Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network
Expert Systems with Applications: An International Journal (EXWA), Volume 244, Issue Chttps://doi.org/10.1016/j.eswa.2023.123014AbstractIntrusion Detection System (IDS) can ensure the network security by identifying network intrusions according to the abnormal traffic data. However, the intrusion detection data has the problem of high dimensionality and changes with network and ...
Highlights- An effective algorithm for intrusion detection is proposed in this paper.
- Feature selection is based on symmetric uncertainty and approximate Markov blanket.
- A fusion neural network is constructed to extract the spatial and ...
- research-articleMay 2024
Accurate identification and confidence evaluation of automatic generation control command execution effect based on deep learning fusion model
Engineering Applications of Artificial Intelligence (EAAI), Volume 131, Issue Chttps://doi.org/10.1016/j.engappai.2023.107819AbstractWith the increasing complexity of the power grid, the precision of the thermal power units' execution of automatic generation control (AGC) commands is gradually increasing the impact on the online regulation of the power grid. The deviation ...
Highlights- An AGC command execution effect identification and confidence evaluation algorithm (ACEEI-CEA) is proposed.
- Results show the ACEEI-CEA performs well in command prediction compared to the state-of-the-art methods.
- ACEEI-CEA achieves ...
- research-articleFebruary 2024
Deep learning-based fusion networks with high-order attention mechanism for 3D object detection in autonomous driving scenarios
AbstractIn the realm of autonomous driving, accurately detecting 3D objects is both vital and challenging. Recently, deep convolutional networks have been successfully implemented in the fusion of LiDAR and camera data, delivering impressive results. ...
Highlights- We proposed a High-order Attention Mechanism Fusion Networks (HAMFNs) for 3D object detection.
- Query initialization strategy and high-order attention mechanism are designed in this paper.
- On the nuScenes dataset, HAMFNs achieved a ...
- ArticleFebruary 2024
FaCa: Fast Aware and Competition-Avoided Balancing for Data Center Network
Algorithms and Architectures for Parallel ProcessingPages 39–58https://doi.org/10.1007/978-981-97-0811-6_3AbstractNowadays, the scale of business data is expanding at an unprecedented rate. To cater to the needs of large businesses, data center networks (DCNs) have been widely deployed and are continuing to expand. However, the influx of large-scale ...
- research-articleSeptember 2023
Cognition: Accurate and Consistent Linear Log Parsing Using Template Correction
Journal of Computer Science and Technology (JCST), Volume 38, Issue 5Pages 1036–1050https://doi.org/10.1007/s11390-021-1691-3AbstractLogs contain runtime information for both systems and users. As many of them use natural language, a typical log-based analysis needs to parse logs into the structured format first. Existing parsing approaches often take two steps. The first step ...
-
- research-articleSeptember 2022
A deep dive into DNS behavior and query failures
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 214, Issue Chttps://doi.org/10.1016/j.comnet.2022.109131AbstractThe Domain Name System (DNS) is fundamental to the operation of the Internet. Providing an up-to-date view of DNS behavior in-the-wild is thus important for various Internet stakeholders. Among the behavioral characteristics, failure ...
- research-articleJanuary 2022
A Data-Driven Miscalibration Detection Algorithm for a Vehicle-Mounted Camera
LiDAR and camera are two commonly used sensors in autonomous vehicles. In order to fuse the data collected by these two sensors to accurately perceive the 3D world, it is necessary to perform accurate internal parameters’ and external parameters’ ...
- research-articleDecember 2021
S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 201, Issue Chttps://doi.org/10.1016/j.comnet.2021.108577AbstractVirtualized Network I/O (VNIO) plays a key role in providing the network connectivity to cloud services, as it delivers packets for Virtual Machines (VMs). Existing para-virtualized solutions accelerate the virtual Switch (vSwitch) ...
- research-articleDecember 2021
Compact-index: an efficient index algorithm for network traffic
CoNEXT '21: Proceedings of the 17th International Conference on emerging Networking EXperiments and TechnologiesPages 90–103https://doi.org/10.1145/3485983.3494858In many network security systems, network packets will be archived with no loss for the purpose of forensic, troubleshooting and so on. In order to achieve fast retrieval for these stored packets, index is essential. However, with the rapid increase of ...
- research-articleJanuary 2022
Stock Market Return and Household Financial Investments
ICEBI '21: Proceedings of the 2021 5th International Conference on E-Business and InternetPages 115–118https://doi.org/10.1145/3497701.3497719The purpose of this study project was to explore the link between household investment and stock market fluctuations in the United States. The research's aims are to identify the relationship between household investment and the stock market index in ...
- ArticleJune 2021
Short Term Voltage Stability Assessment with Incomplete Data Based on Deep Reinforcement Learning in the Internet of Energy
Wireless Algorithms, Systems, and ApplicationsPages 225–236https://doi.org/10.1007/978-3-030-86130-8_18AbstractShort-term voltage stability (STVS) assessment is one of the important challenges in the power system. With the wide application of phasor measurement units (PMUs), STVS assessment based on data-driven has attracted more and more attentions. In ...
- research-articleJune 2021
C2QoS: Network QoS guarantee in vSwitch through CPU-cycle management
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 116, Issue Chttps://doi.org/10.1016/j.sysarc.2021.102148AbstractCyber–Physical–Social–System (CPSS) relies on cloud and edge computing for service deployment and acceleration. As an enabling technology of CPSS, network virtualization allows different services to be deployed on a single physical ...
Graphical abstractDisplay Omitted
Highlights- Tenant’s network performance is unpredictable due to resource competition in vSwitch.
- research-articleMay 2020
A novel approach for multi-agent cooperative pursuit to capture grouped evaders
The Journal of Supercomputing (JSCO), Volume 76, Issue 5Pages 3416–3426https://doi.org/10.1007/s11227-018-2591-3AbstractAn approach of mobile multi-agent pursuit based on application of self-organizing feature map (SOFM) and along with that reinforcement learning based on agent group role membership function (AGRMF) model is proposed. This method promotes dynamic ...
- research-articleOctober 2019
Fast Traffic Accident Identification Method Based on SSD Model
RSVT '19: Proceedings of the 2019 International Conference on Robotics Systems and Vehicle TechnologyPages 177–181https://doi.org/10.1145/3366715.3366721Traditional traffic accident identification methods have the problems of complex detection process, poor detection performance and poor real-time performance so far. In this paper, we propose a new type of traffic accident identification method based on ...
- research-articleAugust 2015
Two-dimensional Green’s functions for the fluid and piezoelectric two-phase plane under the line forces and line charge
Zeitschrift für Angewandte Mathematik und Physik (ZAMP) (ZAMP), Volume 66, Issue 4Pages 2001–2023https://doi.org/10.1007/s00033-014-0487-5AbstractThe two-dimensional Green’s functions for two line forces and a line charge applied in the interior of the fluid and piezoelectric two-phase plane are presented in this paper. By virtue of the two-dimensional general solutions which are expressed ...
- research-articleOctober 2013
Scalable high-performance parallel design for network intrusion detection systems on many-core processors
ANCS '13: Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systemsPages 137–146Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. Both hardware accelerated and parallel software-based NIDS solutions, based on commodity ...
- ArticleNovember 2011
Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors
TRUSTCOM '11: Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and CommunicationsPages 673–680https://doi.org/10.1109/TrustCom.2011.86With the advancement of multi-core processor, it is highly desired to use parallel design to improve the IDS throughput in nowadays. However, existing parallel schemes often fail to achieve linear speedup in IDS. The throughput even deteriorates ...
- ArticleNovember 2008
An Integrated Electric Power Supply Reliability Differential Pricing Model under the Liberalized Market Environment
ICRMEM '08: Proceedings of the 2008 International Conference on Risk Management & Engineering ManagementPages 502–507https://doi.org/10.1109/ICRMEM.2008.72With the liberalization of electric market, the customers may have different reliability requirements, which generates different reliability costs to the grid company, that means they should afford different reliability price. An integrated electric ...
- articleSeptember 2007
Gradient-based shell generation and deformation
Shell becomes popular in a variety of modeling techniques for representing small-scale features and increasing visual complexity. Current shell generation algorithms do not measure the volume distortion for geometric texture mapping. And when the object ...