期刊文献+
共找到60,707篇文章
< 1 2 250 >
每页显示 20 50 100
Urban Traffic Control Meets Decision Recommendation System:A Survey and Perspective
1
作者 Qingyuan Ji Xiaoyue Wen +2 位作者 Junchen Jin Yongdong Zhu Yisheng Lv 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2043-2058,共16页
Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal ... Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal professionals to manually intervene on traffic control devices at the intersection level,utilizing their knowledge and expertise.However,this process is cumbersome,labor-intensive,and cannot be applied on a large network scale.Recent studies have begun to explore the applicability of recommendation system for urban traffic control,which offer increased control efficiency and scalability.Such a decision recommendation system is complex,with various interdependent components,but a systematic literature review has not yet been conducted.In this work,we present an up-to-date survey that elucidates all the detailed components of a recommendation system for urban traffic control,demonstrates the utility and efficacy of such a system in the real world using data and knowledgedriven approaches,and discusses the current challenges and potential future directions of this field. 展开更多
关键词 Recommendation system traffic control traffic perception traffic prediction
下载PDF
Spatiotemporal Prediction of Urban Traffics Based on Deep GNN
2
作者 Ming Luo Huili Dou Ning Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期265-282,共18页
Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of ... Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of traffic data.As well as to fulfil both long-termand short-termprediction objectives,a better representation of the temporal dependency and global spatial correlation of traffic data is needed.In order to do this,the Spatiotemporal Graph Neural Network(S-GNN)is proposed in this research as amethod for traffic prediction.The S-GNN simultaneously accepts various traffic data as inputs and investigates the non-linear correlations between the variables.In terms of modelling,the road network is initially represented as a spatiotemporal directed graph,with the features of the samples at the time step being captured by a convolution module.In order to assign varying attention weights to various adjacent area nodes of the target node,the adjacent areas information of nodes in the road network is then aggregated using a graph network.The data is output using a fully connected layer at the end.The findings show that S-GNN can improve short-and long-term traffic prediction accuracy to a greater extent;in comparison to the control model,the RMSE of S-GNN is reduced by about 0.571 to 9.288 and the MAE(Mean Absolute Error)by about 0.314 to 7.678.The experimental results on two real datasets,Pe MSD7(M)and PEMS-BAY,also support this claim. 展开更多
关键词 Urban traffic traffic temporal correlation GNN PREDICTION
下载PDF
Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations
3
作者 Shengyu Zhang Xiaoqian Li Kwan Lawrence Yeung 《Digital Communications and Networks》 SCIE CSCD 2024年第3期706-715,共10页
Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in in... Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in initial deployment(i.e.the Starlink),the communication between satellites is based on ground stations with radio frequency signals.Due to the rapid movement of satellites,this hybrid topology of LEO-SCs and ground stations is time-varying,which imposes a major challenge to uninterrupted service provisioning and network management.In this paper,we focus on solving two notable problems in such a ground station-assisted LEO-SC topology,i.e.,traffic engineering and fast reroute,to guarantee that the packets are forwarded in a balanced and uninterrupted manner.Specifically,we employ segment routing to support the arbitrary path routing in LEO-SCs.To solve the traffic engineering problem,we proposed two source routings with traffic splitting algorithms,Delay-Bounded Traffic Splitting(DBTS)and DBTS+,where DBTS equally splits a flow and DBTS+favors shorter paths.Simu-lation results show that DBTS+can achieve about 30%lower maximum satellite load at the cost of about 10%more delay.To guarantee the fast recovery of failures,two fast reroute mechanisms,Loop-Free Alternate(LFA)and LFA+,are studied,where LFA pre-computes an alternate next-hop as a backup while LFA+finds a 2-segment backup path.We show that LFA+can increase the percentage of protection coverage by about 15%. 展开更多
关键词 Fast reroute Low-earth orbit satellite constellation Segment routing traffic engineering traffic splitting
下载PDF
Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems
4
作者 Dong-Wook Kim Gun-Yoon Sin +3 位作者 Kwangsoo Kim Jaesik Kang Sun-Young Im Myung-Mook Han 《Computers, Materials & Continua》 SCIE EI 2024年第9期3637-3653,共17页
In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in ... In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient. 展开更多
关键词 Cybersecurity exercise synthetic network traffic generative adversarial network traffic generation software-defined networking
下载PDF
RUFY4 deletion prevents pathological bone loss by blocking endo-lysosomal trafficking of osteoclasts
5
作者 Minhee Kim Jin Hee Park +13 位作者 Miyeon Go Nawon Lee Jeongin Seo Hana Lee Doyong Kim Hyunil Ha Taesoo Kim Myeong Seon Jeong Suree Kim Taesoo Kim Han Sung Kim Dongmin Kang Hyunbo Shim Soo Young Lee 《Bone Research》 SCIE CAS CSCD 2024年第2期407-420,共14页
Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts... Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts remain largely unknown.Here,we show with GeneChip analysis that RUN and FYVE domain-containing protein 4(RUFY4)is strongly upregulated during osteoclastogenesis.Mice lacking Rufy4 exhibited a high trabecular bone mass phenotype with abnormalities in osteoclast function in vivo.Furthermore,deleting Rufy4 did not affect osteoclast differentiation,but inhibited bone-resorbing activity due to disruption in the acidic maturation of secondary lysosomes,their trafficking to the membrane,and their secretion of cathepsin K into the extracellular space.Mechanistically,RUFY4 promotes late endosome-lysosome fusion by acting as an adaptor protein between Rab7 on late endosomes and LAMP2 on primary lysosomes.Consequently,Rufy4-deficient mice were highly protected from lipopolysaccharide-and ovariectomy-induced bone loss.Thus,RUFY4 plays as a new regulator in osteoclast activity by mediating endo-lysosomal trafficking and have a potential to be specific target for therapies against bone-loss diseases such as osteoporosis. 展开更多
关键词 OSTEOCLAST inhibited traffic
下载PDF
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network
6
作者 Saad Abdalla Agaili Mohamed Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第7期819-841,共23页
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c... VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions. 展开更多
关键词 VPN network traffic flow ANN classification intrusion detection data exfiltration encrypted traffic feature extraction network security
下载PDF
Scalable Temporal Dimension Preserved Tensor Completion for Missing Traffic Data Imputation With Orthogonal Initialization
7
作者 Hong Chen Mingwei Lin +1 位作者 Jiaqi Liu Zeshui Xu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2188-2190,共3页
Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on... Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on accessing the traffic state,and affects the traffic management. 展开更多
关键词 DIMENSION management traffic
下载PDF
Semantic Consistency and Correctness Verification of Digital Traffic Rules
8
作者 Lei Wan Changjun Wang +3 位作者 Daxin Luo Hang Liu Sha Ma Weichao Hu 《Engineering》 SCIE EI CAS CSCD 2024年第2期47-62,共16页
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules... The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS). 展开更多
关键词 Autonomous driving traffic rules DIGITIZATION FORMALIZATION VERIFICATION
下载PDF
Effect of speed humps on instantaneous traffic emissions in a microscopic model with limited deceleration capacity
9
作者 胡宇晨 李启朗 +2 位作者 刘军 王君霞 汪秉宏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期413-420,共8页
As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the clas... As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the classic instantaneous traffic emission model and the limited deceleration capacity microscopic traffic flow model with slow-to-start rules, this paper has investigated the impact of speed humps on traffic flow and the instantaneous emissions of vehicle pollutants in a single lane situation. The numerical simulation results have shown that speed humps have significant effects on traffic flow and traffic emissions. In a free-flow region, the increase of speed humps leads to the continuous rise of CO_(2), NO_(X) and PM emissions. Within some density ranges, one finds that these pollutant emissions can evolve into some higher values under some random seeds. Under other random seeds, they can evolve into some lower values. In a wide moving jam region, the emission values of these pollutants sometimes appear as continuous or intermittent phenomenon. Compared to the refined Na Sch model, the present model has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher volatile organic components(VOC) emissions. Compared to the limited deceleration capacity model without slow-to-start rules, the present model also has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher VOC emissions in a wide moving jam region. These results can also be confirmed or explained by the statistical values of vehicle velocity and acceleration. 展开更多
关键词 traffic emissions speed humps slow-to-start rules deceleration capacity
下载PDF
WT-FCTGN:A wavelet-enhanced fully connected time-gated neural network for complex noisy traffic flow modeling
10
作者 廖志芳 孙轲 +3 位作者 刘文龙 余志武 刘承光 宋禹成 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期652-664,共13页
Accurate forecasting of traffic flow provides a powerful traffic decision-making basis for an intelligent transportation system. However, the traffic data's complexity and fluctuation, as well as the noise produce... Accurate forecasting of traffic flow provides a powerful traffic decision-making basis for an intelligent transportation system. However, the traffic data's complexity and fluctuation, as well as the noise produced during collecting information and summarizing original data of traffic flow, cause large errors in the traffic flow forecasting results. This article suggests a solution to the above mentioned issues and proposes a fully connected time-gated neural network based on wavelet reconstruction(WT-FCTGN). To eliminate the potential noise and strengthen the potential traffic trend in the data, we adopt the methods of wavelet reconstruction and periodic data introduction to preprocess the data. The model introduces fully connected time-series blocks to model all the information including time sequence information and fluctuation information in the flow of traffic, and establishes the time gate block to comprehend the periodic characteristics of the flow of traffic and predict its flow. The performance of the WT-FCTGN model is validated on the public Pe MS data set. The experimental results show that the WT-FCTGN model has higher accuracy, and its mean absolute error(MAE), mean absolute percentage error(MAPE) and root mean square error(RMSE) are obviously lower than those of the other algorithms. The robust experimental results prove that the WT-FCTGN model has good anti-noise ability. 展开更多
关键词 traffic flow modeling time-series wavelet reconstruction
下载PDF
Real-Time Prediction of Urban Traffic Problems Based on Artificial Intelligence-Enhanced Mobile Ad Hoc Networks(MANETS)
11
作者 Ahmed Alhussen Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第5期1903-1923,共21页
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Ne... Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic challenges.MANETs are wireless networks that are based on mobile devices and may self-organize.The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts.This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within theMANETs.The framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real time.Real-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce congestion.The framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban planners.Extensive simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and scalability.Experimental results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities. 展开更多
关键词 Mobile AdHocNetworks(MANET) urban traffic prediction artificial intelligence(AI) traffic congestion chaotic spatial fuzzy polynomial neural network(CSFPNN)
下载PDF
Traffic Flow Prediction with Heterogeneous Spatiotemporal Data Based on a Hybrid Deep Learning Model Using Attention-Mechanism
12
作者 Jing-Doo Wang Chayadi Oktomy Noto Susanto 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1711-1728,共18页
A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow acc... A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately.However,accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors.This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory(Conv-BiLSTM)with attention mechanisms.Prior studies neglected to include data pertaining to factors such as holidays,weather conditions,and vehicle types,which are interconnected and significantly impact the accuracy of forecast outcomes.In addition,this research incorporates recurring monthly periodic pattern data that significantly enhances the accuracy of forecast outcomes.The experimental findings demonstrate a performance improvement of 21.68%when incorporating the vehicle type feature. 展开更多
关键词 traffic flow prediction sptiotemporal data heterogeneous data Conv-BiLSTM DATA-CENTRIC intra-data
下载PDF
Effects of connected automated vehicle on stability and energy consumption of heterogeneous traffic flow system
13
作者 申瑾 赵建东 +2 位作者 刘华清 姜锐 余智鑫 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期291-301,共11页
With the development of intelligent and interconnected traffic system,a convergence of traffic stream is anticipated in the foreseeable future,where both connected automated vehicle(CAV)and human driven vehicle(HDV)wi... With the development of intelligent and interconnected traffic system,a convergence of traffic stream is anticipated in the foreseeable future,where both connected automated vehicle(CAV)and human driven vehicle(HDV)will coexist.In order to examine the effect of CAV on the overall stability and energy consumption of such a heterogeneous traffic system,we first take into account the interrelated perception of distance and speed by CAV to establish a macroscopic dynamic model through utilizing the full velocity difference(FVD)model.Subsequently,adopting the linear stability theory,we propose the linear stability condition for the model through using the small perturbation method,and the validity of the heterogeneous model is verified by comparing with the FVD model.Through nonlinear theoretical analysis,we further derive the KdV-Burgers equation,which captures the propagation characteristics of traffic density waves.Finally,by numerical simulation experiments through utilizing a macroscopic model of heterogeneous traffic flow,the effect of CAV permeability on the stability of density wave in heterogeneous traffic flow and the energy consumption of the traffic system is investigated.Subsequent analysis reveals emergent traffic phenomena.The experimental findings demonstrate that as CAV permeability increases,the ability to dampen the propagation of fluctuations in heterogeneous traffic flow gradually intensifies when giving system perturbation,leading to enhanced stability of the traffic system.Furthermore,higher initial traffic density renders the traffic system more susceptible to congestion,resulting in local clustering effect and stop-and-go traffic phenomenon.Remarkably,the total energy consumption of the heterogeneous traffic system exhibits a gradual decline with CAV permeability increasing.Further evidence has demonstrated the positive influence of CAV on heterogeneous traffic flow.This research contributes to providing theoretical guidance for future CAV applications,aiming to enhance urban road traffic efficiency and alleviate congestion. 展开更多
关键词 heterogeneous traffic flow CAV linear stability nonlinear stability energy consumption
下载PDF
Traffic Sign Detection Model Based on Improved RT-DETR
14
作者 WANG Yong-kang SI Zhan-jun 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期97-106,178,共11页
The correct identification of traffic signs plays an important role in automatic driving technology and road safety driving.Therefore,to address the problems of misdetection and omission in traffic sign detection due ... The correct identification of traffic signs plays an important role in automatic driving technology and road safety driving.Therefore,to address the problems of misdetection and omission in traffic sign detection due to the variety of sign types,significant size differences and complex background information,an improved traffic sign detection model for RT-DETR was proposed in this study.Firstly,the HiLo attention mechanism was added to the Attention-based Intra-scale Feature Interaction,which further enhanced the feature extraction capability of the network and improved the detection efficiency on high-resolution images.Secondly,the CAFMFusion feature fusion mechanism was designed,which enabled the network to pay attention to the features in different regions in each channel.Based on this,the model could better capture the remote dependencies and neighborhood feature correlation,improving the feature fusion capability of the model.Finally,the MPDIoU was used as the loss function of the improved model to achieve faster convergence and more accurate regression results.The experimental results on the TT100k-2021 traffic sign dataset showed that the improved model achieves the performance with a precision value of 90.2%,recall value of 88.1%and mAP@0.5 value of 91.6%,which are 4.6%,5.8%,and 4.4%better than the original RT-DETR model respectively.The model effectively improves the problem of poor traffic sign detection and has greater practical value. 展开更多
关键词 Object detection traffic signs RT-DETR CAFMFusion
下载PDF
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
15
作者 Min-Gyu Kim Hwankuk Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期585-607,共23页
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly d... In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly detection using AI(Artificial Intelligence)is actively progressing,the encrypted nature of the data poses challenges for labeling,resulting in data imbalance and biased feature extraction toward specific nodes.This study proposes a reconstruction error-based anomaly detection method using an autoencoder(AE)that utilizes packet metadata excluding specific node information.The proposed method omits biased packet metadata such as IP and Port and trains the detection model using only normal data,leveraging a small amount of packet metadata.This makes it well-suited for direct application in IoT environments due to its low resource consumption.In experiments comparing feature extraction methods for AE-based anomaly detection,we found that using flowbased features significantly improves accuracy,precision,F1 score,and AUC(Area Under the Receiver Operating Characteristic Curve)score compared to packet-based features.Additionally,for flow-based features,the proposed method showed a 30.17%increase in F1 score and improved false positive rates compared to Isolation Forest and OneClassSVM.Furthermore,the proposedmethod demonstrated a 32.43%higherAUCwhen using packet features and a 111.39%higher AUC when using flow features,compared to previously proposed oversampling methods.This study highlights the impact of feature extraction methods on attack detection in imbalanced,encrypted traffic environments and emphasizes that the one-class method using AE is more effective for attack detection and reducing false positives compared to traditional oversampling methods. 展开更多
关键词 One-class anomaly detection feature extraction auto-encoder encrypted traffic CICIoT2023
下载PDF
Network traffic classification:Techniques,datasets,and challenges
16
作者 Ahmad Azab Mahmoud Khasawneh +2 位作者 Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour 《Digital Communications and Networks》 SCIE CSCD 2024年第3期676-692,共17页
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions. 展开更多
关键词 Network classification Machine learning Deep learning Deep packet inspection traffic monitoring
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
17
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
18
作者 Yuancong Chai Yuefei Zhu +1 位作者 Wei Lin Ding Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1223-1243,共21页
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged in this field.Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-levelfeatures of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites,temporal features can exhibit significant variations due to changes in communication links and transmissionquality. Additionally, partial spatial features can change due to reasons like data reordering and retransmission.Faced with these challenges, identifying encrypted traffic solely based on packet byte-level features is significantlydifficult. To address this, we propose a universal packet-level encrypted traffic identification method, ComboPacket. This method utilizes convolutional neural networks to extract deep features of the current packet andits contextual information and employs spatial and channel attention mechanisms to select and locate effectivefeatures. Experimental data shows that Combo Packet can effectively distinguish between encrypted traffic servicecategories (e.g., File Transfer Protocol, FTP, and Peer-to-Peer, P2P) and encrypted traffic application categories (e.g.,BitTorrent and Skype). Validated on the ISCX VPN-non VPN dataset, it achieves classification accuracies of 97.0%and 97.1% for service and application categories, respectively. It also provides shorter training times and higherrecognition speeds. The performance and recognition capabilities of Combo Packet are significantly superior tothe existing classification methods mentioned. 展开更多
关键词 Encrypted traffic classification packet-level convolutional neural network attention mechanisms
下载PDF
Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network
19
作者 Tingting Su Jia Wang +2 位作者 Wei Hu Gaoqiang Dong Jeon Gwanggil 《Computers, Materials & Continua》 SCIE EI 2024年第6期4433-4448,共16页
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more intelligent.IoT has been widely applied in various scenarios,including urban infrastructure,transportati... Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more intelligent.IoT has been widely applied in various scenarios,including urban infrastructure,transportation,industry,personal life,and other socio-economic fields.The introduction of deep learning has brought new security challenges,like an increment in abnormal traffic,which threatens network security.Insufficient feature extraction leads to less accurate classification results.In abnormal traffic detection,the data of network traffic is high-dimensional and complex.This data not only increases the computational burden of model training but also makes information extraction more difficult.To address these issues,this paper proposes an MD-MRD-ResNeXt model for abnormal network traffic detection.To fully utilize the multi-scale information in network traffic,a Multi-scale Dilated feature extraction(MD)block is introduced.This module can effectively understand and process information at various scales and uses dilated convolution technology to significantly broaden the model’s receptive field.The proposed Max-feature-map Residual with Dual-channel pooling(MRD)block integrates the maximum feature map with the residual block.This module ensures the model focuses on key information,thereby optimizing computational efficiency and reducing unnecessary information redundancy.Experimental results show that compared to the latest methods,the proposed abnormal traffic detection model improves accuracy by about 2%. 展开更多
关键词 Abnormal network traffic deep learning residual network multi-scale feature extraction max-feature-map
下载PDF
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
20
作者 So-Eun Jeon Ye-Sol Oh +1 位作者 Yeon-Ji Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1669-1687,共19页
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signatu... With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signature-based detection methods,static analysis,and dynamic analysis techniques have been previously explored for malicious traffic detection,they have limitations in identifying diversified malware traffic patterns.Recent research has been focused on the application of machine learning to detect these patterns.However,applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process.In this study,we examined methods for effectively utilizing machine learning-based malicious traffic detection approaches for lightweight devices.We introduced the suboptimal feature selection model(SFSM),a feature selection technique designed to reduce complexity while maintaining the effectiveness of malicious traffic detection.Detection performance was evaluated on various malicious traffic,benign,exploits,and generic,using the UNSW-NB15 dataset and SFSM sub-optimized hyperparameters for feature selection and narrowed the search scope to encompass all features.SFSM improved learning performance while minimizing complexity by considering feature selection and exhaustive search as two steps,a problem not considered in conventional models.Our experimental results showed that the detection accuracy was improved by approximately 20%compared to the random model,and the reduction in accuracy compared to the greedy model,which performs an exhaustive search on all features,was kept within 6%.Additionally,latency and complexity were reduced by approximately 96%and 99.78%,respectively,compared to the greedy model.This study demonstrates that malicious traffic can be effectively detected even in lightweight device environments.SFSM verified the possibility of detecting various attack traffic on lightweight devices. 展开更多
关键词 Feature selection lightweight device machine learning Internet of Things malicious traffic
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部