D-S evidence theory,as a general framework for reasoning with uncertainty,allows combining pieces of evidence from different information sources to derive a degree of belief function that is a type of fuzzy measure.Ho...D-S evidence theory,as a general framework for reasoning with uncertainty,allows combining pieces of evidence from different information sources to derive a degree of belief function that is a type of fuzzy measure.However,the mass assignments given by unknown information sources are disordered.How to measure the difference between the mass assignments has aroused people’s interest.In this paper,inspired by the information volume,a novel distance-based measure is proposed to measure the difference between mass assignments.The method can refine the uncertain information given by experts and compare the refined information to obtain the difference between mass assignments.At the same time,it is verified that the measure not only meets the properties of distance,but also proves the superiority of the proposed Information Volume Distance(IVD)through simulation experiments.Meanwhile,in the process of information fusion,the reliability of each source could be quantified through IVD.Therefore,based on IVD,a new multi-source information algorithm is proposed to solve the problem of multi-source information fusion.Moreover,algorithm is applied to decision-making problem and compare with other methods to verify the effectiveness.展开更多
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u...Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.展开更多
Preterm births have been seen to have psychological and financial implications;current surveys suggest that amongst the various methods of preterm prediction,there is yet to exist a reliable and standard means of pred...Preterm births have been seen to have psychological and financial implications;current surveys suggest that amongst the various methods of preterm prediction,there is yet to exist a reliable and standard means of predicting preterm births.This study investigates the application of electrohysterogram and tocogram signals acquired at various points during the third pregnancy trimester,alongside information from the patients'medical health record regarding the pregnancy,towards preterm prediction and an associated delivery imminency timeline.In addition to this,the impact of both linear and non-linear dimensional embedding methods towards the preterm prediction is explored.The classification exercises were carried out using a support vector machine and decision tree,both of which have a certain degree of model interpretability and have potential to be introduced into a clinical operating framework.展开更多
基金supported by the National Natural Science Foundation of China(No.62003280)Chongqing Talents:Exceptional Young Talents Project(No.cstc2022ycjhbgzxm0070)+1 种基金Natural Science Foundation of Chongqing,China(No.CSTB2022NSCQ-MSX0531)Chongqing Overseas Scholars Innovation Program(No.cx2022024).
文摘D-S evidence theory,as a general framework for reasoning with uncertainty,allows combining pieces of evidence from different information sources to derive a degree of belief function that is a type of fuzzy measure.However,the mass assignments given by unknown information sources are disordered.How to measure the difference between the mass assignments has aroused people’s interest.In this paper,inspired by the information volume,a novel distance-based measure is proposed to measure the difference between mass assignments.The method can refine the uncertain information given by experts and compare the refined information to obtain the difference between mass assignments.At the same time,it is verified that the measure not only meets the properties of distance,but also proves the superiority of the proposed Information Volume Distance(IVD)through simulation experiments.Meanwhile,in the process of information fusion,the reliability of each source could be quantified through IVD.Therefore,based on IVD,a new multi-source information algorithm is proposed to solve the problem of multi-source information fusion.Moreover,algorithm is applied to decision-making problem and compare with other methods to verify the effectiveness.
文摘Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.
文摘Preterm births have been seen to have psychological and financial implications;current surveys suggest that amongst the various methods of preterm prediction,there is yet to exist a reliable and standard means of predicting preterm births.This study investigates the application of electrohysterogram and tocogram signals acquired at various points during the third pregnancy trimester,alongside information from the patients'medical health record regarding the pregnancy,towards preterm prediction and an associated delivery imminency timeline.In addition to this,the impact of both linear and non-linear dimensional embedding methods towards the preterm prediction is explored.The classification exercises were carried out using a support vector machine and decision tree,both of which have a certain degree of model interpretability and have potential to be introduced into a clinical operating framework.