版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、1Paper Writing2Paper Writing Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work3Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contri
2、butions (1 paragraph) Experiment Overview Roadmap (1 paragraph)4BackgroundTopicBackgroundTopicTime OrientedApplication Oriented Concept, Characteristics, Application, Importance, and etc.5BackgroundTopic6Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algori
3、thm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)7Literature ReviewMotivation Notable Method Summarization (Focus on nearest neighbors) Comments (Weakness) Motivation (against the weakness)8Literature ReviewMotivation9Introduction Background Topic (1-2
4、paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)10Algorithm Overview & Contribution Method Definition Principle Description Contribution11Algorithm Overview & Contribution12Contributions New
5、Concept New Model New Algorithm (More Efficient, Less Memory, Parallelism and etc.) New Result (Significant in Application Domain)13Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overvi
6、ew Roadmap (1 paragraph)14Experiment Overview Implementation Data Result15Introduction Background Topic (1-2 paragraphs) Literature Review Motivation (1 paragraph) Algorithm Overview (1 paragraph) Contributions (1 paragraph) Experiment Overview Roadmap (1 paragraph)16Roadmap17Five Main Sections Abst
7、ract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work18Related Work (Main Content) Detail some notable works Give comments individually or by group Summarize irrelevant works in a few words In time or advancing order
8、 Try to put the methods to compare late.192021Related Work (Supplement) Add the head There are plenty of covert channel methods in literature. Here, we will only review some notable work due to space limitation. Now (Here/ In this section), we will review some notable methods (previous work)22Relate
9、d Work (Supplement) Add the tail Hence, we are motivated to23Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work24Preliminaries Applying to paper with lots of definitions Three Components: Ov
10、erview Definitions Problem Definition 2526Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work27Algorithm (Method) Overview Preliminaries (Definitions, Model Description) Put the whole idea in
11、 Phases or Steps Emphases which phase/step/part makes the algorithm outstanding Use running examples, figures, tables, pseudo-code. Supplementary (limitations, suggestions, future work)28Algorithm (Overview)29Algorithm (Main Content) Phase 1 Step 1 Step 2 Phase 2 In the 1st step In the 2nd step Phas
12、e 3 30Algorithm (Try to Make it Clear)Alice and Bob would take the following five steps to transmit the secret message:Step 1: Alice and Bob communicate normally. They both record the message lengths sent by Alice, and make the record as Reference.Step 2: Alice and Bob select a length l from the Ref
13、erence by the same random algorithm. Step 3: In the ith sending, Alice sends to Bob a message of length lnext =l+SUMi. The Reference is updated by appending lnext. Step 4: Bob decodes the ith message into Wi by subtracting l from lnext.In our method, the Step 2 and 3 ensure that each sending message
14、 would learn from the normal network traffic (Reference) so that messages from our channel have similar length distribution as normal network messages. To better resist the detection, our scheme could be further enhanced through the way that Alice periodically sends to Bob redundant normal network m
15、essages during the transmission.31Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work32Experimental Results Overview: environment, data, methods to compare Data Description Data Preprocessing
16、 Compare against Other Algorithms (Methods) Parameter Studies33Experimental ResultsExperimenting on the Clartnet dataset 9, we compared our scheme with Girlings3 and Yaos8 models, and estimated the upper bound of our models bandwidth.4.1 DatasetClarknet dataset contains the logs of 1.6 million HTTP
17、queries from two weeks. We take the 7239 queries from Client as the messages for our experiments. In each query, the average size of transmitted message is 489 bytes (39 bytes message + 450 bytes header).34Experimental Results35Five Main Sections Abstract, Keywords Introduction Related Work (Literat
18、ure Review) Preliminary Algorithm (Method) Experimental Results Conclusion & Future Work36Conclusion & Future Work Summarize what we did in the paper Method Experimental Results Advantage (Application) Future Work37Conclusion & Future Work38Five Main Sections Abstract, Keywords Introduction Related Work (Literature Review) Preliminary Algorit
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 公共交通从业人员培训考核制度
- 会议信息发布与宣传推广制度
- 2026年济宁市检察机关招聘聘用制书记员的备考题库(31人)及完整答案详解1套
- 2026年重庆市永安工程建设监理有限公司贵州分公司备考题库及一套完整答案详解
- 四川省大英中学2025年临聘教师招聘备考题库及答案详解一套
- 中学学生社团活动经费报销制度
- 2026年通海县卫生健康系统公开招聘紧缺岗位医生18人备考题库及答案详解1套
- 养老院入住老人生活照料培训制度
- 2026年滨州医学院附属医院公开招聘呼吸与危重症医学科主任助理备考题库及一套答案详解
- 企业员工培训与技能提升制度
- CIM城市信息模型技术创新中心建设实施方案
- 班级互动小游戏-课件共30张课件-小学生主题班会版
- 2025至2030全球及中国智慧机场建设行业发展趋势分析与未来投资战略咨询研究报告
- 2025年河南省康养行业职业技能竞赛健康管理师赛项技术工作文件
- 中学学生教育惩戒规则实施方案(2025修订版)
- ISO 9001(DIS)-2026与ISO9001-2015英文标准对照版(编辑-2025年9月)
- 2024译林版七年级英语上册知识清单
- 半导体安全培训课件
- 防范围标串标行为操作指南
- 公司收款管理办法
- 综合能力测试题(含答案)
评论
0/150
提交评论