Deepag: Attack graph construction and threats prediction with bi-directional deep learning

T Li, Y Jiang, C Lin, MS Obaidat… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… Besides, we propose the bi-directional model to learn the relationships of locations among
log index sequences. Based on forward and backward LSTMs, it can generate multiple …

Searching for a search method: Benchmarking search algorithms for generating NLP adversarial examples

JY Yoo, JX Morris, E Lifland, Y Qi - arXiv preprint arXiv:2009.06368, 2020 - arxiv.org
… We can see that beam search algorithms consistently perturb the lowest percentage of
words. Furthermore, we see that a fewer number of words perturbed generally corresponds with …

A practical and efficient bidirectional access control scheme for cloud-edge data sharing

J Cui, B Li, H Zhong, G Min, Y Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… in this paper a novel bidirectional access control scheme by exploiting attribute-based
encryption and proxy re-encryption. The concept of bidirectional was introduced in proxy re…

Machine translation decoding beyond beam search

R Leblond, JB Alayrac, L Sifre, M Pislar… - arXiv preprint arXiv …, 2021 - arxiv.org
… Notably, we introduce a Monte-Carlo Tree Search (MCTS) based method and showcase its
… We find that which algorithm is best heavily depends on the characteristics of the goal metric…

A lightweight and attack-proof bidirectional blockchain paradigm for internet of things

C Xu, Y Qu, TH Luan, PW Eklund… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… To defeat these attacks, a novel bidirectional-linked blockchain (BLB) using chameleon
hash functions is proposed, where bidirectional pointers are constructed between blocks. …

Effects of bidirectional resource allocation schemes for advanced long-term evolution system in heterogeneous networks

R Gatti, S Shankar, K Murthy - International Journal of …, 2021 - inderscienceonline.com
… This paper studies the bidirectional radio resource scheduling schemes which exploit
cross-tier interference. The proposed modified joint uplink/downlink user carrier scheduling (…

Enhancements of attention-based bidirectional lstm for hybrid automatic text summarization

J Jiang, H Zhang, C Dai, Q Zhao, H Feng, Z Ji… - IEEE …, 2021 - ieeexplore.ieee.org
… In addition, its computational cost and performance cannot easily meet the needs of massive
texts in the ‘big data’ era. Therefore, by taking the attention-based bidirectional Long Short-…

An algorithm based on bidirectional searching and geometric constrained sampling for automatic manipulation planning in aircraft cable assembly

J Guo, J Zhang, D Wu, Y Gai, K Chen - Journal of Manufacturing Systems, 2020 - Elsevier
… In order to demonstrate the functionality of the geometrical sampling constrain and bi-directional
searching method, we choose RRT-Connect without constrained sampling tactics (RRT-…

Informed RRT*-connect: An asymptotically optimal single-query path planning method

R Mashayekhi, MYI Idris, MH Anisi, I Ahmedy… - IEEE Access, 2020 - ieeexplore.ieee.org
… 8, show that the bidirectional searches, RRT*-Connect and Informed RRT*-Connect, are …
unidirectional searches, RRT* and Informed RRT*. It is the significance of bidirectional planners …

[HTML][HTML] A branch-price-and-cut algorithm for the Multi-Commodity two-echelon Distribution Problem

M Petris, C Archetti, D Cattaruzza, M Ogier… - EURO Journal on …, 2024 - Elsevier
… ) per distribution centre. We tackle the ESPPRC with a label setting dynamic programming
algorithm which incorporates ng-path relaxation and a bidirectional labelling search. Pricing …