Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
Measurement Model of Big Data Leakage Risk Tolerance Based on Extended Bayesian Classification Algorithm
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 298–302https://doi.org/10.1145/3640912.3640972When measuring big data leakage risk tolerance, the lack of comprehensive analysis of big data leakage risk factors leads to large measurement error. Therefore, a measurement model of big data leakage risk tolerance based on extended Bayesian ...
- research-articleFebruary 2024
Overview of SQL Injection Attack Detection Techniques
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 215–225https://doi.org/10.1145/3640912.3640956In today's rapid development of digital economy and digital transformation, SQLIA (SQL injection attack) against data infrastructure as a means of illegal access manipulation is a serious threat to data security, SQLIA methods are becoming more and more ...
- research-articleFebruary 2024
Vulnerability analysis of mission-based spatial information networks
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 201–206https://doi.org/10.1145/3640912.3640952Spatial information network, as a typical functional network, plays a key role in the task system. On the basis of analyzing the topological structure of spatial information network, this paper uses the operational ring theory to describe the functions ...
- research-articleFebruary 2024
Application of artificial intelligence in the construction of computer big data security technology platform
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 191–195https://doi.org/10.1145/3640912.3640950To understand the application of big data security technology platform construction, a research on the application of artificial intelligence in the construction of computer big data security technology platform has been proposed. This article first ...
- research-articleFebruary 2024
Digital spread-spectrum watermarking identity authentication technology based on OFDM in satellite-ground communication system
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 140–144https://doi.org/10.1145/3640912.3640940The digital spread frequency watermark identity authentication based on orthogonal frequency division multiplexing (OFDM) technology under satellite-ground communication is studied. The OFDM-based watermark generation and superposition process at the ...
-
- research-articleFebruary 2024
A transform domain communication method based on combinatorial basis function
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 101–105https://doi.org/10.1145/3640912.3640932With the development of communication countermeasure technology, the covertness, anti-interception and anti-jamming of information transmission are more and more important. In this paper, on the basis of researching and analyzing the existing covert anti-...
- research-articleFebruary 2024
A Secure Power Data Sharing Scheme Based on Sensitive Data Automatic Recognition
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 83–87https://doi.org/10.1145/3640912.3640928With the continuous development of new power systems and the accumulation of massive power data, it is of great practical significance to strengthen power data sharing and promote the full flow of power data. This article proposes a power data sharing ...
- research-articleFebruary 2024
An Online/Offline Power Data Sharing System Based on Blockchain
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 392–397https://doi.org/10.1145/3640912.3640989The emergence of cloud-based power data sharing systems helps power enterprises eliminate isolated data islands and maximize the benefits of power data. However, power data may still face security risks e.g., unauthorized access and user privacy leakage ...
- research-articleFebruary 2024
Reversible Data Hiding Algorithm based on Paillier Encryption
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 346–350https://doi.org/10.1145/3640912.3640981The encryption domain Reversible data hiding algorithm differs from the plaintext domain in that after encrypting the image information, the redundant space decreases, leading to difficulties in embedding and low embedding capacity in the encryption ...
- research-articleFebruary 2024
Traffic anomaly detection method based on bidirectional autoencoder generative adversarial network
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 337–340https://doi.org/10.1145/3640912.3640979This paper proposes a traffic anomaly detection method of bidirectional autoencoder generative adversarial network. This method first designs a twice encode autoencoder, and then fuses the twice encode autoencoder with the bidirectional generative ...
- research-articleFebruary 2024
Research and application of smart contract technology based on blockchain
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 312–319https://doi.org/10.1145/3640912.3640975Smart contracts are computer trading protocols that require no intermediaries, self-validating, and automatically executing contract terms. In recent years, with the increasing popularity of blockchain technology, they have received considerable ...
- research-articleFebruary 2024
Research on SVM intrusion detection algorithm based on improved
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 294–297https://doi.org/10.1145/3640912.3640971Aiming at the problem that the common kernel functions of SVM algorithms are low in prediction recall, a hybrid SVM classification method based on ensemble learning is proposed. The NSL-KDD dataset was preprocessed, and PCA was used for feature selection,...
- research-articleFebruary 2024
Image Encryption Algorithm Based on Henon Chaos Theory
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 269–273https://doi.org/10.1145/3640912.3640965The widespread application of image technology has made its security issues particularly important. The core of information security research is cryptographic technology, which is mainly based on nonlinear science and information science research. Among ...
- research-articleFebruary 2024
Enhancing IoT Security-Exploring the Application of Blockchain
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 259–263https://doi.org/10.1145/3640912.3640963These years the application of Internet of Things technology has significantly expanded, playing a crucial role in various domains. The widespread adoption of 5G networks has greatly improved communication efficiency, thereby fostering the rapid ...
- research-articleFebruary 2024
Multi-source System Log Behavior Pattern Mining Method Based on FP-Growth
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 248–254https://doi.org/10.1145/3640912.3640961By analyzing and mining system logs, it is possible to effectively discover behavioral characteristics and anomalies of network users or systems. Through association analysis, patterns and correlations between different log sources can be identified, ...
- research-articleFebruary 2024
A hybrid model for classifying malware based on ResNet and Transformer
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 231–237https://doi.org/10.1145/3640912.3640958Malware is becoming a significant hidden threat to network security, with traits like rapid population growth, numerous family varieties, and effective hiding. Traditional analysis methods have had trouble efficiently achieving family detection and ...
- research-articleFebruary 2024
FusedCNN-LSTM-AttNet: A Neural Network Model for Cyber Security Situation Prediction
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 207–210https://doi.org/10.1145/3640912.3640953This paper presents a novel network security situational prediction model, FusedCNN-LSTM-AttNet, which integrates Convolutional Neural Networks (CNN), Long Short-Term Memory networks (LSTM), and Attention mechanisms. The model leverages continuous time ...
- research-articleFebruary 2024
Traffic Classification of Network Security Agents Based on Feature Fusion Convolutional Neural Network
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 196–200https://doi.org/10.1145/3640912.3640951With the rapid development of the Internet, the number of network attacks has increased, and network security has gradually become a focus of attention. Network security agent traffic classification refers to the analysis and detection of network ...
- research-articleFebruary 2024
Research on Docker Container Network Isolation and Security Management for Multi-Tenant Environments
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 179–185https://doi.org/10.1145/3640912.3640948This paper establishes a portal middleware platform for multi-tenant environments that can support higher tenant density and reduce the cost of software management and maintenance. It analyzes the advantages of Docker containers compared with traditional ...
- research-articleFebruary 2024
Blockchain-Based Data Secure and Traceable Scheme for Industrial Internet of Things
CNML '23: Proceedings of the 2023 International Conference on Communication Network and Machine LearningPages 174–178https://doi.org/10.1145/3640912.3640947Data security has become an important guarantee for the operation of Industrial Internet of Things (IIoT). Once the data is leaked or trampered with, it may cause economic losses and property security. In this paper, we propose a blockchain-based data ...