Dapeng Man
YOU?
Author Swipe
View article: Collapsing Sequence-Level Data-Policy Coverage via Poisoning Attack in Offline Reinforcement Learning
Collapsing Sequence-Level Data-Policy Coverage via Poisoning Attack in Offline Reinforcement Learning Open
Offline reinforcement learning (RL) heavily relies on the coverage of pre-collected data over the target policy's distribution. Existing studies aim to improve data-policy coverage to mitigate distributional shifts, but overlook security r…
View article: Act in Collusion: A Persistent Distributed Multi-Target Backdoor in Federated Learning
Act in Collusion: A Persistent Distributed Multi-Target Backdoor in Federated Learning Open
Federated learning, a novel paradigm designed to protect data privacy, is vulnerable to backdoor attacks due to its distributed nature. Current research often designs attacks based on a single attacker with a single backdoor, overlooking m…
View article: Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning
Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning Open
Backdoors on federated learning will be diluted by subsequent benign updates. This is reflected in the significant reduction of attack success rate as iterations increase, ultimately failing. We use a new metric to quantify the degree of t…
View article: Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning
Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning Open
Backdoors on federated learning will be diluted by subsequent benign updates. This is reflected in the significant reduction of attack success rate as iterations increase, ultimately failing. We use a new metric to quantify the degree of t…
View article: Bridging the Gaps of Both Modality and Language: Synchronous Bilingual CTC for Speech Translation and Speech Recognition
Bridging the Gaps of Both Modality and Language: Synchronous Bilingual CTC for Speech Translation and Speech Recognition Open
In this study, we present synchronous bilingual Connectionist Temporal Classification (CTC), an innovative framework that leverages dual CTC to bridge the gaps of both modality and language in the speech translation (ST) task. Utilizing tr…
View article: An Information‐Centric Network Caching Method Based on Popularity Rating and Topology Weighting
An Information‐Centric Network Caching Method Based on Popularity Rating and Topology Weighting Open
Ubiquitous caching is a feature shared by all proposed information‐centric network (ICN) architectures. Prioritising storage resources to popular content in the network is a proven way to guarantee hit rates, reduce the number of hops forw…
View article: Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things Open
As an innovative strategy, edge computing has been considered a viable option to address the limitations of cloud computing in supporting the Internet-of-Things applications. However, due to the instability of the network and the increase …
View article: DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems Open
The rapid development in network technology has resulted in the proliferation of Internet of Things (IoT). This trend has led to a widespread utilization of decentralized data and distributed computing power. While machine learning can ben…
View article: Cache Pollution Detection Method Based on GBDT in Information-Centric Network
Cache Pollution Detection Method Based on GBDT in Information-Centric Network Open
There is a new cache pollution attack in the information-centric network (ICN), which fills the router cache by sending a large number of requests for nonpopular content. This attack will severely reduce the router cache hit rate. Therefor…
View article: Information‐Centric Networking Cache Placement Method Based on Cache Node Status and Location
Information‐Centric Networking Cache Placement Method Based on Cache Node Status and Location Open
Information‐Centric Networking with caching is a very promising future network architecture. The research on its cache deployment strategy is divided into three categories, namely, noncooperative cache, explicit collaboration cache, and im…
View article: A Cross‐Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
A Cross‐Domain Authentication Optimization Scheme between Heterogeneous IoT Applications Open
With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending …
View article: Unknown Protocol Identification Based on Improved K-Means++ Algorithm
Unknown Protocol Identification Based on Improved K-Means++ Algorithm Open
In recent years, the gradual popularization of mobile terminals and the vigorous development of the network have spawned the birth of a new Internet structure and promoted the growth of network traffic. Behind such a large network, effecti…
View article: An incentive mechanism for data sharing based on blockchain with smart contracts
An incentive mechanism for data sharing based on blockchain with smart contracts Open
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust relationships an…
View article: Identification of unknown operating system type of Internet of Things terminal device based on RIPPER
Identification of unknown operating system type of Internet of Things terminal device based on RIPPER Open
Due to the vast popularity of sensors, cloud computing, mobile computing, and intelligent devices, the Internet of Things has seen tremendous growth in recent years. Operating system type recognition is the core technology of network secur…
View article: Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing Open
While mobile networks provide many opportunities for people, they face security problems huge enough that a firewall is essential. The firewall in mobile networks offers a secure intranet through which all traffic is handled and processed.…
View article: Device-Free Passive Identity Identification via WiFi Signals
Device-Free Passive Identity Identification via WiFi Signals Open
Device-free passive identity identification attracts much attention in recent years, and it is a representative application in sensorless sensing. It can be used in many applications such as intrusion detection and smart building. Previous…
View article: Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters Open
Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH) methods cannot solve this problem. To th…