Access control is an extremely important and error-prone practice during web application. The emergence of NoSQL databases and the flexible data models they bring impose new challenges on the implementation of access ...
详细信息
Access control is an extremely important and error-prone practice during web application. The emergence of NoSQL databases and the flexible data models they bring impose new challenges on the implementation of access control within web applications. This paper presents Scout, a novel methodology for discovering access control vulnerabilities in existing web applications. Meanwhile (1) features of NoSQL database can be addressed and (2) neither application source code nor server-side session information from the developers is required. This paper implements a prototype of Scout, which targets MongoDB backend web applications. By automatically discovering the protocol layer in the web application stack, Scout introduces a data access operation model precisely representing the MongoDB actions performed in the web application, as well as inferring the access control policies. The prototype is shown to be able to identify comprehensive access control vulnerabilities in MongoDB backend web applications, and generate detailed report as the facilitator to manually fix the identified vulnerabilities.
Convolutional Neural Networks (CNNs) have delivered impressive state-of-the-art performances for many vision tasks, while the computation costs of these networks during test-time are notorious. Empirical results have ...
详细信息
ISBN:
(纸本)9781467399623
Convolutional Neural Networks (CNNs) have delivered impressive state-of-the-art performances for many vision tasks, while the computation costs of these networks during test-time are notorious. Empirical results have discovered that CNNs have learned the redundant representations both within and across different layers. When CNNs are applied for binary classification, we investigate a method to exploit this redundancy across layers, and construct a cascade of classifiers which explicitly balances classification accuracy and hierarchical feature extraction costs. Our method cost-sensitively selects feature points across several layers from trained networks and embeds non-expensive yet discriminative features into a cascade. Experiments on binary classification demonstrate that our framework leads to drastic test-time improvements, e.g., possible 47.2× speedup for TRECVID upper body detection, 2.82× speedup for Pascal VOC2007 People detection, 3.72× for INRIA Person detection with less than 0.5% drop in accuracies of the original networks.
In order to effectively identify industrial process faults, an improved Fisher discriminant analysis (FDA) method, referred to as the statistics local Fisher discriminant analysis (SLFDA), is proposed for fault classi...
详细信息
In order to effectively identify industrial process faults, an improved Fisher discriminant analysis (FDA) method, referred to as the statistics local Fisher discriminant analysis (SLFDA), is proposed for fault classification. For mining statistics information hidden in process data, statistics pattern analysis is firstly applied to transform the original measured variables into the corresponding statistics, including second-order and higher-order ones. Furthermore, considering the local structure characteristics of fault data, local FDA (LFDA) is performed which computes the discriminant vectors by modifying the optimization objective with local weighting factor. Simulation results on the benchmark Tennessee Eastman process show that the proposed SLFDA has a better fault classification performance than the FDA and LFDA methods.
The scalability performance of the traditional evolutionary algorithms (EAs) deteriorates rapidly as the dimensionality of the optimization problems increases. Therefore, cooperative coevolutionary (CC) framework is p...
详细信息
In this paper, we introduced a searching platform called BCISearch, a web-portal for the collection of molecular information linked to breast cancer using text mining technology including two types of information: sta...
详细信息
ISBN:
(纸本)9781509047963
In this paper, we introduced a searching platform called BCISearch, a web-portal for the collection of molecular information linked to breast cancer using text mining technology including two types of information: static and dynamic information, involving with six categories entities and their relationships: protein, DNA, RNA, Cell-type, Cell-line, Virus. BCISearch could search 248997 Proteins, 71358 DNA, 7724 RNA, 58891 Cell-line, 871 Virus, 31698 Cell-type. The BCISearch Experimental approach is promising for develop biomedical text mining technology. The BCISearch would assist researcher to understand breast cancer etiology in genetic factors. The searching platform is available at http://210.28.186.168:8080/BCISearch.
Due to the distinguished properties offered by different structural phases of monolayer MoS2, phase engineering design are urgently required for achieving switchable structural phase. Strain engineering is widely acce...
详细信息
A parallel Gaussian elimination algorithm for Jacobian matrix calculation is designed to accelerate the MT Occam algorithm. The gaussd progress calculates the column matrix which is build by receivers' data. The p...
详细信息
ISBN:
(纸本)9781509007691
A parallel Gaussian elimination algorithm for Jacobian matrix calculation is designed to accelerate the MT Occam algorithm. The gaussd progress calculates the column matrix which is build by receivers' data. The parallel gaussd process is based on the original Gaussian parallel algorithm. The back substitution equation has been transformed to increase the elements in parallel area. By storing the primary row of coefficient matrix and RJ matrix to shared memory, memory accessing time is reduced. The parallel gaussd is implemented in CUDA FORTRAN. Using the gauss and gaussd parallel algorithms together can reduce the data transform between GPU and host. The highest speedup of parallel gaussd is 22. It greatly improves the efficiency of Jacobian matrix calculation in MT Occam algorithm.
In dealing with the problem of modelling DNA recombination, the operation of splicing on linear and circular strings of symbols was introduced. Inspired by splicing on circular strings, the operation of flat splicing ...
详细信息
Recently, more and more SSVEP(steady-state visual evoked potential) based BCIs(brain-computer interfaces) are developed to control external devices such as robots and wheelchairs. There have been many different method...
详细信息
ISBN:
(纸本)9781467374439
Recently, more and more SSVEP(steady-state visual evoked potential) based BCIs(brain-computer interfaces) are developed to control external devices such as robots and wheelchairs. There have been many different methods for detecting the presence of SSVEPs. In this paper, CCA(canonical correlation analysis) detection method and PSD(power spectral density) detection method are compared in offline experiments. Results show that CCA has a much better performance than PSD. Therefore, CCA detection method is used in the online SSVEP-based BCI system with three targets. Three subjects participated to control a virtual wheeled robot in SIGVerse simulation environment. All of the subjects were able to use this BCI system and achieving an average accuracy of 89.8%, 95.6%, 92.5% respectively.
暂无评论