版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、1Paper Writing2Paper Writing Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work3Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contri
2、butions (1 paragraph) Experiment Overview Roadmap (1 paragraph)4BackgroundTopicBackgroundTopicTime OrientedApplication Oriented Concept, Characteristics, Application, Importance, and etc.5BackgroundTopic6Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algori
3、thm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)7Literature ReviewMotivation Notable Method Summarization (Focus on nearest neighbors) Comments (Weakness) Motivation (against the weakness)8Literature ReviewMotivation9Introduction Background Topic (1-2
4、paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)10Algorithm Overview & Contribution Method Definition Principle Description Contribution11Algorithm Overview & Contribution12Contributions New
5、Concept New Model New Algorithm (More Efficient, Less Memory, Parallelism and etc.) New Result (Significant in Application Domain)13Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overvi
6、ew Roadmap (1 paragraph)14Experiment Overview Implementation Data Result15Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)16Roadmap17Five Main Sections Abst
7、ract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work18Related Work (Main Content) Detail some notable works Give comments individually or by group Summarize irrelevant works in a few words In time or advancing order
8、 Try to put the methods to compare late.192021Related Work (Supplement) Add the head There are plenty of covert channel methods in literature. Here, we will only review some notable work due to space limitation. Now (Here/ In this section), we will review some notable methods (previous work)22Relate
9、d Work (Supplement) Add the tail Hence, we are motivated to23Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work24Preliminaries Applying to paper with lots of definitions Three Components: Ov
10、erview Definitions Problem Definition 2526Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work27Algorithm (Method) Overview Preliminaries (Definitions, Model Description) Put the whole idea in
11、 Phases or Steps Emphases which phase/step/part makes the algorithm outstanding Use running examples, figures, tables, pseudo-code. Supplementary (limitations, suggestions, future work)28Algorithm (Overview)29Algorithm (Main Content) Phase 1 Step 1 Step 2 Phase 2 In the 1st step In the 2nd step Phas
12、e 3 30Algorithm (Try to Make it Clear)Alice and Bob would take the following five steps to transmit the secret message:Step 1: Alice and Bob communicate normally. They both record the message lengths sent by Alice, and make the record as Reference.Step 2: Alice and Bob select a length l from the Ref
13、erence by the same random algorithm. Step 3: In the ith sending, Alice sends to Bob a message of length lnext =l+SUMi. The Reference is updated by appending lnext. Step 4: Bob decodes the ith message into Wi by subtracting l from lnext.In our method, the Step 2 and 3 ensure that each sending message
14、 would learn from the normal network traffic (Reference) so that messages from our channel have similar length distribution as normal network messages. To better resist the detection, our scheme could be further enhanced through the way that Alice periodically sends to Bob redundant normal network m
15、essages during the transmission.31Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work32Experimental Results Overview: environment, data, methods to compare Data Description Data Preprocessing
16、 Compare against Other Algorithms (Methods) Parameter Studies33Experimental ResultsExperimenting on the Clartnet dataset 9, we compared our scheme with Girlings3 and Yaos8 models, and estimated the upper bound of our models bandwidth.4.1 DatasetClarknet dataset contains the logs of 1.6 million HTTP
17、queries from two weeks. We take the 7239 queries from Client as the messages for our experiments. In each query, the average size of transmitted message is 489 bytes (39 bytes message + 450 bytes header).34Experimental Results35Five Main Sections Abstract, Keywords Introduction Related Work (Literat
18、ure Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work36Conclusion & Future Work Summarize what we did in the paper Method Experimental Results Advantage (Application) Future Work37Conclusion & Future Work38Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorit
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 世界地理 澳大利亞
- 一年級(jí)語(yǔ)文下冊(cè)《語(yǔ)文園地八》課件
- 單位管理制度收錄大全【員工管理】
- 港口生產(chǎn)組織與管理課件-港口企業(yè)的生產(chǎn)運(yùn)作
- 消防整改項(xiàng)目可行性研究報(bào)告兩
- 銅鋁合金制品項(xiàng)目可行性研究報(bào)告
- 生活中的經(jīng)濟(jì)學(xué)課件
- 2025年瓦楞紙生項(xiàng)目可行性研究報(bào)告
- 氧氣瓶項(xiàng)目安全風(fēng)險(xiǎn)評(píng)價(jià)報(bào)告
- 2025年中國(guó)公共云存儲(chǔ)服務(wù)行業(yè)發(fā)展前景預(yù)測(cè)及投資戰(zhàn)略研究報(bào)告
- 2022年版物理課程標(biāo)準(zhǔn)的特點(diǎn)探討與實(shí)施建議
- 幼兒園班級(jí)安全教育活動(dòng)計(jì)劃表
- ppt模板:創(chuàng)意中國(guó)風(fēng)古風(fēng)水墨山水通用模板課件
- 展館精裝修工程施工方案(98頁(yè))
- 香港聯(lián)合交易所有限公司證券上市規(guī)則
- 紡紗學(xué)-ppt課件
- (高清正版)JJF 1908-2021 雙金屬溫度計(jì)校準(zhǔn)規(guī)范
- (高清版)嚴(yán)寒和寒冷地區(qū)居住建筑節(jié)能設(shè)計(jì)標(biāo)準(zhǔn)JGJ26-2018
- 項(xiàng)目經(jīng)理績(jī)效考核評(píng)分表
- .運(yùn)維服務(wù)目錄
- 造紙化學(xué)品及其應(yīng)用
評(píng)論
0/150
提交評(píng)論