Consuming electricity through Advanced Metering Infrastructure (AMI) has become an irrefutable part of our daily micro-moments. In AMI, electricity fraud is regarded as one of the most significant Nontechnical losses ...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most circumstances,binary-level code similarity analysis(BCSA)has been paid much attention *** recent years,many BCSA studies incorporating Al techniques focus on deriving semantic information from binary functions with code representations such as assembly code,intermediate representations,and control flow graphs to measure the ***,due to the impacts of different compilers,architectures,and obfuscations,binaries compiled from the same source code may vary considerably,which becomes the major obstacle for these works to obtain robust *** this paper,we propose a solution,named UPPC(Unleashing the Power of Pseudo-code),which leverages the pseudo-code of binary function as input,to address the binary code similarity analysis challenge,since pseudocode has higher abstraction and is platform-independent compared to binary *** selectively inlines the functions to capture the full function semantics across different compiler optimization levels and uses a deep pyramidal convolutional neural network to obtain the semantic embedding of the *** evaluated UPPC on a data set containing vulnerabilities and a data set including different architectures(X86,ARM),different optimization options(O0-O3),different compilers(GCC,Clang),and four obfuscation *** experimental results show that the accuracy of UPPC in function search is 33.2%higher than that of existing methods.
Forecasting sea levels is crucial for harbour operations and coastal structure design. The oceans make up two-thirds of Earth’s surface;therefore, historically, the marine economy has been extremely diversified as we...
详细信息
Wireless Local Area Network (WLAN) Fingerprinting-based Indoor Positioning Systems (IPS) offer several key advantages over other indoor positioning technologies, including cost-effectiveness with high accuracy and pas...
详细信息
Cellular traffic data hold significant potential for applications such as network planning, traffic prediction, mobility modeling, and personalized recommendations. However, limited data accessibility hinders more ope...
详细信息
The main task of this work is to establish the consumption of energy from renewable sources such as solar and wind energy for the production of such a combustible substance as hydrogen, and further optimal calculation...
详细信息
The modern vehicle depends on controller area network (CAN) bus technology to facilitate communication among electronic control units. Although the CAN bus technology is significant, it lacks the typical authenticatio...
详细信息
We devise a neural network-based temporal-textual framework that generates subgraphs with highly correlated authors from short-text contents. Our approach computes the relevance score (edge weight) between authors by ...
详细信息
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit pr...
详细信息
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit properties(e.g., degree distribution) of the sample. However, the existing sampling techniques are inadequate for the current sampling task: sampling the clustering structure, which is a crucial property of the current networks. In this paper, using different expansion strategies, two novel top-leader sampling methods(i.e., TLS-e and TLS-i) are proposed to obtain representative samples, and they are capable of effectively preserving the clustering structure. The rationale behind them is to select top-leader nodes of most clusters into the sample and then heuristically incorporate peripheral nodes into the sample using specific expansion strategies. Extensive experiments are conducted to investigate how well sampling techniques preserve the clustering structure of graphs. Our empirical results show that the proposed sampling algorithms can preserve the population's clustering structure well and provide feasible solutions to sample the clustering structure from large-scale graphs.
In today's digital era, Online Social Media (OSM) like Twitter, Facebook, and Instagram are used to share information. Everyone is trusted on these social network platforms for exchanging information such as perso...
详细信息
暂无评论