ID | 原文 | 译文 |
4043 | 仿真实验表明:相比一些同类型算法,所提算法具有较快的收敛速度。 | Simulation results shows that compared with some same type algorithms, the proposed algorithm has faster convergence speed. |
4044 | 针对视频被动取证领域中视频内容的真实性和完整性鉴定及篡改区域定位问题,提出了一种基于视频噪声流的深度学习检测算法。 | To address the problem of identification of authenticity and integrity of video content and the location of videotampering area, a deep learning detection algorithm based on video noise flow was proposed. |
4045 | 首先,构建了基于空间富模型(SRM)和三维卷积(C3D)神经网络的特征提取器、帧鉴别器和基于区域建议网络(RPN)思想的空域定位器; | Firstly, based on SRM (spa-tial rich model) and C3D (3D convolution) neural network, a feature extractor, a frame discriminator and a RPN (regionproposal network) based spatial locator were constructed. |
4046 | 其次,将特征提取器分别与帧鉴别器和空域定位器相结合,搭建出 2 个神经网络; | Secondly, the feature extractor was combined with the framediscriminator and the spatial locator respectively, and then two neural networks were built. |
4047 | 最后,利用增强处理后的数据训练出 2 种深度学习模型,分别用于对视频篡改区域时域和空域的定位。 | Finally, two kinds of deeplearning models were trained by the enhanced data, which were used to locate the tampered area in temporal domain andspatial domain respectively. |
4048 | 测试结果表明,时域定位的准确率提高到 98.5%,空域定位与篡改区域标注平均交并比达 49%,可以有效对该类篡改视频进行篡改区域时空域定位。 | The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%, which can effectively lo-cate the tamper area in temporal domain and spatial domain. |
4049 | 入侵检测系统经常不可避免地出现误警、漏警错误而导致系统的重大安全隐患,然而当前未能找到一种行之有效的解决方案。 | Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs. How-ever, at present, an effective solution has not been found. |
4050 | 针对该问题,提出一种基于信息论的入侵检测最佳响应模型。 | In order to solve this problem, an optimal response model of in-trusion detection based on information theory was proposed. |
4051 | 首先,将入侵检测过程中的入侵者和入侵检测系统抽象成随机变量,并根据对抗结果构建了入侵者和入侵检测系统的攻防模型。 | Firstly, the intruder and IDS in the process of intrusion de-tection were abstracted into random variables, and the attack and defense model of intruder and IDS was constructed ac-cording to the results of the confrontation. |
4052 | 其次,根据攻防模型设计入侵检测系统的防守信道,将入侵检测系统的正确检测转换成防守信道成功传输 1 bit 信息问题。 | Secondly, the defense channel of IDS was designed according to the attack anddefense model, then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit in-formation in defensive channel. |