期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research on the Signal Reconstruction of the Phased Array Structural Health Monitoring Based Using the Basis Pursuit Algorithm 被引量:3
1
作者 Yajie Sun Yanqing Yuan +3 位作者 Qi Wang lihua Wang enlu li li Qiao 《Computers, Materials & Continua》 SCIE EI 2019年第2期409-420,共12页
The signal processing problem has become increasingly complex and demand high acquisition system,this paper proposes a new method to reconstruct the structure phased array structural health monitoring signal.The metho... The signal processing problem has become increasingly complex and demand high acquisition system,this paper proposes a new method to reconstruct the structure phased array structural health monitoring signal.The method is derived from the compressive sensing theory and the signal is reconstructed by using the basis pursuit algorithm to process the ultrasonic phased array signals.According to the principles of the compressive sensing and signal processing method,non-sparse ultrasonic signals are converted to sparse signals by using sparse transform.The sparse coefficients are obtained by sparse decomposition of the original signal,and then the observation matrix is constructed according to the corresponding sparse coefficients.Finally,the original signal is reconstructed by using basis pursuit algorithm,and error analysis is carried on.Experimental research analysis shows that the signal reconstruction method can reduce the signal complexity and required the space efficiently. 展开更多
关键词 Basis pursuit algorithm compressive sensing phased array signal reconstruction
在线阅读 下载PDF
A Two-Stage Highly Robust Text Steganalysis Model
2
作者 enlu li Zhangjie Fu +1 位作者 Siyu Chen Junfu Chen 《Journal of Cyber Security》 2020年第4期183-190,共8页
With the development of natural language processing,deep learning,and other technologies,text steganography is rapidly developing.However,adversarial attack methods have emerged that gives text steganography the abili... With the development of natural language processing,deep learning,and other technologies,text steganography is rapidly developing.However,adversarial attack methods have emerged that gives text steganography the ability to actively spoof steganalysis.If terrorists use the text steganography method to spread terrorist messages,it will greatly disturb social stability.Steganalysis methods,especially those for resisting adversarial attacks,need to be further improved.In this paper,we propose a two-stage highly robust model for text steganalysis.The proposed method analyzes and extracts anomalous features at both intra-sentential and inter-sentential levels.In the first phase,every sentence is first transformed into word vectors.To obtain a high dimensional sentence vector,we use Bi-LSTM to obtain feature information for all words in the sentence while retaining strong correlations.In the second phase,we input multiple sentences vectors into the GNN,from which we extract inter-sentential anomaly features and make a judgment as to whether the text contains secret messages.In addition,to improve the robustness of the model,we add adversarial examples to the training set to improve the robustness and generalization of the steganalysis model.Theoretically,our proposed method is more robust and more accurate in detection compared to existing methods. 展开更多
关键词 Text steganalysis adversarial attack natural language processing deep learning
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部