Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (120)

Search Parameters:
Keywords = traffic entropy model

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1450 KB  
Article
A New Wide-Area Backup Protection Algorithm Based on Confidence Weighting and Conflict Adaptation
by Zhen Liu, Wei Han, Baojiang Tian, Gaofeng Hao, Fengqing Cui, Xiaoyu Li, Shenglai Wang and Yikai Wang
Electronics 2025, 14(20), 4032; https://doi.org/10.3390/electronics14204032 - 14 Oct 2025
Viewed by 156
Abstract
To alleviate the communication burden of wide-area protection and enhance the fault tolerance of multi-source criteria, this paper introduces an improved wide-area backup protection method based on multi-source information fusion. Initially, the variation characteristics of bus sequence voltages after a fault are utilized [...] Read more.
To alleviate the communication burden of wide-area protection and enhance the fault tolerance of multi-source criteria, this paper introduces an improved wide-area backup protection method based on multi-source information fusion. Initially, the variation characteristics of bus sequence voltages after a fault are utilized to screen suspected fault lines, thereby reducing communication traffic. Subsequently, four basic probability assignment functions are constructed using the polarity of zero-sequence current charge, the polarity of phase-difference current charge, and the starting signals of Zone II/III distance protection from the local and adjacent lines. The confidence of each probability function is evaluated using normalized information entropy, while consistency is analyzed via Gaussian similarity, enabling dynamic allocation of fusion weights. Additionally, a conflict adaptation factor is designed to adjust the fusion strategy dynamically, improving fault tolerance in high-conflict scenarios and mitigating the impact of abnormal single criteria on decision results. Finally, the fused fault probability is used to identify the fault line. Simulation results based on the IEEE 39-bus model demonstrate that the proposed algorithm can accurately identify fault lines under different fault types and locations and remains robust under conditions such as information loss and protection maloperation or failure. Full article
(This article belongs to the Special Issue Advanced Online Monitoring and Fault Diagnosis of Power Equipment)
Show Figures

Figure 1

26 pages, 4780 KB  
Article
Uncertainty Quantification Based on Block Masking of Test Images
by Pai-Xuan Wang, Chien-Hung Liu and Shingchern D. You
Information 2025, 16(10), 885; https://doi.org/10.3390/info16100885 - 11 Oct 2025
Viewed by 107
Abstract
In image classification tasks, models may occasionally produce incorrect predictions, which can lead to severe consequences in safety-critical applications. For instance, if a model mistakenly classifies a red traffic light as green, it could result in a traffic accident. Therefore, it is essential [...] Read more.
In image classification tasks, models may occasionally produce incorrect predictions, which can lead to severe consequences in safety-critical applications. For instance, if a model mistakenly classifies a red traffic light as green, it could result in a traffic accident. Therefore, it is essential to assess the confidence level associated with each prediction. Predictions accompanied by high confidence scores are generally more reliable and can serve as a basis for informed decision-making. To address this, the present paper extends the block-scaling approach—originally developed for estimating classifier accuracy on unlabeled datasets—to compute confidence scores for individual samples in image classification. The proposed method, termed block masking confidence (BMC), applies a sliding mask filled with random noise to occlude localized regions of the input image. Each masked variant is classified, and predictions are aggregated across all variants. The final class is selected via majority voting, and a confidence score is derived based on prediction consistency. To evaluate the effectiveness of BMC, we conducted experiments comparing it against Monte Carlo (MC) dropout and a vanilla baseline across image datasets of varying sizes and distortion levels. While BMC does not consistently outperform the baselines under standard (in-distribution) conditions, it shows clear advantages on distorted and out-of-distribution (OOD) samples. Specifically, on the level-3 distorted iNaturalist 2018 dataset, BMC achieves a median expected calibration error (ECE) of 0.135, compared to 0.345 for MC dropout and 0.264 for the vanilla approach. On the level-3 distorted Places365 dataset, BMC yields an ECE of 0.173, outperforming MC dropout (0.290) and vanilla (0.201). For OOD samples in Places365, BMC achieves a peak entropy of 1.43, higher than the 1.06 observed for both MC dropout and vanilla. Furthermore, combining BMC with MC dropout leads to additional improvements. On distorted Places365, the median ECE is reduced to 0.151, and the peak entropy for OOD samples increases to 1.73. Overall, the proposed BMC method offers a promising framework for uncertainty quantification in image classification, particularly under challenging or distribution-shifted conditions. Full article
(This article belongs to the Special Issue Machine Learning and Data Mining for User Classification)
Show Figures

Figure 1

28 pages, 4006 KB  
Article
Resilience Assessment of Cascading Failures in Dual-Layer International Railway Freight Networks Based on Coupled Map Lattice
by Si Chen, Zhiwei Lin, Qian Zhang and Yinying Tang
Appl. Sci. 2025, 15(20), 10899; https://doi.org/10.3390/app152010899 - 10 Oct 2025
Viewed by 330
Abstract
The China Railway Express (China-Europe container railway freight transport) is pivotal to Eurasian freight, yet its transcontinental railway faces escalating cascading risks. We develop a coupled map lattice (CML) model representing the physical infrastructure layer and the operational traffic layer concurrently to quantify [...] Read more.
The China Railway Express (China-Europe container railway freight transport) is pivotal to Eurasian freight, yet its transcontinental railway faces escalating cascading risks. We develop a coupled map lattice (CML) model representing the physical infrastructure layer and the operational traffic layer concurrently to quantify and mitigate cascading failures. Twenty critical stations are identified by integrating TOPSIS entropy weighting with grey relational analysis in dual-layer networks. The enhanced CML embeds node-degree, edge-betweenness, and freight-flow coupling coefficients, and introduces two adaptive cargo-redistribution rules—distance-based and load-based for real-time rerouting. Extensive simulations reveal that network resilience peaks when the coupling coefficient equals 0.4. Under targeted attacks, cascading failures propagate within three to four iterations and reduce network efficiency by more than 50%, indicating the vital function of higher importance nodes. Distance-based redistribution outperforms load-based redistribution after node failures, whereas the opposite occurs after edge failures. These findings attract our attention that redundant border corridors and intelligent monitoring should be deployed, while redistribution rules and multi-tier emergency response systems should be employed according to different scenarios. The proposed methodology provides a dual-layer analytical framework for addressing cascading risks of transcontinental networks, offering actionable guidance for intelligent transportation management of international intermodal freight networks. Full article
Show Figures

Figure 1

15 pages, 583 KB  
Article
Contrastive Geometric Cross-Entropy: A Unified Explicit-Margin Loss for Classification in Network Automation
by Yifan Wu, Lei Xiao and Xia Du
Network 2025, 5(4), 45; https://doi.org/10.3390/network5040045 - 9 Oct 2025
Viewed by 227
Abstract
As network automation and self-organizing networks (SONs) rapidly evolve, edge devices increasingly demand lightweight, real-time, and high-precision classification algorithms to support critical tasks such as traffic identification, intrusion detection, and fault diagnosis. In recent years, cross-entropy (CE) loss has been widely adopted in [...] Read more.
As network automation and self-organizing networks (SONs) rapidly evolve, edge devices increasingly demand lightweight, real-time, and high-precision classification algorithms to support critical tasks such as traffic identification, intrusion detection, and fault diagnosis. In recent years, cross-entropy (CE) loss has been widely adopted in deep learning classification tasks due to its computational efficiency and ease of optimization. However, traditional CE methods primarily focus on class separability without explicitly constraining intra-class compactness and inter-class boundaries in the feature space, thereby limiting their generalization performance on complex classification tasks. To address this issue, we propose a novel classification loss framework—Contrastive Geometric Cross-Entropy (CGCE). Without incurring additional computational or memory overhead, CGCE explicitly introduces learnable class representation vectors and constructs the loss function based on the dot-product similarity between features and these class representations, thus explicitly reinforcing geometric constraints in the feature space. This mechanism effectively enhances intra-class compactness and inter-class separability. Theoretical analysis further demonstrates that minimizing the CGCE loss naturally induces clear and measurable geometric class boundaries in the feature space, a desirable property absent from traditional CE methods. Furthermore, CGCE can seamlessly incorporate the prior knowledge of pretrained models, converging rapidly within only a few training epochs (for example, on the CIFAR-10 dataset using the ViT model, a single training epoch is sufficient to reach 99% of the final training accuracy.) Experimental results on both text and image classification tasks show that CGCE achieves accuracy improvements of up to 2% over traditional CE methods, exhibiting stronger generalization capabilities under challenging scenarios such as class imbalance, few-shot learning, and noisy labels. These findings indicate that CGCE has significant potential as a superior alternative to traditional CE methods. Full article
Show Figures

Figure 1

17 pages, 1747 KB  
Article
Weighted Transformer Classifier for User-Agent Progression Modeling, Bot Contamination Detection, and Traffic Trust Scoring
by Geza Lucz and Bertalan Forstner
Mathematics 2025, 13(19), 3153; https://doi.org/10.3390/math13193153 - 2 Oct 2025
Viewed by 233
Abstract
In this paper, we present a unique method to determine the level of bot contamination of web-based user agents. It is common practice for bots and robotic agents to masquerade as human-like to avoid content and performance limitations. This paper continues our previous [...] Read more.
In this paper, we present a unique method to determine the level of bot contamination of web-based user agents. It is common practice for bots and robotic agents to masquerade as human-like to avoid content and performance limitations. This paper continues our previous work, using over 600 million web log entries collected from over 4000 domains to derive and generalize how the prominence of specific web browser versions progresses over time, assuming genuine human agency. Here, we introduce a parametric model capable of reproducing this progression in a tunable way. This simulation allows us to tag human-generated traffic in our data accurately. Along with the highest confidence self-tagged bot traffic, we train a Transformer-based classifier that can determine the bot contamination—a botness metric of user-agents without prior labels. Unlike traditional syntactic or rule-based filters, our model learns temporal patterns of raw and heuristic-derived features, capturing nuanced shifts in request volume, response ratios, content targeting, and entropy-based indicators over time. This rolling window-based pre-classification of traffic allows content providers to bin streams according to their bot infusion levels and direct them to several specifically tuned filtering pipelines, given the current load levels and available free resources. We also show that aggregated traffic data from multiple sources can enhance our model’s accuracy and can be further tailored to regional characteristics using localized metadata from standard web server logs. Our ability to adjust the heuristics to geographical or use case specifics makes our method robust and flexible. Our evaluation highlights that 65% of unclassified traffic is bot-based, underscoring the urgency of robust detection systems. We also propose practical methods for independent or third-party verification and further classification by abusiveness. Full article
Show Figures

Figure 1

30 pages, 3650 KB  
Article
Navigational Risk Evaluation of One-Way Channels: Modeling and Application to the Suez Canal
by Jiaxuan Yang, Wenzhen Xie, Hongbin Xie, Yao Sun and Xinjian Wang
J. Mar. Sci. Eng. 2025, 13(10), 1864; https://doi.org/10.3390/jmse13101864 - 26 Sep 2025
Viewed by 301
Abstract
Navigating ships through one-way channels introduces significant uncertainties due to their unique navigational constraints, yet a comprehensive and tailored risk evaluation system for such channels remains notably underdeveloped. Recognizing its critical role as a global maritime artery, this study selects the Suez Canal [...] Read more.
Navigating ships through one-way channels introduces significant uncertainties due to their unique navigational constraints, yet a comprehensive and tailored risk evaluation system for such channels remains notably underdeveloped. Recognizing its critical role as a global maritime artery, this study selects the Suez Canal as the case study to address this gap. The study begins by analyzing the navigational characteristics of one-way channels, systematically identifying key risk factors such as channel width, traffic density, and environmental conditions. Building on this, a novel risk evaluation model is developed, integrating the entropy weight method to assign objective weights, fuzzy logic to handle uncertainty, and Evidential Reasoning (ER) to aggregate multi-criteria assessments. The Suez Canal is then utilized as a case study to demonstrate the model’s effectiveness and practical applicability. The results reveal that Channel C exhibits the highest risk utility value, consistent with its history of the most grounding incidents, including the notable “Ever Given” event during 2021–2023. These findings not only provide valuable insights for enhancing Suez Canal management strategies but also contribute to filling the existing void in risk evaluation frameworks for one-way channels, paving the way for future research into dynamic risk assessment methodologies. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

24 pages, 8351 KB  
Article
The Information Consistency Between Full- and Improved Dual-Polarimetric Mode SAR for Multiscenario Oil Spill Detection
by Guannan Li, Gaohuan Lv, Tong Wang, Xiang Wang and Fen Zhao
Sensors 2025, 25(17), 5551; https://doi.org/10.3390/s25175551 - 5 Sep 2025
Viewed by 1045
Abstract
Detecting marine oil spills is vital for protecting the marine environment, ensuring maritime traffic safety, supporting marine development, and enabling effective emergency response. The dual-polarimetric (DP) synthetic aperture radar (SAR) system represents an evolution from single to full polarization (FP), which has become [...] Read more.
Detecting marine oil spills is vital for protecting the marine environment, ensuring maritime traffic safety, supporting marine development, and enabling effective emergency response. The dual-polarimetric (DP) synthetic aperture radar (SAR) system represents an evolution from single to full polarization (FP), which has become an essential tool for oil spill detection with the growing availability of open-source and shared datasets. Recent research has focused on enhancing DP information structures to better exploit this data. This study introduces improved DP models’ structure with modified the scattering vector coefficients to ensure consistency with the corresponding components of the FP system, enabling comprehensive comparison and analysis with traditional DP structure, includes theoretical and quantitative evaluations of simulated data from FP system, as well as validation using real DP scenarios. The results showed the following: (1) The polarimetric entropy HL obtained through the improved DP scattering matrix CL can achieve higher information consistency results closely aligns with FP system and better performance, compared to the typical two DP scattering structures. (2) For multiple polarimetric features from DP scattering matrix (both traditional feature and combination feature), the improved DP scattering matrix CL can be used for oil spill extraction effectively with prominent results. (3) For oil spill extraction, the polarimetric features-based CL tend to have relatively high contribution, especially the H_A feature combination, leading to substantial gains in improved classification performance. This approach not only enriches the structural information of the DP system under VV–VH mode but also improves oil spill identification by integrating multi-structured DP features. Furthermore, it offers a practical alternative when FP data are unavailable. Full article
(This article belongs to the Section Environmental Sensing)
Show Figures

Graphical abstract

25 pages, 1689 KB  
Article
A Data-Driven Framework for Modeling Car-Following Behavior Using Conditional Transfer Entropy and Dynamic Mode Decomposition
by Poorendra Ramlall and Subhradeep Roy
Appl. Sci. 2025, 15(17), 9700; https://doi.org/10.3390/app15179700 - 3 Sep 2025
Viewed by 689
Abstract
Accurate modeling of car-following behavior is essential for understanding traffic dynamics and enabling predictive control in intelligent transportation systems. This study presents a novel data-driven framework that combines information-theoretic input selection via conditional transfer entropy (CTE) with dynamic mode decomposition with control (DMDc) [...] Read more.
Accurate modeling of car-following behavior is essential for understanding traffic dynamics and enabling predictive control in intelligent transportation systems. This study presents a novel data-driven framework that combines information-theoretic input selection via conditional transfer entropy (CTE) with dynamic mode decomposition with control (DMDc) for identifying and forecasting car-following dynamics. In the first step, CTE is employed to identify the specific vehicles that exert directional influence on a given subject vehicle, thereby systematically determining the relevant control inputs for modeling its behavior. In the second step, DMDc is applied to estimate and predict the dynamics by reconstructing the closed-form expression of the dynamical system governing the subject vehicle’s motion. Unlike conventional machine learning models that typically seek a single generalized representation across all drivers, our framework develops individualized models that explicitly preserve driver heterogeneity. Using both synthetic data from multiple traffic models and real-world naturalistic driving datasets, we demonstrate that DMDc accurately captures nonlinear vehicle interactions and achieves high-fidelity short-term predictions. Analysis of the estimated system matrices reveals that DMDc naturally approximates kinematic relationships, further reinforcing its interpretability. Importantly, this is the first study to apply DMDc to model and predict car-following behavior using real-world driving data. The proposed framework offers a computationally efficient and interpretable tool for traffic behavior analysis, with potential applications in adaptive traffic control, autonomous vehicle planning, and human-driver modeling. Full article
(This article belongs to the Section Transportation and Future Mobility)
Show Figures

Figure 1

20 pages, 1403 KB  
Article
Whispers in End Hopping: High-Robustness Network Covert Channel Based on End Spreading
by Zhengwen Wang, Fangxiao Li and Leyi Shi
Information 2025, 16(7), 589; https://doi.org/10.3390/info16070589 - 8 Jul 2025
Viewed by 524
Abstract
The massive use of end information in the end hopping system not only significantly improves the proactive defense capability but also reveals great potential for covert communication. However, the development of existing network covert channels is hindered by various elimination techniques and a [...] Read more.
The massive use of end information in the end hopping system not only significantly improves the proactive defense capability but also reveals great potential for covert communication. However, the development of existing network covert channels is hindered by various elimination techniques and a lack of robustness guarantees. In this paper, we first present a novel network covert channel model based on end spreading (CCES) in the end hopping system. We then propose a CCES-based scheme using m-sequence in the hypothetical scenario and theoretically analyze its characteristics, including eavesdropping resistance, loss tolerance, and robust synchronization. To evaluate the performance of the CCES scheme, three evaluation metrics are adopted: non-detectability, robustness, and transmission efficiency. Experimental results show that CCES achieves a bit error rate (BER) below 5% under 30% packet loss, entropy values ranging from 0.15 to 0.82 (comparable to normal traffic), and a transmission efficiency of up to 800 bits per second. These results confirm the CCES scheme’s strong robustness and practical applicability, outperforming traditional covert channels in both reliability and stealth. Full article
(This article belongs to the Section Information Security and Privacy)
Show Figures

Figure 1

37 pages, 6550 KB  
Article
Multiphase Transport Network Optimization: Mathematical Framework Integrating Resilience Quantification and Dynamic Algorithm Coupling
by Linghao Ren, Xinyue Li, Renjie Song, Yuning Wang, Meiyun Gui and Bo Tang
Mathematics 2025, 13(13), 2061; https://doi.org/10.3390/math13132061 - 21 Jun 2025
Cited by 1 | Viewed by 614
Abstract
This study proposes a multi-dimensional urban transportation network optimization framework (MTNO-RQDC) to address structural failure risks from aging infrastructure and regional connectivity bottlenecks. Through dual-dataset validation using both the Baltimore road network and PeMS07 traffic flow data, we first develop a traffic simulation [...] Read more.
This study proposes a multi-dimensional urban transportation network optimization framework (MTNO-RQDC) to address structural failure risks from aging infrastructure and regional connectivity bottlenecks. Through dual-dataset validation using both the Baltimore road network and PeMS07 traffic flow data, we first develop a traffic simulation model integrating Dijkstra’s algorithm with capacity-constrained allocation strategies for guiding reconstruction planning for the collapsed Francis Scott Key Bridge. Next, we create a dynamic adaptive public transit optimization model using an entropy weight-TOPSIS decision framework coupled with an improved simulated annealing algorithm (ISA-TS), achieving coordinated suburban–urban network optimization while maintaining 92.3% solution stability under simulated node failure conditions. The framework introduces three key innovations: (1) a dual-layer regional division model combining K-means geographical partitioning with spectral clustering functional zoning; (2) fault-tolerant network topology optimization demonstrated through 1000-epoch Monte Carlo failure simulations; (3) cross-dataset transferability validation showing 15.7% performance variance between Baltimore and PeMS07 environments. Experimental results demonstrate a 28.7% reduction in road network traffic variance (from 42,760 to 32,100), 22.4% improvement in public transit path redundancy, and 30.4–44.6% decrease in regional traffic load variance with minimal costs. Hyperparameter analysis reveals two optimal operational modes: rapid cooling (rate = 0.90) achieves 85% improvement within 50 epochs for emergency response, while slow cooling (rate = 0.99) yields 12.7% superior solutions for long-term planning. The framework establishes a new multi-objective paradigm balancing structural resilience, functional connectivity, and computational robustness for sustainable smart city transportation systems. Full article
Show Figures

Figure 1

30 pages, 5592 KB  
Article
Comprehensive Evaluation on Traffic Safety of Mixed Traffic Flow in a Freeway Merging Area Based on a Cloud Model: From the Perspective of Traffic Conflict
by Yaqin He and Jun Xia
Symmetry 2025, 17(6), 855; https://doi.org/10.3390/sym17060855 - 30 May 2025
Viewed by 1049
Abstract
As human-driven vehicles (HDVs) and autonomous vehicles (AVs) coexist on the road, the asymmetry between their driving behaviors, decision-making processes, and responses to traffic scenarios introduces new safety challenges, especially in complex merging areas where frequent interactions occur. The existing traffic safety analysis [...] Read more.
As human-driven vehicles (HDVs) and autonomous vehicles (AVs) coexist on the road, the asymmetry between their driving behaviors, decision-making processes, and responses to traffic scenarios introduces new safety challenges, especially in complex merging areas where frequent interactions occur. The existing traffic safety analysis of mixed traffic is mainly to analyze each safety index separately, lacking comprehensive evaluation. To investigate the safety risk more broadly, this study proposes a comprehensive safety evaluation framework for mixed traffic flows in merging areas from the perspective of traffic conflicts, emphasizing the asymmetry between HDVs and AVs. Firstly, an indicator of Emergency Lane Change Risk Frequency is introduced, considering the interaction characteristics of the merging area. A safety evaluation index system is established from lateral, longitudinal, temporal, and spatial dimensions. Then, indicator weights are determined using a modified game theory approach that combines the entropy weight method with the Decision-Making Trial and Evaluation Laboratory (DEMATEL) method, ensuring a balanced integration of objective data and expert judgment. Subsequently, a cloud model enhanced with the fuzzy mean value method is then developed to evaluate comprehensive safety. Finally, a simulation experiment is designed to simulate traffic operation of different traffic scenarios under various traffic flow rates, AV penetration rates, and ramp flow ratios, and the traffic safety of each scenario is estimated. Moreover, the evaluation results are compared against those derived from the fuzzy comprehensive evaluation (FCE) method to verify the reliability of the comprehensive evaluation model. The findings indicate that safety levels deteriorate with increasing total flow rates and ramp flow ratios. Notably, as AV penetration rises from 20% to 100%, safety conditions improve significantly, especially under high-flow scenarios. However, at AV penetration rates below 20%, an increase of the AV penetration rate may worsen safety. Overall, the proposed integrated approach provides a more robust and accurate assessment of safety risks than single-factor evaluations, providing deeper insights into the asymmetries in traffic interactions and offering valuable insights for traffic management and AV deployment strategies. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

20 pages, 2064 KB  
Article
Core Competency Assessment Model for Entry-Level Air Traffic Controllers Based on International Civil Aviation Organization Document 10056
by Yi Hu, Hanyang Shen, Bing Wang, Jichuan Teng, Chenglong Guo and Yanjun Wang
Aerospace 2025, 12(6), 486; https://doi.org/10.3390/aerospace12060486 - 28 May 2025
Viewed by 1575
Abstract
With the increasing air traffic flow, the workload of air traffic controllers is also growing, and their proficiency directly impacts civil aviation safety and efficiency. To address the lack of clear training objectives and inconsistent evaluation methods in the initial controller training at [...] Read more.
With the increasing air traffic flow, the workload of air traffic controllers is also growing, and their proficiency directly impacts civil aviation safety and efficiency. To address the lack of clear training objectives and inconsistent evaluation methods in the initial controller training at the Southwest Air Traffic Management Bureau, this study aimed to develop and validate a core competency model for initial air traffic controllers. Referencing ICAO Document 10056, the study first defined core competencies. Subsequently, using job analysis, the behavioral event interview (BEI) method, and expert panels, a core competency model tailored to the training objectives of the Southwest ATMB was constructed. The key findings of this research include: first, the defined structure of the developed model, comprising seven competency dimensions, 21 elements, and 26 observable behaviors (OBs); second, the determination of combined weights for each dimension and indicator using questionnaire surveys, the Analytic Hierarchy Process (AHP), and the Entropy Weight Method; and third, the successful application and validation of the model. Specifically, in its application, the weighted TOPSIS method was employed to evaluate trainees in a specific group. This not only provided a ranking of trainee abilities but also facilitated in-depth analysis through radar charts of competency dimensions and box plots of OB items. These application results demonstrate the model’s effectiveness and practicality. Full article
(This article belongs to the Section Air Traffic and Transportation)
Show Figures

Figure 1

22 pages, 1877 KB  
Article
Malicious Cloud Service Traffic Detection Based on Multi-Feature Fusion
by Zhouguo Chen, Chen Deng, Xiang Gao, Xinze Li and Hangyu Hu
Electronics 2025, 14(11), 2190; https://doi.org/10.3390/electronics14112190 - 28 May 2025
Viewed by 518
Abstract
With the rapid growth of cloud computing, malicious attacks targeting cloud services have become increasingly sophisticated and prevalent. To address the limitations of traditional detection methods—such as reliance on single-dimensional features and poor generalization—we propose a novel malicious request detection model based on [...] Read more.
With the rapid growth of cloud computing, malicious attacks targeting cloud services have become increasingly sophisticated and prevalent. To address the limitations of traditional detection methods—such as reliance on single-dimensional features and poor generalization—we propose a novel malicious request detection model based on multi-feature fusion. The model adopts a dual-branch architecture that independently extracts and learns from statistical attributes (e.g., field lengths, entropy) and field attributes (e.g., semantic content of the requested fields). To enhance feature representation, an attention-based fusion mechanism is introduced to dynamically weight and integrate field-level features, while a Gini coefficient-guided random forest algorithm is used to select the most informative statistical features. This design enables the model to capture both structural and semantic characteristics of cloud service traffic. Extensive experiments on the benchmark CSIC 2010 dataset and a real-world labeled cloud service dataset demonstrated that the proposed model significantly outperforms existing approaches in terms of accuracy, precision, recall, and F1 score. These results validate the effectiveness and robustness of our multi-feature fusion approach for detecting malicious requests in cloud environments. Full article
(This article belongs to the Special Issue Advancements in AI-Driven Cybersecurity and Securing AI Systems)
Show Figures

Figure 1

46 pages, 2221 KB  
Article
A Novel Metaheuristic-Based Methodology for Attack Detection in Wireless Communication Networks
by Walaa N. Ismail
Mathematics 2025, 13(11), 1736; https://doi.org/10.3390/math13111736 - 24 May 2025
Cited by 2 | Viewed by 916
Abstract
The landscape of 5G communication introduces heightened risks from malicious attacks, posing significant threats to network security and availability. The unique characteristics of 5G networks, while enabling advanced communication, present challenges in distinguishing between legitimate and malicious traffic, making it more difficult to [...] Read more.
The landscape of 5G communication introduces heightened risks from malicious attacks, posing significant threats to network security and availability. The unique characteristics of 5G networks, while enabling advanced communication, present challenges in distinguishing between legitimate and malicious traffic, making it more difficult to detect anonymous traffic. Current methodologies for intrusion detection within 5G communication exhibit limitations in accuracy, efficiency, and adaptability to evolving network conditions. In this study, we explore the application of an adaptive optimized machine learning-based framework to improve intrusion detection system (IDS) performance in wireless network access scenarios. The framework used involves developing a lightweight model based on a convolutional neural network with 11 layers, referred to as CSO-2D-CNN, which demonstrates fast learning rates and excellent generalization capabilities. Additionally, an optimized attention-based XGBoost classifier is utilized to improve model performance by combining the benefits of parallel gradient boosting and attention mechanisms. By focusing on the most relevant features, this attention mechanism makes the model suitable for complex and high-dimensional traffic patterns typical of 5G communication. As in previous approaches, it eliminates the need to manually select features such as entropy, payload size, and opcode sequences. Furthermore, the metaheuristic Cat Swarm Optimization (CSO) algorithm is employed to fine-tune the hyperparameters of both the CSO-2D-CNN and the attention-based XGBoost classifier. Extensive experiments conducted on a recent dataset of network traffic demonstrate that the system can adapt to both binary and multiclass classification tasks for high-dimensional and imbalanced data. The results show a low false-positive rate and a high level of accuracy, with a maximum of 99.97% for multilabel attack detection and 99.99% for binary task classification, validating the effectiveness of the proposed framework in the 5G wireless context. Full article
Show Figures

Figure 1

23 pages, 2258 KB  
Article
Research on Cold Chain Logistics Joint Distribution Vehicle Routing Optimization Based on Uncertainty Entropy and Time-Varying Network
by Huaixia Shi, Yu Hong, Qinglei Zhang and Jiyun Qin
Entropy 2025, 27(5), 540; https://doi.org/10.3390/e27050540 - 20 May 2025
Cited by 1 | Viewed by 1262
Abstract
The sharing economy is an inevitable trend in cold chain logistics. Most cold chain logistics enterprises are small and operate independently, with limited collaboration. Joint distribution is key to integrating cold chain logistics and the sharing economy. It aims to share logistics resources, [...] Read more.
The sharing economy is an inevitable trend in cold chain logistics. Most cold chain logistics enterprises are small and operate independently, with limited collaboration. Joint distribution is key to integrating cold chain logistics and the sharing economy. It aims to share logistics resources, provide collective customer service, and optimize distribution routes. However, existing studies have overlooked uncertainty factors in joint distribution optimization. To address this, we propose the Cold Chain Logistics Joint Distribution Vehicle Routing Problem with Time-Varying Network (CCLJDVRP-TVN). This model integrates traffic congestion uncertainty and constructs a time-varying network to reflect real-world conditions. The solution combines simulated annealing strategies with genetic algorithms. It also uses the entropy mechanism to optimize uncertainties, improving global search performance. The method was applied to optimize vehicle routing for three cold chain logistics companies in Beijing. The results show a reduction in logistics costs by 18.3%, carbon emissions by 15.8%, and fleet size by 12.5%. It also effectively addresses the impact of congestion and uncertainty on distribution. This study offers valuable theoretical support for optimizing joint distribution and managing uncertainties in cold chain logistics. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

Back to TopTop