![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization
As network scale expands and concurrent requests grow, unexpected network anomalies are more frequent, leading to service interruptions and degraded user experience. Real-time, accurate troubleshooting is crit...
-
Chapter and Conference Paper
Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection
Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...
-
Chapter and Conference Paper
MEBV: Resource Optimization for Packet Classification Based on Map** Encoding Bit Vectors
Packet classification plays a key role in network security systems such as firewalls and QoS. The so-called packet classification is to classify packets into different categories according to a set of predefin...
-
Chapter and Conference Paper
An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis
With the large scale NGSO constellation systems entering the blowout launch period, new challenges are expected for inter-system satellite coexistence due to the increase in scale of the constellations and the...
-
Chapter and Conference Paper
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels
Aspect and opinion terms co-extraction is to extract what target is being discussed from the sentences and know what kind of emotion this target has. There are many studies about this task. To obtain the impor...
-
Chapter and Conference Paper
Landscape-Enhanced Graph Attention Network for Rumor Detection
Rumor detection aims to classify the truthfulness of content on social media. Due to the rapid development of web-based social platforms, rumors are disseminated in an ever faster speed. Recently, this problem...
-
Chapter and Conference Paper
AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection
Community Question Answering (CQA) provides platforms for users with various background to obtain information and share knowledge. In the recent years, with the rapid development of such online platforms, an e...
-
Chapter and Conference Paper
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors
Web shells are commonly used to transfer malicious scripts in order to control web servers remotely. Malicious web shells are detected by extracting the feature profiles of known web shells and creating a lear...
-
Chapter and Conference Paper
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis
Confidential information analysis can identify the text containing confidential information, thereby protecting organizations from the threat posed by leakage of confidential information. It is effective to bu...
-
Chapter and Conference Paper
A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition
Powered by the advanced neural network, many tasks in the field of natural language processing could be completed by the network models. As the noise in the input text can affect negatively on the performance ...
-
Chapter and Conference Paper
SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection
Sarcasm detection is to identify the text with the author’s sarcastic attitude. Verbal sarcasm is one main error sources of sentiment analysis tasks. However, labeled sarcastic samples are expensive to obtain....
-
Chapter and Conference Paper
Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection
Spam image detection is essential for protecting the security and privacy of Internet users and saving network resources. However, we observe a spam image detection system might be out of order due to adversar...
-
Chapter and Conference Paper
Research on Physical Layer Security Scheme Based on OAM
Aiming at the physical layer information security risk in wireless communication system, a physical layer security transmission technology based on OAM (Orbital angular momentum) modulation is proposed in this...
-
Chapter and Conference Paper
Effect of Dam** Factor Variation on Eigenfrequency Drift for Ultrasonic Motors
Experimental studies reveal that the eigenfrequency of stator is increasing along with the growing preload. However, the inherent mechanism is obscure and the equivalent physical model is not investigated espe...
-
Chapter and Conference Paper
A Two-Stage Model Based on BERT for Short Fake News Detection
Online social media promotes the development of the news industry and make it easy for everyone to obtain the latest news. Meanwhile, the circumstances get worse because of fake news. Fake news is flooding and...
-
Chapter and Conference Paper
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks
Deep neural networks have achieved great success in many domains. However, they are vulnerable to adversarial attacks, which generate adversarial examples by adding tiny perturbations to legitimate images. Previo...
-
Chapter and Conference Paper
Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis
Word embedding is one common word vector representation with improved performance for sentiment analysis task. Most existing methods of learning context-based word embedding are semantic oriented, but they typ...
-
Chapter and Conference Paper
HEVC Lossless Compression Coding Based on Hadamard Butterfly Transformation
Efficient video transmission has always been an important challenge in the field of computer networks. Elegant compression coding strategy will signicantly alleviate the heavy burden on network bandwidth. High...