Enterprise taxation smart monitoring system based on intelligent background data extraction is designed in the proposed study. At present, the commonly used core volume rendering technology can display high-quality th...
详细信息
In this era of rapid development of the Internet, there will always be a large amount of new and innovative information. For Internet users, it is very tedious and impractical for them to filter out interesting and hi...
详细信息
Detecting software vulnerabilities is a crucial part of software security. At present, the most commonly used methods are to train supervised classification or regression models from the source code to detect vulnerab...
详细信息
ISBN:
(数字)9789819991198
ISBN:
(纸本)9789819991181;9789819991198
Detecting software vulnerabilities is a crucial part of software security. At present, the most commonly used methods are to train supervised classification or regression models from the source code to detect vulnerabilities, which require lots of high-quality labeled vulnerabilities. However, high-quality labeled vulnerabilities are not easy to be obtained in practical applications. To alleviate this problem, we present an effective and unsupervised method to detect software vulnerabilities. We first propose a new source code representation that maintains both the source code's natural language information and high-level programming logic information, and then we effectively embed the software function into a compact and low-dimensional representation based on hierarchical graph attention network. Finally, we obtain vulnerabilities by applying an outlier detection algorithm on the low-dimensional representation. We carry out extensive experiments on six datasets and the effectiveness of our proposed method is demonstrated by the experimental results.
Prolonged and poor sitting postures are major causes of many musculoskeletal disorders, such as herniated discs, cervical spondylosis, back fasciitis, and scoliosis, and hence proper postures are essential for maintai...
详细信息
In the protection and restoration work of ancient buildings, the detection and analysis of the cracks and defects of the exterior walls of ancient buildings is a crucial task. In this paper, an improved YOLOv7 algorit...
详细信息
In wireless sensor networks, the entire region is disbursed with a set of sensing devices (SDs), and then, multiple sets are formed. For controlling each set, a unique SD is selected for inter-set communication. The s...
详细信息
Text-to-speech (TTS) is currently a significant research field of speech synthesis. It has been used in intelligent conversational artificial intelligence (AI), chatbot, speech interaction, and a large variety of othe...
详细信息
Today, data governs all parts of life, making it critical for companies to comprehend and apply relevant data in their operations. The fundamental target of this research work is to arrange the world39;s information...
详细信息
Cloud computing technology is a kind of intensive computing mode with data and processing capability as the core. It mainly integrates various ICT technologies and is the product of traditional technologies. Cloud com...
详细信息
Machine Learning is a science developed as a subfield of Artificial Intelligence in late 9039;s. It is a science that will improve in the future. The development in Machine Learning is just because of the difficulty...
详细信息
暂无评论