ID 原文 译文
44926 能并发处理大数据集,并能根据数据集的大小来调整集成分类器的规模。 In the framework, big data sets were concurrently processed, and the size of ensemble classifier was adjusted according to the size of data sets.
44927 实验结果显示,当 MLDE 的基层使用随机森林、第 2 层使用 bagging 集成分类器、第 3 层使用 AdaBoost 集成分类器时,AUC 的值能达到 0.999。 The experimental results show that the AUC value can reach 0. 999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.
44928 :网络拟态防御通过冗余执行体动态性、多样性以及裁决反馈机制增强了主动防御顽健性, Network mimic defense technology enhances the robustness of active defense through the redundancy,dynamic and diversity as well as the decision feedback mechanism.
44929 而对于其安全性评估尚缺少有效的分析模型,基于经典博弈模型无法满足于其多状态、动态性特点,不具有通用性等问题, However, little work has been done for its security assessment and existing classic game models are not suitable for its dynamic characteristics and lack of universality.
44930 提出拟态防御 Markov 博弈模型分析攻防状态间的转移关系以及安全可靠性度量方法,通过非线性规划算法计算攻防博弈均衡,以确定考虑防御代价的最佳防御策略。 A Markov game model was proposed to analyze the transfer relationship between offensive and defensive status and the measurement method of safety and reliability of mimic defense, and calculated the offensive and defensive game equilibrium through non-linear programming algorithm to determine the best defensive strategy considering performance.
44931 实验与多目标隐藏技术对比,结果表明拟态防御具有更高的防御效果, Experiments give a comparison with the multi-target hiding technique and shows that the mimic defense has a higher defensive effect.
44932 结合具体案例给出了针对利用系统漏洞攻击的具体攻防路径,验证了防御策略算法有效性。 Combining with the specific network case, the specific attack and defense path for the exploit of the system vulnerability is given and the effectiveness of the defense strategy algorithm is verified.
44933 对无线传感器网络隐私保护数据聚集技术的研究现状与进展进行了综述。 A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.
44934 首先介绍研究相关的基础知识,包括网络模型、攻击模型和性能评估指标; Firstly, preliminaries were introduced, including network models, adversary models, and performance evaluation metrics.
44935 然后按照同态加密、数据扰动、切分重组、泛化、安全多方计算等隐私保护技术对现有研究成果进行分类,详细阐述了具有代表性的协议的核心技术,对比分析了的各协议的性能; Secondly, existing related work was classified into several types according to privacy preservation techniques, such as homomorphic encryption, data perturbation, slicing-mixing technique, generalization, secure multiparty computation, and the key mechanisms of typical protocols were elaborated and analyzed.