Network anomaly detection plays a vital role in safeguarding network security.However,the existing network anomaly detection task is typically based on the one-class zero-positive scenario.This approach is susceptible...
This research was supported by the National Natural Science Foundation of China(grant No.41977239);the Sichuan Science and Technology Program(grant No.2022YFS0539).
The particle size distribution(PSD)curve is an important expression of the basic properties of the soil.The characteristic parameters such as median particle size D_(50),effective particle size D_(10),and some combina...
Project supported by the National Major Science and Technology Projects of China(No.2022YFB3303302);the National Natural Science Foundation of China(Nos.61977012 and 62207007);the Central Universities Project in China at Chongqing University(Nos.2021CDJYGRH011 and 2020CDJSK06PT14)。
Artificial intelligence generated content(AIGC)has emerged as an indispensable tool for producing large-scale content in various forms,such as images,thanks to the significant role that AI plays in imitation and produ...
This research is partially supported by the National Natural Science Foundation of China(Grant No.61772098);Chongqing Technology Innovation and Application Development Project(Grant No.cstc2020jscxmsxmX0150);Chongqing Science and Technology Innovation Leading Talent Support Program(CSTCCXLJRC201908);Basic and Advanced Research Projects of CSTC(No.cstc2019jcyj-zdxmX0008);Science and Technology Research Program of Chongqing Municipal Education Commission(Grant No.KJZD-K201900605).
The traditional malware research is mainly based on its recognition and detection as a breakthrough point,without focusing on its propagation trends or predicting the subsequently infected nodes.The complexity of netw...
supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2018R1D1A1B07049932).
In feature-based visual localization for small-scale scenes,local descriptors are used to estimate the camera pose of a query image.For large and ambiguous environments,learning-based hierarchical networks that employ...
This work was supported by the Universities Natural Science Research Project of Jiangsu Province under Grant 20KJB520026;the Natural Science Foundation of Jiangsu Province under Grant BK20180821.
With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an impor...
supported by National Natural Science Foundation of China(No.U1931207 and No.61702306);Sci.&Tech.Development Fund of Shandong Province of China(No.ZR2019LZH001,No.ZR2017BF015 and No.ZR2017MF027);the Humanities and Social Science Research Project of the Ministry of Education(No.18YJAZH017);Shandong Chongqing Science and technology cooperation project(No.cstc2020jscx-lyjsAX0008);Sci.&Tech.Development Fund of Qingdao(No.21-1-5-zlyj-1-zc);the Taishan Scholar Program of Shandong Province;SDUST Research Fund(No.2015TDJH102 and No.2019KJN024).
Remaining time prediction of business processes plays an important role in resource scheduling and plan making.The structural features of single process instance and the concurrent running of multiple process instance...
Background:As the demand for traditional Chinese medicinal materials increases in China and even the world,there is an urgent need for an effective and simple identification technology to identify the origin and quali...
This work is supported by The National Key Research and Development Program of China(2018YFB1800202,2016YFB1000302,SQ2019ZD090149,2018YFB0204301).
By efficiently and accurately predicting the adoptability of pets,shelters and rescuers can be positively guided on improving attraction of pet profiles,reducing animal suffering and euthanization.Previous prediction ...
This work was supported by the Project of Industry and University Cooperative Research of Jiangsu Province,China(No.BY2019051);Ma,J.would like to thank the Jiangsu Eazytec Information Technology Company(www.eazytec.com)for their financial support.
Traditional topic models have been widely used for analyzing semantic topics from electronic documents.However,the obvious defects of topic words acquired by them are poor in readability and consistency.Only the domai...