Showing 4,361 - 4,380 results of 67,915 for search 'DASB~', query time: 2.39s Refine Results
  1. 4361

    Survey on anomaly detection technology based on logs by Yingjun ZHANG, Ushangqi LI, Mu YANG, Haixia ZHANG, Kezhen HUANG

    Published 2020-12-01
    “…Log information has become an important information resource in the rapid development of information systems.Through the analysis of logs,abnormal detection,fault diagnosis and performance diagnosis can be performed.The log-based anomaly detection technology was focused on.Firstly,the currently used log-based anomaly detection framework was introduced,and then the key link technologies such as log analysis and log anomaly detection were focused on.Finally,the current technology was summarized and suggestions for future research directions were given.…”
    Get full text
    Article
  2. 4362

    Research progress of phosphogypsum-based backfill technology by Qiusong CHEN, Aixiang WU

    Published 2025-02-01
    Subjects: “…phosphogypsum-based backfill…”
    Get full text
    Article
  3. 4363

    The neural basis of self-ambivalence: an ERP study by Dian Chen, Ying Liu, Yulin Zhang, Yiting Guo

    Published 2024-12-01
    “…Abstract The primary objective of this study was to investigate the neural basis of self-ambivalence, a phenomenon firmly established by behavioral research but whose underlying brain mechanisms have been less explored. …”
    Get full text
    Article
  4. 4364

    Classifying Cervical Spondylosis Based on Fuzzy Calculation by Xinghu Yu, Liangbi Xiang

    Published 2014-01-01
    “…Fuzzy calculation model based on the table can be carried out to classify CS and improve the diagnosis accuracy. …”
    Get full text
    Article
  5. 4365
  6. 4366

    Traffic Risk Assessment Based on Warning Data by Tao Wang, Binbin Chen, Yuzhi Chen, Shejun Deng, Jun Chen

    Published 2022-01-01
    “…To address the issues of insufficient danger excavation and long data collection period in traditional traffic risk assessment methods, this paper proposes a risk assessment method based on driver’s improper driving behavior and abnormal vehicle state warning data. …”
    Get full text
    Article
  7. 4367

    Key technologies and solutions of VR based on IPTV by Feng LI, Chen YANG, Xingda LI

    Published 2018-11-01
    “…As a new technology,virtual reality technology’s innovation on video brings users a completely new interactive experience.The developments in VR/AR industry at home and abroad were introduced.The IPTV-based demand of the VR was analyzed.Furthermore,the key technologies including video codec,projections,integrated service platform techniques,set top box,network transmission were also researched.At last,a solution and a process were presented from two different scenes.It’s also a solution for reference to the development of IPTV VR.…”
    Get full text
    Article
  8. 4368

    Alternatives to Petroleum-Based Containers for the Nursery Industry by Gary W. Knox, Matthew Chappell

    Published 2011-12-01
    “…This 5-page fact sheet looks at the past, present, and future of containers used in container nursery production. …”
    Get full text
    Article
  9. 4369

    Pesticide Toxicity Profile: Copper-based Pesticides by Frederick M. Fishel

    Published 2005-09-01
    “…Original publication date September 2005.  …”
    Get full text
    Article
  10. 4370

    Pesticide Toxicity Profile: Copper-based Pesticides by Frederick M. Fishel

    Published 2005-09-01
    “…Original publication date September 2005.  …”
    Get full text
    Article
  11. 4371
  12. 4372

    Outsourced attribute-based encryption with policy update by Su-qing LIN

    Published 2016-05-01
    Subjects: “…attribute-based encryption…”
    Get full text
    Article
  13. 4373
  14. 4374

    Novel defense based on softmax activation transformation by Jinyin CHEN, Changan WU, Haibin ZHENG

    Published 2022-04-01
    “…Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most defense methods are attack-dependent and require defenders to generate massive adversarial examples in advance.The defense cost is high and it is difficult to resist black-box attacks.Some of these defenses even affect the recognition of normal examples.In addition, the current defense methods are mostly empirical, without certifiable theoretical support.Softmax activation transformation (SAT) was proposed in this paper, which was a light-weight and fast defense scheme against black-box attacks.SAT reactivates the output probability of the target model in the testing phase, and then it guarantees privacy of the probability information.As an attack-free defense, SAT not only avoids the burden of generating massive adversarial examples, but also realizes the advance defense of attacks.The activation of SAT is monotonic, so it will not affect the recognition of normal examples.During the activation process, a variable privacy protection transformation coefficient was designed to achieve dynamic defense.Above all, SAT is a certifiable defense that can derive the effectiveness and reliability of its defense based on softmax activation transformation.To evaluate the effectiveness of SAT, defense experiments against 9 attacks on MNIST, CIFAR10 and ImageNet datasets were conducted, and the average attack success rate was reduced from 87.06% to 5.94%.…”
    Get full text
    Article
  15. 4375

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  16. 4376
  17. 4377
  18. 4378

    ID-based wireless authentication scheme with anonymity by ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min

    Published 2009-01-01
    “…Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.…”
    Get full text
    Article
  19. 4379

    DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li

    Published 2007-01-01
    “…A new method based on link character was proposed for DDoS attacks detection.Maximum likelihood estima-tion was used to estimate the distribution of link character.SOM neural network is used for link activity profile learning and anomaly link detection.Experiment results indicate that the technique is effective and of a definite practicability.It has a further develop potential for DDoS attacks detection.…”
    Get full text
    Article
  20. 4380

    Bioinspired origami-based soft prosthetic knees by Siyuan Gao, Chengxu Yang, Hongting Chen, Xinqiang He, Lecheng Ruan, Qining Wang

    Published 2024-12-01
    “…The efficacy of the proposed design has been corroborated through bench-top and ambulation experiments. …”
    Get full text
    Article