Abstract: Energy critical infrastructure has undergone transformative rapid development in the context of the rapid development of information technology, and has been deeply integrated with new technologies such as Artificial Intelligence (AI), big data, and ...
Abstract: With the prosperous of Android applications, Android malware has been scattered everywhere, which raises the serious security risk to users. On the other hand, the rapid developing of deep learning fires the combat between the two sides of malware de...
Abstract: Attack path discovery is an important research direction in automated penetration testing area. This paper introduces the research progress of domain independent intelligent planning technology and its application to the field of automated penetratio...
Abstract: Android system is now increasingly used in different kinds of smart devices, such as smart phones, smart watches, smart TVs and smart cars. Unfortunately, reverse attacks against Android applications are also emerging, which not only violates the int...
Abstract: In view of many limitations of current client anti plug-in methods, an anti-cheat method based on kernel events is proposed, and the network game anti-cheat system called CheatBlocker is implemented. This method uses the kernel event monitoring provi...
Abstract: Machine learning is widely used in malicious code detection and plays an important role in malicious code detection products. Constructing adversarial samples for malicious code detection machine learning models is the key to discovering defects in m...
Abstract: Coordinated Cross Plane Session Termination (CXPST) repeatedly implements Low rate Denial of Service (LDoS) attacks on multiple target critical links, causing the cascading failure of the inter-domain routing system and the collapse of the internet. ...
Abstract: Due to the proliferation of geographic location virtual software and the easy simulation or tampering of civil satellite positioning signals, it is difficult to realize the trusted authentication of geographic location. In view of the security risk o...
Abstract: To solve the problem that the existing algorithms for recognition of RS codes need to transform the code characters among different domains and poor performance, a new algorithm based on soft decision is proposed. Firstly, starting from the definitio...
Abstract: For security of stereoscopic video, a video encryption and information hiding algorithm based on entropy coding is proposed. Firstly, with the analysis of Multi-view Video Coding (MVC), the physical mechanism of error drift is investigated. By applyi...
Abstract: The mapping strategy of virtual network has important effect on the resource availability and survivability of the Elastic Optical Network (EON). A survivable virtual optical network Coordinated Mapping based on the Distance and Spectrum Dispersion A...
Abstract: To improve the service experience provided by the operator network, this paper studies the online migration of Service Function Chain(SFC). Based on the Markov Decision Process(MDP), modeling analysis is performed on the migration of multiple Virtual...
Abstract: To solve the problem of increasing the digital currency of mobile terminals based on limited residual resources of the system, a task offloading scheme is proposed based on node residual resources and network delay in the joint blockchain and fog com...
Abstract: To ensure the security of MIMO heterogeneous networks while facing the active multi-antenna eavesdropping, a robust secure transmission scheme based on artificial noise is proposed. Firstly, considering that the eavesdropper sends uplink pilot interf...
Abstract: The most critical issue in the deployment of Mobile Wireless Sensor Networks (MWSN) is how to provide maximum regional coverage.To solve the problem that the existing coverage control algorithm has unsatisfactory coverage, low deployment efficiency a...
Abstract: Device to Device (D2D) communications can effectively offload base station traffic. In D2D networks, the popular content is not only needs to be shared, but also the individual content is needs to be cached. In this paper, the problem of cache conten...
Abstract: For blind modulation recognition of Multiple Input Multiple Output (MIMO) signals in non-cooperative communication, a modulation recognition method based on Independent Component Analysis (ICA) and feature extraction is proposed. According to the sig...
Abstract: Grant-free Non-Orthogonal Multiple Access (NOMA) combined with Multi-User Detection (MUD) technology can meet the requirements of large connection volume, low signaling overhead and low latency transmission in massive Machine Type Communications (mMT...
Abstract: Under certain environmental conditions, the unknown system errors often occur and yield to larger filtering errors when the unverified or uncalibrated measurement equation is used. Incremental equation can be introduced, which can effectively solve t...
Abstract: In order to estimate the length of moving ship targets in Alpha stable distribution noise, a moving target length estimation method based on Generalized Time-Frequency Analysis (G-TFA) and least squares estimation is proposed, which utilizes nonlinea...
Abstract: Considering the requirement for weak signal detection in non-Gaussian background interference, after conceptions and ideas summarizing for Gaussianization processing and extended matched filter, two Gaussianizaiton filters and corresponding detection...
Abstract: The problem that single-channel Synthetic Aperture Radar (SAR) can not effectively suppress FM slope mismatch jamming is studied in this paper. According to the difference between the jamming spectrum and the real echo spectrum, a method for suppress...
Abstract: A motion compensation method based on Kirchhoff migration imaging algorithm for MIMO array is proposed. In the method, the traditional Kirchhoff intergral equation is introduced into the MIMO array and the forward Green function is replaced by the ba...
Abstract: The system transfer function of high-squint SAR system with curved trajectory has complex multi-dimensional spatial variability. The existing efficient frequency-domain echo simulation algorithms are difficult to achieve high-precision echo simulatio...
Abstract: With the intelligent development of urban traffic, accurate and efficient access to available parking spaces is essential to solve the increasingly difficult problem of parking difficulties. Therefore, this paper proposes a deep convolutional neural ...
Abstract: Co-saliency object detection aims to discover common and salient objects in an image group which contains two or more relevant images. In this paper, a method of using machine learning is proposed to detect co-saliency objects. Firstly, some simple i...
Abstract: Rainy days and other severe weather will seriously affect the image quality, thus affecting the performance of vision processing algorithms. In order to improve the imaging quality of rain images, a rain removal algorithm based on multi-channel multi...
Abstract: Affected by the micro-lens geometric calibration accuracy of the light field camera, the decoding error of the 4D light field in the angular direction will cause the edge information loss of the integrated refocused image, which will reduce the accur...
Abstract: The color-ring resistor is one of the most commonly used electronic components in Printed Circuit Board (PCB). It is featured by sequential color rings, which often brings assembling errors, however. Manual detection of color-ring resistors has low e...
Abstract: A 4.5 bit sub-stage circuit for high speed high precision charge domain pipelined Analog-to-Digital Converter (ADC) is proposed. Instead of the high-performance opamps used in traditional switched-capacitor pipelined ADCs, charge transfer and residue...