorithm (PMOA), individuals in the population will constantly generate new promising individuals, to form new populations. Although the population continuously chang...
详细信息
In 2017, Zhang et al. proposed a question (not open problem) and two open problems in [IEEE TIT 63 (8): 5336–5349, 2017] about constructing bent functions by using Rothaus’ construction. In this note, we prove that ...
详细信息
For solving symmetric eigenvalue problems of extremely large matrices that cannot be stored in a whole in the computer memory, we propose a class of admissibly randomized coordinate descent methods by minimizing the c...
详细信息
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a...
详细信息
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease...
详细信息
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decreases rapidly in face of new evasion *** explore how to improve the robustness of classifiers for detecting adversarial attacks in PDF *** replacement and the n-gram are implemented to extract robust features using proposed guiding *** the two-stage machine learning model,the objects are divided based on their types,and the anomaly detection model is first trained for each type *** former detection results are organized into tree-like information structure and treated as inputs to convolutional neural *** results show that the accuracy of our classifier is nearly 100% and the robustness against evasive samples is *** object features also enable the identification of different vulnerabilities exploited in malicious PDF files.
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construct...
详细信息
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construction and encoding is settled perfectly in the case of m = 1. The optimal number of required maximally entangled pairs is discussed and an algorithm to determine the encoding and decoding circuits is proposed. We also generalize several bounds on p-ary EA stabilizer codes, such as the BCH bound, the G-V bound and the linear programming bound. However, the issue becomes tricky when it comes to m > 1, in which case, the former construction method applies only when the non-commuting "stabilizer" satisfies a sophisticated limitation.
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot...
详细信息
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty protocol. At present, there are relatively few proxy protocols that can be applied in practice. This paper analyzes the classic agent protocol mcTLS and pointed out the security issues. We focus on the security of TLS 1.3 and proposed a lattice-based multi-party proxy protocol:La TLS. LaTLS can be proved secure in the eCK model, it can resist key-sharing attacks, counterfeiting attacks, replay attacks, and achieve forward security. Compared with traditional DH and ECDH schemes, LaTLS is more effcient. Its security is based on the shortest vector problem, therefor it has anti-quantum attack properties.
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima...
详细信息
This paper explores the application of metaheuristic optimization methods in the context of Multiple Sclerosis (MS) detection, addressing the challenges of early and accurate diagnosis. It introduces Genetic Algorithm...
详细信息
暂无评论