期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
A Survey on Image Semantic Segmentation Using Deep Learning Techniques
1
作者 Jieren Cheng Hua Li +2 位作者 Dengbo Li Shuai Hua Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第1期1941-1957,共17页
Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,etc.In recent years,due ... Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,etc.In recent years,due to the remarkable performance of transformer and multilayer perceptron(MLP)in computer vision,which is equivalent to convolutional neural network(CNN),there has been a substantial amount of image semantic segmentation works aimed at developing different types of deep learning architecture.This survey aims to provide a comprehensive overview of deep learning methods in the field of general image semantic segmentation.Firstly,the commonly used image segmentation datasets are listed.Next,extensive pioneering works are deeply studied from multiple perspectives(e.g.,network structures,feature fusion methods,attention mechanisms),and are divided into four categories according to different network architectures:CNN-based architectures,transformer-based architectures,MLP-based architectures,and others.Furthermore,this paper presents some common evaluation metrics and compares the respective advantages and limitations of popular techniques both in terms of architectural design and their experimental value on the most widely used datasets.Finally,possible future research directions and challenges are discussed for the reference of other researchers. 展开更多
关键词 Deep learning semantic segmentation CNN MLP TRANSFORMER
下载PDF
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
2
作者 Ahmad O.Aseeri Sajjad Hussain Chauhdary +2 位作者 Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1901-1918,共18页
IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted... IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec. 展开更多
关键词 Cyber-physical systems security data aggregation Internet of Things physical unclonable function swarm intelligences
下载PDF
Evaluating accuracy of Hessian-based predictor-corrector integrators
3
作者 LU Shao-fei WU Heng LIU Xu-chong 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第7期1696-1702,共7页
Direct dynamics simulations are a useful and general approach for studying the atomistic properties of complex chemical systems because they do not require fitting an analytic potential energy function.Hessian-based p... Direct dynamics simulations are a useful and general approach for studying the atomistic properties of complex chemical systems because they do not require fitting an analytic potential energy function.Hessian-based predictor-corrector integrators are a widely used approach for calculating the trajectories of moving atoms in direct dynamics simulations.We employ a monodromy matrix to propose a tool for evaluating the accuracy of integrators in the trajectory calculation.We choose a general velocity Verlet as a different object.We also simulate molecular with hydrogen(CO_2) and molecular with hydrogen(H_2O) motions.Comparing the eigenvalues of monodromy matrix,many simulations show that Hessian-based predictor-corrector integrators perform well for Hessian updates and non-Hessian updates.Hessian-based predictor-corrector integrator with Hessian update has a strong performance in the H_2O simulations.Hessian-based predictor-corrector integrator with Hessian update has a strong performance when the integrating step of the velocity Verlet approach is tripled for the predicting step.In the CO_2 simulations,a strong performance occurs when the integrating step is a multiple of five. 展开更多
关键词 MONODROMY matrix eigenvalue Hessian-based PREDICTOR-CORRECTOR velocity Verlet
下载PDF
A Survey on Binary Code Vulnerability Mining Technology
4
作者 Pengzhi Xu Zetian Mai +2 位作者 Yuhao Lin Zhen Guo Victor S.Sheng 《Journal of Information Hiding and Privacy Protection》 2021年第4期165-179,共15页
With the increase of software complexity,the security threats faced by the software are also increasing day by day.So people pay more and more attention to the mining of software vulnerabilities.Although source code h... With the increase of software complexity,the security threats faced by the software are also increasing day by day.So people pay more and more attention to the mining of software vulnerabilities.Although source code has rich semantics and strong comprehensibility,source code vulnerability mining has been widely used and has achieved significant development.However,due to the protection of commercial interests and intellectual property rights,it is difficult to obtain source code.Therefore,the research on the vulnerability mining technology of binary code has strong practical value.Based on the investigation of related technologies,this article firstly introduces the current typical binary vulnerability analysis framework,and then briefly introduces the research background and significance of the intermediate language;with the rise of artificial intelligence,a large number of machine learning methods have been tried to solve the problem of binary vulnerability mining.This article divides the current related binary vulnerabilities mining technology into traditional mining technology and machine learning mining technology,respectively introduces its basic principles,research status and existing problems,and briefly summarizes them.Finally,based on the existing research work,this article puts forward the prospect of the future research on the technology of binary program vulnerability mining. 展开更多
关键词 BINARY vulnerability mining stain analysis symbolic execution fuzzing testing machine learning
下载PDF
An Improved BPNN Prediction Method Based on Multi-Strategy Sparrow Search Algorithm 被引量:1
5
作者 Xiangyan Tang Dengfang Feng +3 位作者 KeQiu Li Jingxin Liu Jinyang Song Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第2期2789-2802,共14页
Data prediction can improve the science of decision-making by making predictions about what happens in daily life based on natural law trends.Back propagation(BP)neural network is a widely used prediction method.To re... Data prediction can improve the science of decision-making by making predictions about what happens in daily life based on natural law trends.Back propagation(BP)neural network is a widely used prediction method.To reduce its probability of falling into local optimum and improve the prediction accuracy,we propose an improved BP neural network prediction method based on a multi-strategy sparrow search algorithm(MSSA).The weights and thresholds of the BP neural network are optimized using the sparrow search algorithm(SSA).Three strategies are designed to improve the SSA to enhance its optimization-seeking ability,leading to the MSSA-BP prediction model.The MSSA algorithm was tested with nine different types of benchmark functions to verify the optimization performance of the algorithm.Two different datasets were selected for comparison experiments on three groups of models.Under the same conditions,the mean absolute error(MAE),root mean square error(RMSE),andmean absolute percentage error(MAPE)of the prediction results of MSSA-BPwere significantly reduced,and the convergence speed was significantly improved.MSSA-BP can effectively improve the prediction accuracy and has certain application value. 展开更多
关键词 PREDICTION parrow search algorithm back propagation neural network
下载PDF
GrCol-PPFL:User-Based Group Collaborative Federated Learning Privacy Protection Framework 被引量:1
6
作者 Jieren Cheng Zhenhao Liu +2 位作者 Yiming Shi Ping Luo Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第1期1923-1939,共17页
With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more important.Based on the premise of protecting users’personal p... With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more important.Based on the premise of protecting users’personal privacy data,federated learning(FL)uses data stored on edge devices to realize training tasks by contributing training model parameters without revealing the original data.However,since FL can still leak the user’s original data by exchanging gradient information.The existing privacy protection strategy will increase the uplink time due to encryption measures.It is a huge challenge in terms of communication.When there are a large number of devices,the privacy protection cost of the system is higher.Based on these issues,we propose a privacy-preserving scheme of user-based group collaborative federated learning(GrCol-PPFL).Our scheme primarily divides participants into several groups and each group communicates in a chained transmission mechanism.All groups work in parallel at the same time.The server distributes a random parameter with the same dimension as the model parameter for each participant as a mask for the model parameter.We use the public datasets of modified national institute of standards and technology database(MNIST)to test the model accuracy.The experimental results show that GrCol-PPFL not only ensures the accuracy of themodel,but also ensures the security of the user’s original data when users collude with each other.Finally,through numerical experiments,we show that by changing the number of groups,we can find the optimal number of groups that reduces the uplink consumption time. 展开更多
关键词 Federated learning privacy protection uplink consumption time
下载PDF
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain 被引量:1
7
作者 Jieren Cheng Xiulai Li +2 位作者 Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期975-992,共18页
With the rapid development of blockchain technology,the number of distributed applications continues to increase,so ensuring the security of the network has become particularly important.However,due to its decentraliz... With the rapid development of blockchain technology,the number of distributed applications continues to increase,so ensuring the security of the network has become particularly important.However,due to its decentralized,decentralized nature,blockchain networks are vulnerable to distributed denial-of-service(DDoS)attacks,which can lead to service stops,causing serious economic losses and social impacts.The research questions in this paper mainly include two aspects:first,the classification of DDoS,which refers to detecting whether blockchain nodes are suffering DDoS attacks,that is,detecting the data of nodes in parallel;The second is the problem of DDoS segmentation,that is,multiple pieces of data that appear at the same time are determined which type of DDoS attack they belong to.In order to solve these problems,this paper proposes a modified PointNet(MPointNet)for the classification and type segmentation of DDoS attacks.A dataset containing multiple DDoS attack types was constructed using the CIC-DDoS2019 dataset,and trained,validated,and tested accordingly.The results show that the proposed DDoS attack classification method has high performance and can be used for the actual blockchain security maintenance process.The accuracy rate of classification tasks reached 99.65%,and the accuracy of type segmentation tasks reached 85.47%.Therefore,the method proposed in this paper has high application value in detecting the classification and segmentation of DDoS attacks. 展开更多
关键词 Blockchain DDOS PointNet classification and segmentation
下载PDF
Blockchain Security Threats and Collaborative Defense:A Literature Review 被引量:1
8
作者 Xiulai Li Jieren Cheng +5 位作者 Zhaoxin Shi Jingxin Liu Bin Zhang Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第9期2597-2629,共33页
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu... As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies. 展开更多
关键词 Blockchain threat assessment collaborative defense security evaluation
下载PDF
Few-Shot Object Detection Based on the Transformer and High-Resolution Network 被引量:1
9
作者 Dengyong Zhang Huaijian Pu +2 位作者 Feng Li Xiangling Ding Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第2期3439-3454,共16页
Now object detection based on deep learning tries different strategies.It uses fewer data training networks to achieve the effect of large dataset training.However,the existing methods usually do not achieve the balan... Now object detection based on deep learning tries different strategies.It uses fewer data training networks to achieve the effect of large dataset training.However,the existing methods usually do not achieve the balance between network parameters and training data.It makes the information provided by a small amount of picture data insufficient to optimize model parameters,resulting in unsatisfactory detection results.To improve the accuracy of few shot object detection,this paper proposes a network based on the transformer and high-resolution feature extraction(THR).High-resolution feature extractionmaintains the resolution representation of the image.Channels and spatial attention are used to make the network focus on features that are more useful to the object.In addition,the recently popular transformer is used to fuse the features of the existing object.This compensates for the previous network failure by making full use of existing object features.Experiments on the Pascal VOC and MS-COCO datasets prove that the THR network has achieved better results than previous mainstream few shot object detection. 展开更多
关键词 Object detection few shot object detection TRANSFORMER HIGH-RESOLUTION
下载PDF
Gate-Attention and Dual-End Enhancement Mechanism for Multi-Label Text Classification
10
作者 Jieren Cheng Xiaolong Chen +3 位作者 Wenghang Xu Shuai Hua Zhu Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第11期1779-1793,共15页
In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative approaches.Many studies in sema... In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative approaches.Many studies in semantic feature extraction have turned to external knowledge to augment the model’s grasp of textual content,often overlooking intrinsic textual cues such as label statistical features.In contrast,these endogenous insights naturally align with the classification task.In our paper,to complement this focus on intrinsic knowledge,we introduce a novel Gate-Attention mechanism.This mechanism adeptly integrates statistical features from the text itself into the semantic fabric,enhancing the model’s capacity to understand and represent the data.Additionally,to address the intricate task of mining label correlations,we propose a Dual-end enhancement mechanism.This mechanism effectively mitigates the challenges of information loss and erroneous transmission inherent in traditional long short term memory propagation.We conducted an extensive battery of experiments on the AAPD and RCV1-2 datasets.These experiments serve the dual purpose of confirming the efficacy of both the Gate-Attention mechanism and the Dual-end enhancement mechanism.Our final model unequivocally outperforms the baseline model,attesting to its robustness.These findings emphatically underscore the imperativeness of taking into account not just external knowledge but also the inherent intricacies of textual data when crafting potent MLTC models. 展开更多
关键词 Multi-label text classification feature extraction label distribution information sequence generation
下载PDF
Small Object Detection via Precise Region-Based Fully Convolutional Networks 被引量:9
11
作者 Dengyong Zhang Jiawei Hu +3 位作者 Feng Li Xiangling Ding Arun Kumar Sangaiah Victor SSheng 《Computers, Materials & Continua》 SCIE EI 2021年第11期1503-1517,共15页
In the past several years,remarkable achievements have been made in the field of object detection.Although performance is generally improving,the accuracy of small object detection remains low compared with that of la... In the past several years,remarkable achievements have been made in the field of object detection.Although performance is generally improving,the accuracy of small object detection remains low compared with that of large object detection.In addition,localization misalignment issues are common for small objects,as seen in GoogLeNets and residual networks(ResNets).To address this problem,we propose an improved region-based fully convolutional network(R-FCN).The presented technique improves detection accuracy and eliminates localization misalignment by replacing positionsensitive region of interest(PS-RoI)pooling with position-sensitive precise region of interest(PS-Pr-RoI)pooling,which avoids coordinate quantization and directly calculates two-order integrals for position-sensitive score maps,thus preventing a loss of spatial precision.A validation experiment was conducted in which the Microsoft common objects in context(MS COCO)training dataset was oversampled.Results showed an accuracy improvement of 3.7%for object detection tasks and an increase of 6.0%for small objects. 展开更多
关键词 Small object detection precise R-FCN PS-Pr-RoI pooling two-stage detector
下载PDF
PoEC: A Cross-Blockchain Consensus Mechanism for Governing Blockchain by Blockchain 被引量:1
12
作者 Jieren Cheng Yuan Zhang +4 位作者 Yuming Yuan Hui Li Xiangyan Tang Victor S.Sheng Guangjing Hu 《Computers, Materials & Continua》 SCIE EI 2022年第10期1385-1402,共18页
The research on the governing blockchain by blockchain supervision system is an important development trend of blockchain technology.In this system there is a supervisory blockchain managing and governing the supervis... The research on the governing blockchain by blockchain supervision system is an important development trend of blockchain technology.In this system there is a supervisory blockchain managing and governing the supervised blockchain based on blockchain technology,results in a uniquely cross-blockchain demand to consensus mechanism for solving the trust problem between supervisory blockchain and supervised blockchain.To solve this problem,this paper proposes a cross-blockchain consensus mechanism based on smart contract and a set of smart contracts endorse the crossblockchain consensus.New consensus mechanism called Proof-of-EndorseContracts(PoEC)consensus,which firstly transfers the consensus reached in supervisory blockchain to supervised blockchain by supervisory nodes,then packages the supervisory block in supervisory blockchain and transmits it to the smart contract deployed in the supervised blockchain,finally miners in supervised blockchain will execute and package the new block according to the status of the smart contract.The core part of the consensus mechanism is Endorse Contracts which designed and implemented by us and verified the effectiveness through experiments.PoEC consensus mechanism and Endorse Contracts support the supervised blockchain to join the governing blockchain by blockchain system without changing the original consensus mechanism,which has the advantages of low cost,high scalability and being able to crossblockchain.This paper proves that our method can provide a feasible crossblockchain governance scheme for the field of blockchain governance. 展开更多
关键词 Proof-of-endorse-contracts PoEC cross-blockchain consensus mechanism governing blockchain by blockchain
下载PDF
Load Optimization Scheduling of Chip Mounter Based on Hybrid Adaptive Optimization 被引量:2
13
作者 Xuesong Yan Hao Zuo +2 位作者 Chengyu Hu Wenyin Gong Victor S.Sheng 《Complex System Modeling and Simulation》 2023年第1期1-11,共11页
A chip mounter is the core equipment in the production line of the surface-mount technology,which is responsible for finishing the mount operation.It is the most complex and time-consuming stage in the production proc... A chip mounter is the core equipment in the production line of the surface-mount technology,which is responsible for finishing the mount operation.It is the most complex and time-consuming stage in the production process.Therefore,it is of great significance to optimize the load balance and mounting efficiency of the chip mounter and improve the mounting efficiency of the production line.In this study,according to the specific type of chip mounter in the actual production line of a company,a maximum and minimum model is established to minimize the maximum cycle time of the chip mounter in the production line.The production efficiency of the production line can be improved by optimizing the workload scheduling of each chip mounter.On this basis,a hybrid adaptive optimization algorithm is proposed to solve the load scheduling problem of the mounter.The hybrid algorithm is a hybrid of an adaptive genetic algorithm and the improved ant colony algorithm.It combines the advantages of the two algorithms and improves their global search ability and convergence speed.The experimental results show that the proposed hybrid optimization algorithm has a good optimization effect and convergence in the load scheduling problem of chip mounters. 展开更多
关键词 Surface Mount Technology(SMT) chip mounter load optimization scheduling adaptive genetic algorithm ant colony algorithm
原文传递
Image Inpainting Detection Based on High-Pass Filter Attention Network
14
作者 Can Xiao Feng Li +3 位作者 Dengyong Zhang Pu Huang Xiangling Ding Victor S.Sheng 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1145-1154,共10页
Image inpainting based on deep learning has been greatly improved.The original purpose of image inpainting was to repair some broken photos, suchas inpainting artifacts. However, it may also be used for malicious oper... Image inpainting based on deep learning has been greatly improved.The original purpose of image inpainting was to repair some broken photos, suchas inpainting artifacts. However, it may also be used for malicious operations,such as destroying evidence. Therefore, detection and localization of imageinpainting operations are essential. Recent research shows that high-pass filteringfull convolutional network (HPFCN) is applied to image inpainting detection andachieves good results. However, those methods did not consider the spatial location and channel information of the feature map. To solve these shortcomings, weintroduce the squeezed excitation blocks (SE) and propose a high-pass filter attention full convolutional network (HPACN). In feature extraction, we apply concurrent spatial and channel attention (scSE) to enhance feature extraction and obtainmore information. Channel attention (cSE) is introduced in upsampling toenhance detection and localization. The experimental results show that the proposed method can achieve improvement on ImageNet. 展开更多
关键词 Image inpainting detection spatial attention channel attention full convolutional network high-pass filter
下载PDF
Task-Based Visualization Using Merged View
15
作者 Taeg Hyun Kang Young Lee Mais Nijim 《通讯和计算机(中英文版)》 2012年第6期665-668,共4页
关键词 可视化技术 视图 合并 软件系统 调制解调器 开发成本 程序员 自动化
下载PDF
HUSS:A Heuristic Method for Understanding the Semantic Structure of Spreadsheets
16
作者 Xindong Wu Hao Chen +3 位作者 Chenyang Bu Shengwei Ji Zan Zhang Victor S.Sheng 《Data Intelligence》 EI 2023年第3期537-559,共23页
Spreadsheets contain a lot of valuable data and have many practical applications.The key technology of these practical applications is how to make machines understand the semantic structure of spreadsheets,e.g.,identi... Spreadsheets contain a lot of valuable data and have many practical applications.The key technology of these practical applications is how to make machines understand the semantic structure of spreadsheets,e.g.,identifying cell function types and discovering relationships between cell pairs.Most existing methods for understanding the semantic structure of spreadsheets do not make use of the semantic information of cells.A few studies do,but they ignore the layout structure information of spreadsheets,which affects the performance of cell function classification and the discovery of different relationship types of cell pairs.In this paper,we propose a Heuristic algorithm for Understanding the Semantic Structure of spreadsheets(HUSS).Specifically,for improving the cell function classification,we propose an error correction mechanism(ECM)based on an existing cell function classification model[11]and the layout features of spreadsheets.For improving the table structure analysis,we propose five types of heuristic rules to extract four different types of cell pairs,based on the cell style and spatial location information.Our experimental results on five real-world datasets demonstrate that HUSS can effectively understand the semantic structure of spreadsheets and outperforms corresponding baselines. 展开更多
关键词 Spreadsheet semantic structure Information extraction HEURISTICS Cell function analysis Table structure analysis
原文传递
A Survey on the Moving Target Defense Strategies:An Architectural Perspective 被引量:8
17
作者 Jianjun Zheng Akbar Siami Namin 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第1期207-233,共27页
As the complexity and the scale of networks continue to grow,the management of the network operations and security defense has become a challenging task for network administrators,and many network devices may not be u... As the complexity and the scale of networks continue to grow,the management of the network operations and security defense has become a challenging task for network administrators,and many network devices may not be updated timely,leaving the network vulnerable to potential attacks.Moreover,the static nature of our existing network infrastructure allows attackers to have enough time to study the static configurations of the network and to launch well-crafted attacks at their convenience while defenders have to work around the clock to defend the network.This asymmetry,in terms of time and money invested,has given attackers greater advantage than defenders and has made the security defense even more challenging.It calls for new and innovative ideas to fix the problem.Moving Target Defense (MTD)is one of the innovative ideas which implements diverse and dynamic configurations of network systems with the goal of puzzling the exact attack surfaces available to attackers.As a result,the system status with the MTD strategy is unpredictable to attackers,hard to exploit,and is more resilient to various forms of attacks.There are existing survey papers on various MTD techniques,but to the best of our knowledge,insufficient focus was given on the architectural perspective of MTD strategies or some new technologies such as Internet of Things (IoT).This paper presents a comprehensive survey on MTD and implementation strategies from the perspective of the architecture of the complete network system,covering the motivation for MTD,the explanation of main MTD concepts,ongoing research efforts of MTD and its implementation at each level of the network system,and the future research opportunities offered by new technologies such as Software-Defined Networking (SDN)and Internet of Things (IoT). 展开更多
关键词 MOVING TARGET DEFENSE network security Software-Defined NETWORKING (SDN)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部