Zobrazeno 1 - 10
of 439
pro vyhledávání: '"Sun, Haili"'
Multivariate Time Series (MTS) anomaly detection focuses on pinpointing samples that diverge from standard operational patterns, which is crucial for ensuring the safety and security of industrial applications. The primary challenge in this domain is
Externí odkaz:
http://arxiv.org/abs/2404.08224
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS). However, existing researches pa
Externí odkaz:
http://arxiv.org/abs/2403.02616
Publikováno v:
Computers & Security, 2023, 103570
Deep generative models are promising in detecting novel cyber-physical attacks, mitigating the vulnerability of Cyber-physical systems (CPSs) without relying on labeled information. Nonetheless, these generative models face challenges in identifying
Externí odkaz:
http://arxiv.org/abs/2311.02378
Publikováno v:
ISPRS Annals of the Photogrammetry Remote Sensing and Spatial Information Sciences2023
With the vigorous development of the urban construction industry, engineering deformation or changes often occur during the construction process. To combat this phenomenon, it is necessary to detect changes in order to detect construction loopholes i
Externí odkaz:
http://arxiv.org/abs/2309.07444
The rapid development of Industry 4.0 has amplified the scope and destructiveness of industrial Cyber-Physical System (CPS) by network attacks. Anomaly detection techniques are employed to identify these attacks and guarantee the normal operation of
Externí odkaz:
http://arxiv.org/abs/2302.10601
The feature diversity of different web systems in page elements, submission contents and return information makes it difficult to detect weak password automatically. To solve this problem, multi-factor correlation detection method as integrated in th
Externí odkaz:
http://arxiv.org/abs/2210.14582
TOR (The Onion Router) network is a widely used open source anonymous communication tool, the abuse of TOR makes it difficult to monitor the proliferation of online crimes such as to access criminal websites. Most existing approches for TOR network d
Externí odkaz:
http://arxiv.org/abs/2209.12482
Autor:
Zhou, Feng, Xia, Xinming, Wei, Yaozhen, Sun, Haili, Yao, Haiyun, Zhu, Jun, Liu, Changjun, Cao, Longsheng, Lan, Jian, Liu, Xinwei, Wang, Lili, Han, Changdao, Chen, Liang, Hu, Huasi
Publikováno v:
In Journal of Environmental Chemical Engineering December 2024 12(6)
Publikováno v:
In Ceramics International 15 July 2024 50(14):24995-25004
Publikováno v:
In Food Hydrocolloids April 2024 149