Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.Thi...Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking,object detection,precision landing,and real-time telemetry via long-range communication protocols.The system integrates an onboard flight controller running real-time sensor fusion algorithms,a vision-based detection system on a companion single-board computer,and a telemetry unit using Long Range(LoRa)communication.Extensive flight tests were conducted to validate the system’s stability,communication range,and autonomous capabilities.Potential applications in law enforcement,agriculture,search and rescue,and environmental monitoring are also discussed.展开更多
Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the ...Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the complex interactions between inks and support baths.Here,we present an artificial intelligence(AI)-driven framework that interprets and predicts embedded printability using rheological data.Using a standardized workflow,we extracted 21 rheological descriptors and established 12 indicators to evaluate structural continuity and geometric fidelity.Interpretable machine learning models revealed that direction-dependent defects are governed by the synergistic interplay among ink yield stress,support bath zero shear viscosity,flow behavior index,and time constant.To enable the prediction of printability in a generalizable manner,we further developed a cascaded neural network,which achieved mean relative prediction errors below 15%across all indicators.Experimental validation using three-dimensional(3 D)-printed constructs and micro-computed tomography(μCT)reconstructions confirmed a strong correlation between predicted and actual fidelity.This work establishes a physics-informed,data-driven paradigm for decoding and optimizing embedded printing,offering broad applicability and providing a robust tool for the rapid pairing of suitable printable ink-support bath combinations.展开更多
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further...With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.展开更多
Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame...Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame-work that uses Bidirectional Encoder Representations from Transformers(BERT)for contextual feature extraction and a multiple-window Convolutional Neural Network(CNN)for classification.To identify semantic nuances in email content,BERT embeddings are used,and CNN filters extract discriminative n-gram patterns at various levels of detail,enabling accurate spam identification.The proposed model outperformed Word2Vec-based baselines on a sample of 5728 labelled emails,achieving an accuracy of 98.69%,AUC of 0.9981,F1 Score of 0.9724,and MCC of 0.9639.With a medium kernel size of(6,9)and compact multi-window CNN architectures,it improves performance.Cross-validation illustrates stability and generalization across folds.By balancing high recall with minimal false positives,our method provides a reliable and scalable solution for current spam detection in advanced deep learning.By combining contextual embedding and a neural architecture,this study develops a security analysis method.展开更多
Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and c...Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and cyberattack detection.Overlapping community detection refers to the case of a node belonging to multiple communities simultaneously,which is a much more meaningful and challenging task.Graph representation learning with Evolutionary Computation has been studied well in overlapping community detection to deal with complex network structures and characteristics.However,most of them focus on searching the entire solution space,which can be inefficient and lead to inadequate results.To overcome the problem,a structural feature node extraction method is first proposed that can effectively map a network into a structural embedding space.Thus,nodes within the network are classified into hierarchical levels based on their structural feature strength,and only nodes with relatively high strength are considered in subsequent search steps to reduce the search space.Then,a maximal-clique representation method is employed on the given vertex set to identify overlapping nodes.A hybrid clique-based multi-objective evolutionary algorithmwith decomposition method is designed to address cliques and the remaining unexplored nodes separately.The number of communities generated with this allocation method is closer to the actual partition count with high division quality.Experimental results on nine usually used real-world networks,five synthetic networks,and two large-scale networks demonstrate the effectiveness of the proposed methodology in terms of community quality and algorithmic efficiency,compared to traditional,MOEA-based,and graph embedding-based community detection algorithms.展开更多
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu...Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.展开更多
In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the effor...In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the efforts of researchers and security experts to protect information systems from these attacks,the threat persists and the proposed solutions are not able to significantly stop the spread of ransomware attacks.The latest remarkable achievements of large language models(LLMs)in NLP tasks have caught the attention of cybersecurity researchers to integrate thesemodels into security threat detection.Thesemodels offer high embedding capabilities,able to extract rich semantic representations and paving theway formore accurate and adaptive solutions.In this context,we propose a new approach for ransomware detection based on an ensemblemethod that leverages three distinctLLMembeddingmodels.This ensemble strategy takes advantage of the variety of embedding methods and the strengths of each model.In the proposed solution,each embedding model is associated with an independently trainedMLP classifier.The predictions obtained are then merged using a weighted voting technique,assigning each model an influence proportional to its performance.This approach makes it possible to exploit the complementarity of representations,improve detection accuracy and robustness,and offer a more reliable solution in the face of the growing diversity and complexity of modern ransomware.展开更多
Multivariate time series forecasting plays a crucial role in decision-making for systems like energy grids and transportation networks,where temporal patterns emerge across diverse scales from short-term fluctuations ...Multivariate time series forecasting plays a crucial role in decision-making for systems like energy grids and transportation networks,where temporal patterns emerge across diverse scales from short-term fluctuations to long-term trends.However,existing Transformer-based methods often process data at a single resolution or handle multiple scales independently,overlooking critical cross-scale interactions that influence prediction accuracy.To address this gap,we introduce the Hierarchical Attention Transformer(HAT),which enables direct information exchange between temporal hierarchies through a novel cross-scale attention mechanism.HAT extracts multi-scale features using hierarchical convolutional-recurrent blocks,fuses them via temperature-controlled mechanisms,and optimizes gradient flow with residual connections for stable training.Evaluations on eight benchmark datasets show HAT outperforming state-of-the-art baselines,with average reductions of 8.2%in MSE and 7.5%in MAE across horizons,while achieving a 6.1×training speedup over patch-based methods.These advancements highlight HAT’s potential for applications requiring multi-resolution temporal modeling.展开更多
Temporal knowledge graph completion(TKGC),which merges temporal information into traditional static knowledge graph completion(SKGC),has garnered increasing attention recently.Among numerous emerging approaches,transl...Temporal knowledge graph completion(TKGC),which merges temporal information into traditional static knowledge graph completion(SKGC),has garnered increasing attention recently.Among numerous emerging approaches,translation-based embedding models constitute a prominent approach in TKGC research.However,existing translation-based methods typically incorporate timestamps into entities or relations,rather than utilizing them independently.This practice fails to fully exploit the rich semantics inherent in temporal information,thereby weakening the expressive capability of models.To address this limitation,we propose embedding timestamps,like entities and relations,in one or more dedicated semantic spaces.After projecting all embeddings into a shared space,we use the relation-timestamp pair instead of the conventional relation embedding as the translation vector between head and tail entities.Our method elevates timestamps to the same representational significance as entities and relations.Based on this strategy,we introduce two novel translation-based embedding models:TE-TransR and TE-TransT.With the independent representation of timestamps,our method not only enhances capabilities in link prediction but also facilitates a relatively underexplored task,namely time prediction.To further bolster the precision and reliability of time prediction,we introduce a granular,time unit-based timestamp setting and a relation-specific evaluation protocol.Extensive experiments demonstrate that our models achieve strong performance on link prediction benchmarks,with TE-TransR outperforming existing baselines in the time prediction task.展开更多
Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instabili...Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instability,occur frequently in both experimental and operational data.This infrequency causes events to be overlooked by existing prediction models,which lack the precision to accurately predict inclination attitudes in amphibious vehicles.To address this gap in predicting attitudes near extreme inclination points,this study introduces a novel loss function,termed generalized extreme value loss.Subsequently,a deep learning model for improved waterborne attitude prediction,termed iInformer,was developed using a Transformer-based approach.During the embedding phase,a text prototype is created based on the vehicle’s operation log data is constructed to help the model better understand the vehicle’s operating environment.Data segmentation techniques are used to highlight local data variation features.Furthermore,to mitigate issues related to poor convergence and slow training speeds caused by the extreme value loss function,a teacher forcing mechanism is integrated into the model,enhancing its convergence capabilities.Experimental results validate the effectiveness of the proposed method,demonstrating its ability to handle data imbalance challenges.Specifically,the model achieves over a 60%improvement in root mean square error under extreme value conditions,with significant improvements observed across additional metrics.展开更多
To address the challenges of complexity,power consumption,and cost constraints in traditional display driver integrated circuits(DDICs)caused by external NOR Flash and SRAM,this work proposes an embedded resistive ran...To address the challenges of complexity,power consumption,and cost constraints in traditional display driver integrated circuits(DDICs)caused by external NOR Flash and SRAM,this work proposes an embedded resistive random-access memory(RRAM)integration solution based on a 40 nm high-voltage CMOS logic platform.Targeting the yield fluctuations and stability challenges during RRAM mass production,systematic process optimizations are implemented to achieve synergistic improvements in RRAM performance and yield.Through modifications to the film sputtering and pre-deposition treatment,the withinwafer resistance uniformity(RSU)of the oxygen-deficient layer(ODL)thin film is improved from 11%to 8%,while inter-wafer process stability variation reduces from 23%to below 6%.Consequently,the yield of 8 Mb RRAM embedded mass production products increases from 87%to 98.5%.In terms of device performance,the RRAM demonstrates a fast 4.8 ns read speed,exceptional read disturb immunity of 3×10^(8) cycles at 95℃,10^(3) write/erase endurance cycles for the 1 Mb cells,and data retention of 12.5 years at 125℃.Post high-temperature operating life(HTOL)testing exhibits stable high/low resistance window.This study provides process optimization strategies and a reliability assurance framework for the mass production of highly integrated,low-power embedded RRAM display driver IC.展开更多
In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is under...In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is undergoing a profound paradigm shift.The traditional rural division of labor pattern,which depends on tangible factors such as land,labor,and capital,has increasingly encountered developmental challenges characterized by diminishing marginal returns and a detrimental cycle of internal competition.The new quality productive force,centered on data,algorithms,green technologies,bioengineering,and clean energy,offers a potential pathway for the rural division of labor system to overcome the"low-level equilibrium".This force is characterized by attributes such as non-exclusivity,replicability,network collaboration,and ecological compatibility.This paper develops a three-dimensional collaborative analytical framework encompassing"technology,institution,and culture".It systematically elucidates the internal logic by which new quality productive forces drive the transformation of the rural division of labor from"quantitative factor matching"to"qualitative structural reorganization"through three principal mechanisms:technology embedding,institutional reconstruction,and cultural coupling.Furthermore,the study proposes corresponding policy recommendations,thereby offering theoretical insights to support the modernization of China s agriculture and rural areas,as well as the development of a strong agricultural country.展开更多
Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,ex...Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,existing unsupervised learning methods suffer from insufficient temporal and spatial constraints on shallow features,resulting in fragmented feature representations that compromise model stability and accuracy.To improve the extraction of valuable features,this paper investigates the influence of clustering constraints on shallow feature convergence paths at the model level and further proposes an end-to-end intrusion detection system based on efficient deep embedded subspace clustering(EDESC-IDS).Following the standard learning approach,continuous messages are encoded into two-dimensional data frames via a frame builder,which are then input into an extended convolutional autoencoder for extracting shallow features from high-dimensional data.On this basis,the dual constraints of these output features and the embedding clustering module facilitate end-to-end training of the EDESC-IDS in various attack scenarios.Extensive experimental results show that such a system exhibits significant detection performance on four types of attack datasets,including DoS,Gear,Fuzzy,and RPM,with precision,recall,and F1 scores consistently above 97.79%,while maintaining a false negative rate(FNR)and an error rate(ER)below 2.22%.展开更多
This paper presents an optimal operation method for embedded DC interconnections based on low-voltage AC/DC distribution areas(EDC-LVDA)under three-phase unbalanced compensation conditions.It can optimally determine t...This paper presents an optimal operation method for embedded DC interconnections based on low-voltage AC/DC distribution areas(EDC-LVDA)under three-phase unbalanced compensation conditions.It can optimally determine the transmission power of the DC and AC paths to simultaneously improve voltage quality and reduce losses.First,considering the embedded interconnected,unbalanced power structure of the distribution area,a power flow calculation method for EDC-LVDA that accounts for three-phase unbalanced compensation is introduced.This method accurately describes the power flow distribution characteristics under both AC and DC power allocation scenarios.Second,an optimization scheduling model for EDC-LVDA under three-phase unbalanced conditions is developed,incorporating network losses,voltage quality,DC link losses,and unbalance levels.The proposed model employs an improved particle swarm optimization(IPSO)two-layer algorithm to autonomously select different power allocation coefficients for the DC link and AC section under various operating conditions.This enables embedded economic optimization scheduling while maintaining compensation for unbalanced conditions.Finally,a case study based on the IEEE 13-node system for EDC-LVDA is conducted and tested.The results show that the proposed optimal operation method achieves a 100%voltage compliance rate and reduces network losses by 13.8%,while ensuring three-phase power balance compensation.This provides a practical solution for the modernization and upgrading of low-voltage power grids.展开更多
Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression...Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices.展开更多
The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild r...The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild reaction conditions.Using Cu as a model,the resulting Cu-aPN(copper‐embedded all‐inorganic phosphazene network)retains the intrinsic N_(3)P_(3)backbone and exhibits an amorphous structure where Cu species are uniformly anchored at dense P/N coordination sites of the network.Time of flight secondary ion mass spectrometry(TOF‐SIMS)and X‐ray diffraction(XRD)reveal a gradual CuCl‐to‐CuO phase conversion during ammonia treatment,which effectively ensures the structural stability of the phosphazene framework.In 1 M KOH,Cu-aPN delivers an overpotential of 280 mV at 10 mA cm^(−2)and a Tafel slope of 48 mV dec^(−1),markedly outperforming Ga-aPN.In situ Raman and density functional theory(DFT)analyses indicate stronger Cu-P/N coordination coupling that lowers the*OH formation barrier(0.39 vs.0.88 eV for Ga).This MR-DC route furnishes a general and versatile pathway for constructing metal‐embedded all‐inorganic phosphazene frameworks with tunable coordination environments for advanced electrocatalytic applications.展开更多
Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excess...Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excessive optical surfaces,reduced light throughput,and instrumental polarization.To address these limitations,we propose an embedded solar adaptive optics telescope(ESAOT)that intrinsically incorporates the solar AO(SAO)subsystem within the telescope's optical train,featuring a co-designed correction chain with a single Hartmann-Shack full-wavefront sensor(HS f-WFS)and a deformable secondary mirror(DSM).The HS f-WFS uses temporal-spatial hybrid sampling technique to simultane-ously resolve tip-tilt and high-order aberrations,while the DSM performs real-time compensation through adaptive modal optimization.This unified architecture achieves symmetrical polarization suppression and high system throughput by min-imizing optical surfaces.A 600 mm ESAOT prototype incorporating a 12×12 micro-lens array HS f-WFS and 61-actuator piezoelectric DSM has been developed and successfully conducted on-sky photospheric observations.Validations in-cluding turbulence simulations,optical bench testing,and practical observations at the Lijiang observatory collectively confirm the system's capability to maintain aboutλ/10 wavefront error during active region tracking.This architectural breakthrough of the ESAOT addresses long-standing SAO integration challenges in solar astronomy and provides scala-bility analyses confirming direct applicability to the existing and future large solar observation facilities.展开更多
文摘Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking,object detection,precision landing,and real-time telemetry via long-range communication protocols.The system integrates an onboard flight controller running real-time sensor fusion algorithms,a vision-based detection system on a companion single-board computer,and a telemetry unit using Long Range(LoRa)communication.Extensive flight tests were conducted to validate the system’s stability,communication range,and autonomous capabilities.Potential applications in law enforcement,agriculture,search and rescue,and environmental monitoring are also discussed.
基金supported by the National Natural Science Foundation of China(Nos.52305314 and U21A20394)the Beijing Natural Science Foundation(Nos.7252285 and L246001)the National Key Research and Development Program of China(No.2023YFB4605800)。
文摘Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the complex interactions between inks and support baths.Here,we present an artificial intelligence(AI)-driven framework that interprets and predicts embedded printability using rheological data.Using a standardized workflow,we extracted 21 rheological descriptors and established 12 indicators to evaluate structural continuity and geometric fidelity.Interpretable machine learning models revealed that direction-dependent defects are governed by the synergistic interplay among ink yield stress,support bath zero shear viscosity,flow behavior index,and time constant.To enable the prediction of printability in a generalizable manner,we further developed a cascaded neural network,which achieved mean relative prediction errors below 15%across all indicators.Experimental validation using three-dimensional(3 D)-printed constructs and micro-computed tomography(μCT)reconstructions confirmed a strong correlation between predicted and actual fidelity.This work establishes a physics-informed,data-driven paradigm for decoding and optimizing embedded printing,offering broad applicability and providing a robust tool for the rapid pairing of suitable printable ink-support bath combinations.
基金supported by the National Natural Science Foundation of China under Grant 62471493supported by the Natural Science Foundation of Shandong Province under Grant ZR2023LZH017,ZR2024MF066。
文摘With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2026R234)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame-work that uses Bidirectional Encoder Representations from Transformers(BERT)for contextual feature extraction and a multiple-window Convolutional Neural Network(CNN)for classification.To identify semantic nuances in email content,BERT embeddings are used,and CNN filters extract discriminative n-gram patterns at various levels of detail,enabling accurate spam identification.The proposed model outperformed Word2Vec-based baselines on a sample of 5728 labelled emails,achieving an accuracy of 98.69%,AUC of 0.9981,F1 Score of 0.9724,and MCC of 0.9639.With a medium kernel size of(6,9)and compact multi-window CNN architectures,it improves performance.Cross-validation illustrates stability and generalization across folds.By balancing high recall with minimal false positives,our method provides a reliable and scalable solution for current spam detection in advanced deep learning.By combining contextual embedding and a neural architecture,this study develops a security analysis method.
基金supported in part by the National Natural Science Foundation of China under Grants 62473176,62073155,62002137,62106088,and 62206113National Key Laboratory of Ship Structural Safety underGrant 450324300the Postgraduate Research&Practice Innovation Programof Jiangsu Province under Grant KYCX24_2642.
文摘Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and cyberattack detection.Overlapping community detection refers to the case of a node belonging to multiple communities simultaneously,which is a much more meaningful and challenging task.Graph representation learning with Evolutionary Computation has been studied well in overlapping community detection to deal with complex network structures and characteristics.However,most of them focus on searching the entire solution space,which can be inefficient and lead to inadequate results.To overcome the problem,a structural feature node extraction method is first proposed that can effectively map a network into a structural embedding space.Thus,nodes within the network are classified into hierarchical levels based on their structural feature strength,and only nodes with relatively high strength are considered in subsequent search steps to reduce the search space.Then,a maximal-clique representation method is employed on the given vertex set to identify overlapping nodes.A hybrid clique-based multi-objective evolutionary algorithmwith decomposition method is designed to address cliques and the remaining unexplored nodes separately.The number of communities generated with this allocation method is closer to the actual partition count with high division quality.Experimental results on nine usually used real-world networks,five synthetic networks,and two large-scale networks demonstrate the effectiveness of the proposed methodology in terms of community quality and algorithmic efficiency,compared to traditional,MOEA-based,and graph embedding-based community detection algorithms.
文摘Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.
基金funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2024-02-01176).
文摘In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the efforts of researchers and security experts to protect information systems from these attacks,the threat persists and the proposed solutions are not able to significantly stop the spread of ransomware attacks.The latest remarkable achievements of large language models(LLMs)in NLP tasks have caught the attention of cybersecurity researchers to integrate thesemodels into security threat detection.Thesemodels offer high embedding capabilities,able to extract rich semantic representations and paving theway formore accurate and adaptive solutions.In this context,we propose a new approach for ransomware detection based on an ensemblemethod that leverages three distinctLLMembeddingmodels.This ensemble strategy takes advantage of the variety of embedding methods and the strengths of each model.In the proposed solution,each embedding model is associated with an independently trainedMLP classifier.The predictions obtained are then merged using a weighted voting technique,assigning each model an influence proportional to its performance.This approach makes it possible to exploit the complementarity of representations,improve detection accuracy and robustness,and offer a more reliable solution in the face of the growing diversity and complexity of modern ransomware.
文摘Multivariate time series forecasting plays a crucial role in decision-making for systems like energy grids and transportation networks,where temporal patterns emerge across diverse scales from short-term fluctuations to long-term trends.However,existing Transformer-based methods often process data at a single resolution or handle multiple scales independently,overlooking critical cross-scale interactions that influence prediction accuracy.To address this gap,we introduce the Hierarchical Attention Transformer(HAT),which enables direct information exchange between temporal hierarchies through a novel cross-scale attention mechanism.HAT extracts multi-scale features using hierarchical convolutional-recurrent blocks,fuses them via temperature-controlled mechanisms,and optimizes gradient flow with residual connections for stable training.Evaluations on eight benchmark datasets show HAT outperforming state-of-the-art baselines,with average reductions of 8.2%in MSE and 7.5%in MAE across horizons,while achieving a 6.1×training speedup over patch-based methods.These advancements highlight HAT’s potential for applications requiring multi-resolution temporal modeling.
基金supported by the National Natural Science Foundation of China under Grant No.72293575.
文摘Temporal knowledge graph completion(TKGC),which merges temporal information into traditional static knowledge graph completion(SKGC),has garnered increasing attention recently.Among numerous emerging approaches,translation-based embedding models constitute a prominent approach in TKGC research.However,existing translation-based methods typically incorporate timestamps into entities or relations,rather than utilizing them independently.This practice fails to fully exploit the rich semantics inherent in temporal information,thereby weakening the expressive capability of models.To address this limitation,we propose embedding timestamps,like entities and relations,in one or more dedicated semantic spaces.After projecting all embeddings into a shared space,we use the relation-timestamp pair instead of the conventional relation embedding as the translation vector between head and tail entities.Our method elevates timestamps to the same representational significance as entities and relations.Based on this strategy,we introduce two novel translation-based embedding models:TE-TransR and TE-TransT.With the independent representation of timestamps,our method not only enhances capabilities in link prediction but also facilitates a relatively underexplored task,namely time prediction.To further bolster the precision and reliability of time prediction,we introduce a granular,time unit-based timestamp setting and a relation-specific evaluation protocol.Extensive experiments demonstrate that our models achieve strong performance on link prediction benchmarks,with TE-TransR outperforming existing baselines in the time prediction task.
基金Supported by the National Defense Basic Scientific Research Program of China.
文摘Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instability,occur frequently in both experimental and operational data.This infrequency causes events to be overlooked by existing prediction models,which lack the precision to accurately predict inclination attitudes in amphibious vehicles.To address this gap in predicting attitudes near extreme inclination points,this study introduces a novel loss function,termed generalized extreme value loss.Subsequently,a deep learning model for improved waterborne attitude prediction,termed iInformer,was developed using a Transformer-based approach.During the embedding phase,a text prototype is created based on the vehicle’s operation log data is constructed to help the model better understand the vehicle’s operating environment.Data segmentation techniques are used to highlight local data variation features.Furthermore,to mitigate issues related to poor convergence and slow training speeds caused by the extreme value loss function,a teacher forcing mechanism is integrated into the model,enhancing its convergence capabilities.Experimental results validate the effectiveness of the proposed method,demonstrating its ability to handle data imbalance challenges.Specifically,the model achieves over a 60%improvement in root mean square error under extreme value conditions,with significant improvements observed across additional metrics.
文摘To address the challenges of complexity,power consumption,and cost constraints in traditional display driver integrated circuits(DDICs)caused by external NOR Flash and SRAM,this work proposes an embedded resistive random-access memory(RRAM)integration solution based on a 40 nm high-voltage CMOS logic platform.Targeting the yield fluctuations and stability challenges during RRAM mass production,systematic process optimizations are implemented to achieve synergistic improvements in RRAM performance and yield.Through modifications to the film sputtering and pre-deposition treatment,the withinwafer resistance uniformity(RSU)of the oxygen-deficient layer(ODL)thin film is improved from 11%to 8%,while inter-wafer process stability variation reduces from 23%to below 6%.Consequently,the yield of 8 Mb RRAM embedded mass production products increases from 87%to 98.5%.In terms of device performance,the RRAM demonstrates a fast 4.8 ns read speed,exceptional read disturb immunity of 3×10^(8) cycles at 95℃,10^(3) write/erase endurance cycles for the 1 Mb cells,and data retention of 12.5 years at 125℃.Post high-temperature operating life(HTOL)testing exhibits stable high/low resistance window.This study provides process optimization strategies and a reliability assurance framework for the mass production of highly integrated,low-power embedded RRAM display driver IC.
基金Supported by Key Project of Jiangsu Education Science Planning"Research on the Structural Adjustment of Higher Education in Jiangsu in the Context of High-Quality Economic Development"(B/2021/01/67).
文摘In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is undergoing a profound paradigm shift.The traditional rural division of labor pattern,which depends on tangible factors such as land,labor,and capital,has increasingly encountered developmental challenges characterized by diminishing marginal returns and a detrimental cycle of internal competition.The new quality productive force,centered on data,algorithms,green technologies,bioengineering,and clean energy,offers a potential pathway for the rural division of labor system to overcome the"low-level equilibrium".This force is characterized by attributes such as non-exclusivity,replicability,network collaboration,and ecological compatibility.This paper develops a three-dimensional collaborative analytical framework encompassing"technology,institution,and culture".It systematically elucidates the internal logic by which new quality productive forces drive the transformation of the rural division of labor from"quantitative factor matching"to"qualitative structural reorganization"through three principal mechanisms:technology embedding,institutional reconstruction,and cultural coupling.Furthermore,the study proposes corresponding policy recommendations,thereby offering theoretical insights to support the modernization of China s agriculture and rural areas,as well as the development of a strong agricultural country.
基金supported by the National Natural Science Foundation of China(Grant No.62172292).
文摘Anomaly detection is a vibrant research direction in controller area networks,which provides the fundamental real-time data transmission underpinning in-vehicle data interaction for the internet of vehicles.However,existing unsupervised learning methods suffer from insufficient temporal and spatial constraints on shallow features,resulting in fragmented feature representations that compromise model stability and accuracy.To improve the extraction of valuable features,this paper investigates the influence of clustering constraints on shallow feature convergence paths at the model level and further proposes an end-to-end intrusion detection system based on efficient deep embedded subspace clustering(EDESC-IDS).Following the standard learning approach,continuous messages are encoded into two-dimensional data frames via a frame builder,which are then input into an extended convolutional autoencoder for extracting shallow features from high-dimensional data.On this basis,the dual constraints of these output features and the embedding clustering module facilitate end-to-end training of the EDESC-IDS in various attack scenarios.Extensive experimental results show that such a system exhibits significant detection performance on four types of attack datasets,including DoS,Gear,Fuzzy,and RPM,with precision,recall,and F1 scores consistently above 97.79%,while maintaining a false negative rate(FNR)and an error rate(ER)below 2.22%.
基金supported by the key technology project of China Southern Power Grid Corporation(GZKJXM20220041)partly by the National Key Research and Development Plan(2022YFE0205300).
文摘This paper presents an optimal operation method for embedded DC interconnections based on low-voltage AC/DC distribution areas(EDC-LVDA)under three-phase unbalanced compensation conditions.It can optimally determine the transmission power of the DC and AC paths to simultaneously improve voltage quality and reduce losses.First,considering the embedded interconnected,unbalanced power structure of the distribution area,a power flow calculation method for EDC-LVDA that accounts for three-phase unbalanced compensation is introduced.This method accurately describes the power flow distribution characteristics under both AC and DC power allocation scenarios.Second,an optimization scheduling model for EDC-LVDA under three-phase unbalanced conditions is developed,incorporating network losses,voltage quality,DC link losses,and unbalance levels.The proposed model employs an improved particle swarm optimization(IPSO)two-layer algorithm to autonomously select different power allocation coefficients for the DC link and AC section under various operating conditions.This enables embedded economic optimization scheduling while maintaining compensation for unbalanced conditions.Finally,a case study based on the IEEE 13-node system for EDC-LVDA is conducted and tested.The results show that the proposed optimal operation method achieves a 100%voltage compliance rate and reduces network losses by 13.8%,while ensuring three-phase power balance compensation.This provides a practical solution for the modernization and upgrading of low-voltage power grids.
基金supported by the Science and Technology Innovation Key R&D Program of Chongqing(CSTB2025TIAD-STX0032)National Key Research and Development Program of China(2024YFF0908200)+1 种基金the Chongqing Technology Innovation and Application Development Special Key Project(CSTB2024TIAD-KPX0018)the Southwest University Graduate Student Research Innovation(SWUB24051)。
文摘Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices.
基金financially supported by the National Natural Science Foundation of China(Grant 22205173)the Innovation Capability Support Program of Shaanxi(Grant 2024CX‐GXPT‐12)。
文摘The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild reaction conditions.Using Cu as a model,the resulting Cu-aPN(copper‐embedded all‐inorganic phosphazene network)retains the intrinsic N_(3)P_(3)backbone and exhibits an amorphous structure where Cu species are uniformly anchored at dense P/N coordination sites of the network.Time of flight secondary ion mass spectrometry(TOF‐SIMS)and X‐ray diffraction(XRD)reveal a gradual CuCl‐to‐CuO phase conversion during ammonia treatment,which effectively ensures the structural stability of the phosphazene framework.In 1 M KOH,Cu-aPN delivers an overpotential of 280 mV at 10 mA cm^(−2)and a Tafel slope of 48 mV dec^(−1),markedly outperforming Ga-aPN.In situ Raman and density functional theory(DFT)analyses indicate stronger Cu-P/N coordination coupling that lowers the*OH formation barrier(0.39 vs.0.88 eV for Ga).This MR-DC route furnishes a general and versatile pathway for constructing metal‐embedded all‐inorganic phosphazene frameworks with tunable coordination environments for advanced electrocatalytic applications.
基金support from the National Science Foundation of China(NSFC)(Grants No.12293031 and No.61905252)the National Science Foundation for Distinguished Young Scholars(Grant No.12022308)the National Key R&D Program of China(Grants No.2021YFC2202200 and No.2021YFC2202204).
文摘Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excessive optical surfaces,reduced light throughput,and instrumental polarization.To address these limitations,we propose an embedded solar adaptive optics telescope(ESAOT)that intrinsically incorporates the solar AO(SAO)subsystem within the telescope's optical train,featuring a co-designed correction chain with a single Hartmann-Shack full-wavefront sensor(HS f-WFS)and a deformable secondary mirror(DSM).The HS f-WFS uses temporal-spatial hybrid sampling technique to simultane-ously resolve tip-tilt and high-order aberrations,while the DSM performs real-time compensation through adaptive modal optimization.This unified architecture achieves symmetrical polarization suppression and high system throughput by min-imizing optical surfaces.A 600 mm ESAOT prototype incorporating a 12×12 micro-lens array HS f-WFS and 61-actuator piezoelectric DSM has been developed and successfully conducted on-sky photospheric observations.Validations in-cluding turbulence simulations,optical bench testing,and practical observations at the Lijiang observatory collectively confirm the system's capability to maintain aboutλ/10 wavefront error during active region tracking.This architectural breakthrough of the ESAOT addresses long-standing SAO integration challenges in solar astronomy and provides scala-bility analyses confirming direct applicability to the existing and future large solar observation facilities.