As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio...
详细信息
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge...
详细信息
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio...
详细信息
Blind iris images, caused by unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, limited literature addresses this issue. To tackle ...
详细信息
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu...
详细信息
Energy holes problem is one of key issues for wireless sensor networks (WSN). At present, the resolved strategies mainly focus on non-uniform node distribution and adjusting transmission power. However, some costs are...
详细信息
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo...
详细信息
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybox fuzzing generates input cases by mutating the input seed,i.e.,applying a sequence of mutation operators to randomly selected mutation positions of the ***,existing fruitful research work focuses on scheduling mutation operators,leaving the schedule of mutation positions as an overlooked aspect of fuzzing *** paper proposes a novel greybox fuzzing method,PosFuzz,that statistically schedules mutation positions based on their historical *** makes use of a concept of effective position distribution to represent the semantics of the input and to guide the *** first utilizes Good-Turing frequency estimation to calculate an effective position distribution for each mutation *** then leverages two sampling methods in different mutating stages to select the positions from the *** have implemented PosFuzz on top of AFL,AFLFast and MOPT,called Pos-AFL,-AFLFast and-MOPT respectively,and evaluated them on the UNIFUZZ benchmark(20 widely used open source programs)and LAVA-M *** result shows that,under the same testing time budget,the Pos-AFL,-AFLFast and-MOPT outperform their counterparts in code coverage and vulnerability discovery *** with AFL,AFLFast,and MOPT,PosFuzz gets 21%more edge coverage and finds 133%more paths on *** also triggers 275%more unique bugs on average.
Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitor...
详细信息
Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitoring system are introduced. The SD card of large capacity is used to store data collected by the supervising system, which could support the detail analysis of running status of distribution transformer. A simplified design of electricity cut examination is adopted to decrease the complexity and cost of the system. The system has been used in truth circumstance and the performance of system is satisfactory.
Photo typesetting belongs to the rectangular packing problems, currently the algorithms of rectangular packing problems can be divided into two categories: heuristic methods and modern intelligent based methods. For b...
详细信息
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the most important newly threat of the networksecurity. In this paper, the propagation process of active P2P worms are st...
详细信息
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the most important newly threat of the networksecurity. In this paper, the propagation process of active P2P worms are studied by a dynamic model over the overlay topology which modeled as a power-law undirected graph. Firstly, GLP power law generator is used to generate power law topologies to represent unstructured P2P networks. Then the propagation of P2P worms is modeled over the topology. Specifically, discrete-time is adopted to conduct recursion and approximation to describe propagation of proactive P2P worm. In our model, all the probabilities which would happen to all kinds of peers are considered in full. Therefore, both the whole network's status and the single node's action are taken into consideration. So the model we constructed is more likely the truth. Finally, the simulation studies are carried out to prove that the simulation results match the mathematical model well.
暂无评论