Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications i...Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks.展开更多
Interactive architecture designs enable spatial forms to respond to human activities by integrating technology,programming,and spatial experience.Most interactive programs respond to established actions in a uniform m...Interactive architecture designs enable spatial forms to respond to human activities by integrating technology,programming,and spatial experience.Most interactive programs respond to established actions in a uniform manner and do not take into account the individual emotional state of the user.However,the emotional states of children and adolescents with emotional/behavioral disorders play a crucial role in their interactions,and uniform spatial responses cannot be adapted to different people.This study developed an interactive architectural system for children with emotional/behavioral disorders based on individual emotion recognition and corresponding spatial transformation.The method proposed in this study enables individuals in certain emotional categories,such as extroverted,introverted,aggressive,and defensive states,to receive matching spatial responses.Using this individuality-oriented interactive system,we built a practical pavilion in a primary school in Tianjin.This study demonstrates how combining individual emotions and spatial variations opens up new design possibilities for interactive architecture.展开更多
基金This research was partly supported by the National Science and Technology Council,Taiwan with Grant Numbers 112-2221-E-992-045,112-2221-E-992-057-MY3 and 112-2622-8-992-009-TD1.
文摘Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks.
基金supported by the Program of National Natural Science Foundation of China(Grant No.52378029)Tianjin Science Foundation(Grant No.19JCQNJC07300).
文摘Interactive architecture designs enable spatial forms to respond to human activities by integrating technology,programming,and spatial experience.Most interactive programs respond to established actions in a uniform manner and do not take into account the individual emotional state of the user.However,the emotional states of children and adolescents with emotional/behavioral disorders play a crucial role in their interactions,and uniform spatial responses cannot be adapted to different people.This study developed an interactive architectural system for children with emotional/behavioral disorders based on individual emotion recognition and corresponding spatial transformation.The method proposed in this study enables individuals in certain emotional categories,such as extroverted,introverted,aggressive,and defensive states,to receive matching spatial responses.Using this individuality-oriented interactive system,we built a practical pavilion in a primary school in Tianjin.This study demonstrates how combining individual emotions and spatial variations opens up new design possibilities for interactive architecture.