|
|
|
Chenglin Yang, Dongliang Xu and Xiao Ma
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced...
ver más
|
|
|
|
|
|
Tamás Kegyes, Alex Kummer, Zoltán Süle and János Abonyi
We analyzed a special class of graph traversal problems, where the distances are stochastic, and the agent is restricted to take a limited range in one go. We showed that both constrained shortest Hamiltonian pathfinding problems and disassembly line bal...
ver más
|
|
|
|
|
|
Zhongchu Tian and Binlin Xu
As important load-bearing structures, suspension cables have been widely used in suspension bridges, engineering ropeways, cable suspension systems and other special equipment. Their dynamic problems have always been a research hotspot. Especially for co...
ver más
|
|
|
|
|
|
Longxin Yao, Yun Lu, Mingjiang Wang, Yukun Qian and Heng Li
The construction of complex networks from electroencephalography (EEG) proves to be an effective method for representing emotion patterns in affection computing as it offers rich spatiotemporal EEG features associated with brain emotions. In this paper, ...
ver más
|
|
|
|
|
|
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d...
ver más
|
|
|