Link prediction and node classification are two important downstream tasks of network representation learning. Existing methods have achieved acceptable results but they perform these two tasks separately, which requi...
详细信息
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulne...
详细信息
ISBN:
(数字)9798350379228
ISBN:
(纸本)9798350390780
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulnerable to various Byzantine attacks. Existing defense models face challenges in defending against complex attacks and are often constrained by strict network topologies. To address this issue, a parameter aggregation rule based on reputation evaluation (RPV) is proposed in this paper. This rule establishes a reputation model for neighboring nodes and continuously updates it based on their distance performance during each iteration. By applying the reputation model of neighboring nodes to the Beta distribution, their reliability is obtained. Based on the reliability of neighboring nodes, the set of reliable nodes for this iteration and select parameter values from them for aggregation are determined. Finally, we gradually eliminate the influence of Byzantine nodes. Our experimental results on the MNIST dataset demonstrate that the proposed algorithm is resilient to attacks from any number of Byzantine nodes and outperforms previous defense models in terms of network topology constraints, training accuracy, and computational costs.
computerscience is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su...
详细信息
GPUs are essential to accelerating the latency-sensitive deep neural network (DNN) inference workloads in cloud datacenters. To fully utilize GPU resources, spatial sharing of GPUs among co-located DNN inference workl...
详细信息
Since deep learning (DL) can automatically learn features from source code, it has been widely used to detect source code vulnerability. To achieve scalable vulnerability scanning, some prior studies intend to process...
详细信息
ISBN:
(纸本)9781665495899
Since deep learning (DL) can automatically learn features from source code, it has been widely used to detect source code vulnerability. To achieve scalable vulnerability scanning, some prior studies intend to process the source code directly by treating them as text. To achieve accurate vulnerability detection, other approaches consider distilling the program semantics into graph representations and using them to detect vulnerability. In practice, text-based techniques are scalable but not accurate due to the lack of program semantics. Graph-based methods are accurate but not scalable since graph analysis is typically time-consuming. In this paper, we aim to achieve both scalability and accuracy on scanning large-scale source code vulnerabilities. Inspired by existing DL-based image classification which has the ability to analyze millions of images accurately, we prefer to use these techniques to accomplish our purpose. Specifically, we propose a novel idea that can efficiently convert the source code of a function into an image while preserving the program details. We implement Vul-CNN and evaluate it on a dataset of 13,687 vulnerable functions and 26,970 non-vulnerable functions. Experimental results report that VulCNN can achieve better accuracy than eight state-of-the-art vul-nerability detectors (i.e., Checkmarx, FlawFinder, RATS, TokenCNN, VulDeePecker, SySeVR, VulDeeLocator, and Devign). As for scalability, VulCNN is about four times faster than VulDeePecker and SySeVR, about 15 times faster than VulDeeLocator, and about six times faster than Devign. Furthermore, we conduct a case study on more than 25 million lines of code and the result indicates that VulCNN can detect large-scale vulnerability. Through the scanning reports, we finally discover 73 vulnerabilities that are not reported in NVD.
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ...
详细信息
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt...
详细信息
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp...
详细信息
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can employ evasive techniques to detect the analysis environment and alter its behavior *** known evasive techniques can be explicitly dismantled,the challenge lies in generically dismantling evasions without full knowledge of their conditions or implementations,such as logic bombs that rely on uncertain conditions,let alone unsupported evasive techniques,which contain evasions without corresponding dismantling strategies and those leveraging unknown *** this paper,we present Antitoxin,a prototype for automatically exploring evasive *** utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive *** probabilities of branch execution are derived from dynamic coverage,while taint analysis helps identify paths associated with evasive techniques that rely on uncertain ***,Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path *** is achieved through forced execution,which forcefully sets the outcomes of branches on selected ***,Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques,thereby reducing exploration ***,Antitoxin provides valuable insights into sensitive behaviors,facilitating deeper manual *** experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic *** probability calculations guide the multi-path exploration of evasions without requiring prior knowledge of their conditions or implementations,enabling the dismantling of unsupported techniques such as C2 and signific
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ...
详细信息
ISBN:
(数字)9798350391367
ISBN:
(纸本)9798350391374
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to keep up with the rapid development of network technologies and applications. Additionally, they fail to trace and source network attacks, leading to frequent organized and purposeful malicious attack incidents. To address these issues, this paper proposes a research method for risk modeling and traceability of boundary attacks on power IoT terminals based on complex networks. First, based on the node information of power IoT terminal devices and complex network theory, a terminal boundary attack network (TBAN) is established. Next, using indicators related to complex network theory, such as degree, in-degree, and out-degree, the terminal boundary attack network is analyzed. Furthermore, a staged TBAN is proposed to analyze the attack risks at different times. Then, combining causal theory, a method for tracing and sourcing terminal boundary attacks based on a causal Bayesian network is proposed to identify and trace malicious attacks. Finally, validation and testing analysis are conducted using the actual deployment of power IoT terminal devices. The proposed analysis method transforms the spatial characteristics of the power IoT terminal boundary into a temporally sequential TBAN, which not only visually reflects attack risks but also reveals the temporal relationships of terminal boundary attacks between lines.
暂无评论