In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r...
详细信息
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ...
详细信息
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall...
详细信息
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ...
详细信息
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen...
详细信息
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l...
详细信息
Users usually focus on the application-level requirements which are quite friendly and direct to them. However, there are no existing tools automating the application-level requirements to infrastructure provisioning ...
详细信息
In recent years, artificial intelligence has fueled the development of numerous applications [1, 2]. Person re-identification (re-ID) is a typical artificial intelligence system designed to automatically retrieve imag...
In recent years, artificial intelligence has fueled the development of numerous applications [1, 2]. Person re-identification (re-ID) is a typical artificial intelligence system designed to automatically retrieve images of specific individuals from galleries captured by different cameras [3].
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur...
详细信息
ISBN:
(纸本)9781665424509
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network security situation element acquisition technology has the problems of low extraction accuracy and low extraction efficiency. To solve these problems, a method for extracting network security situation elements based on Gradient Boosting Decision Tree (GBDT) is proposed. This method uses the attribute reduction function of rough set to preprocess the original data, which can effectively reduce redundancy. Furthermore, the initial parameters of GBDT are optimized by quantum particle swarm optimization (QPSO) algorithm to improve stability. Finally, the optimized GBDT classifier is used to classify and train with the reduced data set, and the accuracy of the final classifier is continuously improved by reducing the deviation via iterative optimization. Experiments demonstrate that the proposed algorithm achieves significant results and outperforms several state-of-the-art algorithms to the extraction of network security situation elements on the UNSW-NB15 dataset.
Multimodal fake news detection aims to automatically identify real or fake news, thereby mitigating the adverse effects caused by such misinformation. Although prevailing approaches have demonstrated their effectivene...
详细信息
暂无评论