Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont...
详细信息
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart contracts often cause huge economic *** it is difficult to repair and update smart contracts,it is necessary to find the vulnerabilities before they are ***,code analysis,which requires traversal paths,and learning methods,which require many features to be trained,are too time-consuming to detect large-scale on-chain ***-based methods will obtain detection models from a feature space compared to code analysis methods such as symbol *** the existing features lack the interpretability of the detection results and training model,even worse,the large-scale feature space also affects the efficiency of *** paper focuses on improving the detection efficiency by reducing the dimension of the features,combined with expert *** this paper,a feature extraction model Block-gram is proposed to form low-dimensional knowledge-based features from ***,the metadata is separated and the runtime code is converted into a sequence of opcodes,which are divided into segments based on some instructions(jumps,etc.).Then,scalable Block-gram features,including 4-dimensional block features and 8-dimensional attribute features,are mined for the learning-based model ***,feature contributions are calculated from SHAP values to measure the relationship between our features and the results of the detection *** addition,six types of vulnerability labels are made on a dataset containing 33,885 contracts,and these knowledge-based features are evaluated using seven state-of-the-art learning algorithms,which show that the average detection latency speeds up 25×to 650×,compared with the features extracted by N-gram,and also can enhance the interpretability of the detection model.
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obta...
详细信息
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obtain a large amount of training *** paper proposes a text data augmentation method based on masked language model(MLM),aiming to enhance the generalization capability of deep learning models by expanding the training *** method em-ploys a Mask strategy to randomly conceal words in the text,effectively leveraging contextual infor-mation to predict and replace masked words based on MLM,thereby generating new training *** Mask strategies of character level,word level and N-gram are designed,and the performance of each Mask strategy under different Mask ratios is analyzed and *** experimental results show that the performance of the word-level Mask strategy is better than the traditional data augmen-tation method.
Image inpainting, aiming at exactly recovering missing pixels from partially observed entries, is typically an ill-posed problem. As a powerful constraint, low-rank priors have been widely applied in image inpainting ...
详细信息
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining...
详细信息
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become inc...
详细信息
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become increasingly difficult to extract due to wide availability of various image processing *** Neural Networks(CNN)-based algorithms have demonstrated good discriminative capabilities for different brands and even different models of camera ***,their performances is not ideal in case of distinguishing between individual devices of the same model,because cameras of the same model typically use the same optical lens,image sensor,and image processing algorithms,that result in minimal overall *** this paper,we propose a camera forensics algorithm based on multi-scale feature fusion to address these *** proposed algorithm extracts different local features from feature maps of different scales and then fuses them to obtain a comprehensive feature *** representation is then fed into a subsequent camera fingerprint classification *** upon the Swin-T network,we utilize Transformer Blocks and Graph Convolutional Network(GCN)modules to fuse multi-scale features from different stages of the backbone ***,we conduct experiments on established datasets to demonstrate the feasibility and effectiveness of the proposed approach.
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin...
详细信息
Ceramic tiles are one of the most indispensable materials for interior *** ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural *** this paper,we propose a...
详细信息
Ceramic tiles are one of the most indispensable materials for interior *** ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural *** this paper,we propose a sketch-based generation method for generating diverse ceramic tile images based on a hand-drawn sketches using Generative Adversarial Network(GAN).The generated tile images can be tailored to meet the specific needs of the user for the tile *** proposed method consists of four ***,a dataset of ceramic tile images with diverse distributions is created and then pre-trained based on ***,for each ceramic tile image in the dataset,the corresponding sketch image is generated and then the mapping relationship between the images is trained based on a sketch extraction network using ResNet Block and jump connection to improve the quality of the generated ***,the sketch style is redefined according to the characteristics of the ceramic tile images and then double cross-domain adversarial loss functions are employed to guide the ceramic tile generation network for fitting in the direction of the sketch style and to improve the training ***,we apply hidden space perturbation and interpolation for further enriching the output textures style and satisfying the concept of“one style with multiple faces”.We conduct the training process of the proposed generation network on 2583 ceramic tile images *** measure the generative diversity and quality,we use Frechet Inception Distance(FID)and Blind/Referenceless Image Spatial Quality Evaluator(BRISQUE)*** experimental results prove that the proposed model greatly enhances the generation results of the ceramic tile images,with FID of 32.47 and BRISQUE of 28.44.
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achieving high efficiency in software based *** seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation ***,in recent work,Xie et *** the security of *** precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret *** this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block *** particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master *** the brute force searching remaining bits,one can obtain the full master secret *** simulations and experiment results show that our analysis is practical.
Fingerprint identification systems have been widely deployed in many occasions of our daily ***,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit *** address cha...
详细信息
Fingerprint identification systems have been widely deployed in many occasions of our daily ***,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit *** address challenges from PA,fingerprint liveness detection(FLD)technology has been proposed and gradually attracted people’s *** vast majority of the FLD methods directly employ convolutional neural network(CNN),and rarely pay attention to the problem of overparameterization and over-fitting of models,resulting in large calculation force of model deployment and poor model *** at filling this gap,this paper designs a lightweight multi-scale convolutional neural network method,and further proposes a novel hybrid spatial pyramid pooling block to extract abundant features,so that the number of model parameters is greatly reduced,and support multi-scale true/fake fingerprint ***,the representation self-challenge(RSC)method is used to train the model,and the attention mechanism is also adopted for optimization during execution,which alleviates the problem of model over-fitting and enhances generalization of detection ***,experimental results on two publicly benchmarks:LivDet2011 and LivDet2013 sets,show that our method achieves outstanding detection results for blind materials and *** size of the model parameters is only 548 KB,and the average detection error of cross-sensors and cross-materials are 15.22 and 1 respectively,reaching the highest level currently available.
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining...
详细信息
ISBN:
(数字)9798331508821
ISBN:
(纸本)9798331508838
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining semantic features and event local dependencies poses a challenge to accurate event extraction, which hinders the informatization and intelligent development of rail transit projects. To address these challenges, we proposes an event extraction method that fuses semantic and local dependency features. The study initially preprocesses the rail transit design codes dataset and performs sequence labeling. Then, the event trigger words are mined by combining the term frequency-inverse document frequency (TF-IDF) and minimum edit distance (MED) algorithms. Based on the semantic similarity measurement method and the trigger word mining results, the features representation of event semantic information is enhanced by using the Bidirectional Encoder Representations from Transformers (BERT) model and Bi-directional Long Short-Term Memory (BiLSTM) model. At the same time, event arguments are mined and a local dependency graph is generated based on their mining results, and then the enhanced local dependency features are obtained by using the graph convolutional network (GCN). Finally, the event semantic features and local dependency features are fused, and the conditional random field (CRF) is used to predict the labels to obtain the event extraction results. Through the comparison with five baseline methods on the datasets of rail transit design codes, it is found that the Precision, Recall, and F1 score of the proposed method are improved, with an average improvement of 9.604% on Precision, 9.342% on Recall, and 9.730% on F1 score, respectively. The contribution of the sub-modules to the overall performance is further evaluated through ablation experiments, which confirms the effectiveness and feasibility of the proposed method.
暂无评论