期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A New Model for Network Security Situation Assessment of the Industrial Internet
1
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 Industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
Performance of Resampling Algorithms Based on Particle Filter in Video Target Tracking
2
作者 韩华 王裕明 +1 位作者 张玉金 胡一帆 《Journal of Donghua University(English Edition)》 EI CAS 2016年第5期745-748,共4页
Particle filter is a common algorithm in video target tracking.But there are still some shortcomings,for example,particle degradation phenomenon.For solving this problem,the general solution is to introduce resampling... Particle filter is a common algorithm in video target tracking.But there are still some shortcomings,for example,particle degradation phenomenon.For solving this problem,the general solution is to introduce resampling step.At present,four kinds of resampling algorithms are widely used:multinomial resampling,residual resampling,stratified resampling and systematic resampling algorithms.In this paper,the performances of these four resampling algorithms were analyzed from realization principle,uniform distribution theory and computational complexity.Finally,through a series of video target tracking experiments,the systematic resampling algorithm had the smallest calculation load,the shortest running time and the maximum number of effective particles.So,it can be concluded that in the field of video target tracking,the systematic resampling algorithm has more advantages than other three algorithms both in the running time and the number of effective particles. 展开更多
关键词 video target tracking multinomial resampling residual resampling stratified resampling systematic resampling
下载PDF
Effects of heterogeneous adoption thresholds on contact-limited social contagions
3
作者 赵丹丹 彭王鑫 +1 位作者 彭浩 王伟 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期790-800,共11页
Limited contact capacity and heterogeneous adoption thresholds have been proven to be two essential characteristics of individuals in natural complex social systems,and their impacts on social contagions exhibit compl... Limited contact capacity and heterogeneous adoption thresholds have been proven to be two essential characteristics of individuals in natural complex social systems,and their impacts on social contagions exhibit complex nature.With this in mind,a heterogeneous contact-limited threshold model is proposed,which adopts one of four threshold distributions,namely Gaussian distribution,log-normal distribution,exponential distribution and power-law distribution.The heterogeneous edge-based compartmental theory is developed for theoretical analysis,and the calculation methods of the final adoption size and outbreak threshold are given theoretically.Many numerical simulations are performed on the Erdös-Renyi and scale-free networks to study the impact of different forms of the threshold distribution on hierarchical spreading´process,the final adoption size,the outbreak threshold and the phase transition in contact-limited propagation networks.We find that the spreading process of social contagions is divided into three distinct stages.Moreover,different threshold distributions cause different spreading processes,especially for some threshold distributions,there is a change from a discontinuous first-order phase transition to a continuous second-order phase transition.Further,we find that changing the standard deviation of different threshold distributions will cause the final adoption size and outbreak threshold to change,and finally tend to be stable with the increase of standard deviation. 展开更多
关键词 social contagions threshold distribution heterogeneous adoption thresholds limited contact
原文传递
Deeply Understanding Graph-Based Sybil Detection Techniques via Empirical Analysis on Graph Processing
4
作者 Jian Mao Xiang Li +1 位作者 Qixiao Lin Zhenyu Guan 《China Communications》 SCIE CSCD 2020年第10期82-96,共15页
Sybil attacks are one of the most prominent security problems of trust mechanisms in a distributed network with a large number of highly dynamic and heterogeneous devices,which expose serious threat to edge computing ... Sybil attacks are one of the most prominent security problems of trust mechanisms in a distributed network with a large number of highly dynamic and heterogeneous devices,which expose serious threat to edge computing based distributed systems.Graphbased Sybil detection approaches extract social structures from target distributed systems,refine the graph via preprocessing methods and capture Sybil nodes based on the specific properties of the refined graph structure.Graph preprocessing is a critical component in such Sybil detection methods,and intuitively,the processing methods will affect the detection performance.Thoroughly understanding the dependency on the graph-processing methods is very important to develop and deploy Sybil detection approaches.In this paper,we design experiments and conduct systematic analysis on graph-based Sybil detection with respect to different graph preprocessing methods on selected network environments.The experiment results disclose the sensitivity caused by different graph transformations on accuracy and robustness of Sybil detection methods. 展开更多
关键词 Sybil attack graph preprocessing Edge computing trust model
下载PDF
A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules
5
作者 Donghai Tian Xiaoqi Jia +2 位作者 Junhua Chen Changzhen Hu Jingfeng Xue 《China Communications》 SCIE CSCD 2016年第11期143-152,共10页
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met... Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost. 展开更多
关键词 内核模块 保护方法 缓冲区 线方法 操作系统内核 虚拟化技术 溢出攻击 内存分配
全文增补中
Knowledge Enhanced Pre-Training Model for Vision-Language-Navigation Task
6
作者 HUANG Jitao ZENG Guohui +3 位作者 HUANG Bo GAO Yongbin LIU Jin SHI Zhicai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期147-155,共9页
Vision-Language-Navigation(VLN) task is a cross-modality task that combines natural language processing and computer vision. This task requires the agent to automatically move to the destination according to the natur... Vision-Language-Navigation(VLN) task is a cross-modality task that combines natural language processing and computer vision. This task requires the agent to automatically move to the destination according to the natural language instruction and the observed surrounding visual information. To make the best decision, in every step during the navigation, the agent should pay more attention to understanding the objects, the object attributes, and the object relationships. But most current methods process all received textual and visual information equally. Therefore, this paper integrates more detailed semantic connections between visual and textual information through three pre-training tasks(object prediction, object attributes prediction, and object relationship prediction). The model will learn better fusion representation and alignment between these two types of information to improve the success rate(SR) and generalization. The experiments show that compared with the former baseline models, the SR on the unseen validation set(Val Unseen) increased by 7%, and the SR weighted by path length(SPL) increased by 7%;the SR on the test set(Test) increased 4%, SPL increased by 3%. 展开更多
关键词 pre-training cross-modality deep learning scene graph
原文传递
随机零值攻击下基于随机加密防护的网络化控制系统随机稳定性分析(英文)
7
作者 Meng-zhou GAO Dong-qin FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第9期1098-1111,共14页
近年来,网络化控制系统的安全问题受到广泛重视。安全防护需要额外的能量消耗、计算资源负荷以及时间延迟,使得实时、能量受限系统受到影响。因此,采用随机加密防护技术,该技术相比持续性加密防护技术在计算负荷、时间和能量消耗方面代... 近年来,网络化控制系统的安全问题受到广泛重视。安全防护需要额外的能量消耗、计算资源负荷以及时间延迟,使得实时、能量受限系统受到影响。因此,采用随机加密防护技术,该技术相比持续性加密防护技术在计算负荷、时间和能量消耗方面代价较小。针对能力较弱的攻击者,即系统经验知识较少,攻击能力有限,同时又有攻击欲望,考虑了一种随机零值攻击,即恶意地将测量值篡改为零信号。随机加密防护与随机零值攻击分别服从于两个相关的伯努利分布随机变量,该情况下网络化控制系统变成随机系统;基于线性矩阵不等式法开展了随机稳定性分析。所提的随机稳定性分析结果有助于确定一定攻击概率的随机零值攻击下所需的随机加密防护概率。最后,基于某垂直起降飞行系统进行仿真实验。仿真结果表明该方法的有效性、鲁棒性与适用性。此外,结果表明在选择合适防护技术时,应考虑延迟的影响;在确定系统采样周期时,应考虑采样周期对增加攻击鲁棒性的作用。 展开更多
关键词 控制系统 安全保护 稳定性分析 攻击者 随机 密码 测量 联网
原文传递
Online Latent Dirichlet Allocation Model Based on Sentiment Polarity Time Series
8
作者 HUANG Bo JU Jiaji +3 位作者 CHEN Huan ZHU Yimin LIU Jin SHI Zhicai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第6期464-472,共9页
The Product Sensitive Online Dirichlet Allocation model(PSOLDA)proposed in this paper mainly uses the sentiment polarity of topic words in the review text to improve the accuracy of topic evolution.First,we use Latent... The Product Sensitive Online Dirichlet Allocation model(PSOLDA)proposed in this paper mainly uses the sentiment polarity of topic words in the review text to improve the accuracy of topic evolution.First,we use Latent Dirichlet Allocation(LDA)to obtain the distribution of topic words in the current time window.Second,the word2 vec word vector is used as auxiliary information to determine the sentiment polarity and obtain the sentiment polarity distribution of the current topic.Finally,the sentiment polarity changes of the topics in the previous and next time window are mapped to the sentiment factors,and the distribution of topic words in the next time window is controlled through them.The experimental results show that the PSOLDA model decreases the probability distribution by 0.1601,while Online Twitter LDA only increases by 0.0699.The topic evolution method that integrates the sentimental information of topic words proposed in this paper is better than the traditional model. 展开更多
关键词 topic evolution sentiment factors word vector Latent Dirichlet Allocation(LDA)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部