Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of informationsystems. With the rapid devel...
详细信息
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of informationsystems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of informationsystems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.
An application of E-healthcare watermarking method based on a hybridization of encryption as well as compression algorithms is proposed as the primary goal of this work. One step involves inserting a watermark into th...
详细信息
Instance segmentation has drawn mounting attention due to its significant ***,high computational costs have been widely acknowledged in this domain,as the instance mask is generally achieved by pixel-level *** this pa...
详细信息
Instance segmentation has drawn mounting attention due to its significant ***,high computational costs have been widely acknowledged in this domain,as the instance mask is generally achieved by pixel-level *** this paper,we present a conceptually efficient contour regression network based on the you only look once(YOLO)architecture named YOLO-CORE for instance *** mask of the instance is efficiently acquired by explicit and direct contour regression using our designed multiorder constraint consisting of a polar distance loss and a sector *** proposed YOLO-CORE yields impressive segmentation performance in terms of both accuracy and *** achieves 57.9%AP@0.5 with 47 FPS(frames per second)on the semantic boundaries dataset(SBD)and 51.1%AP@0.5 with 46 FPS on the COCO *** superior performance achieved by our method with explicit contour regression suggests a new technique line in the YOLO-based image understanding ***,our instance segmentation design can be flexibly integrated into existing deep detectors with negligible computation cost(65.86 BFLOPs(billion float operations per second)to 66.15 BFLOPs with the YOLOv3 detector).
Forensic voice comparison (FVC) is a crucial area within forensic science, focused on analyzing and comparing voice recordings to identify speakers. Traditional FVC methods often involve manual analysis and subjective...
详细信息
Adaptive traffic light scheduling based on realtime traffic information processing has proven effective for urban traffic congestion management. However, fine-grained information regarding individual vehicles is diffi...
详细信息
Adaptive traffic light scheduling based on realtime traffic information processing has proven effective for urban traffic congestion management. However, fine-grained information regarding individual vehicles is difficult to acquire through traditional data collection techniques and its accuracy cannot be guaranteed because of congestion and harsh environments. In this study, we first build a pipeline model based on vehicle-to-infrastructure communication, which is a salient technique in vehicular adhoc networks. This model enables the acquisition of fine-grained and accurate traffic information in real time via message exchange between vehicles and roadside units. We then propose an intelligent traffic light scheduling method (ITLM) based on a “demand assignment” principle by considering the types and turning intentions of vehicles. In the context of this principle, a signal phase with more vehicles will be assigned a longer green time. Furthermore, a green-way traffic light scheduling method (GTLM) is investigated for special vehicles (e.g., ambulances and fire engines) in emergency scenarios. Signal states will be adjusted or maintained by the traffic light control system to keep special vehicles moving along smoothly. Comparative experiments demonstrate that the ITLM reduces average wait time by 34%-78% and average stop frequency by 12%-34% in the context of traffic management. The GTLM reduces travel time by 22%^44% and 30%-55% under two types of traffic conditions and achieves optimal performance in congested scenarios.
Numerical P systems(for short, NP systems) are distributed and parallel computing models inspired from the structure of living cells and economics. Enzymatic numerical P systems(for short, ENP systems) are a variant o...
详细信息
Numerical P systems(for short, NP systems) are distributed and parallel computing models inspired from the structure of living cells and economics. Enzymatic numerical P systems(for short, ENP systems) are a variant of NP systems, which have been successfully applied in designing and implementing controllers for mobile robots. Since ENP systems were proved to be Turing universal, there has been much work to simplify the universal systems, where the complexity parameters considered are the number of membranes, the degrees of polynomial production functions or the number of variables used in the *** the number of enzymatic variables, which is essential for ENP systems to reach universality, has not been investigated. Here we consider the problem of searching for the smallest number of enzymatic variables needed for universal ENP systems. We prove that for ENP systems as number acceptors working in the all-parallel or one-parallel mode, one enzymatic variable is sufficient to reach universality; while for the one-parallel ENP systems as number generators, two enzymatic variables are sufficient to reach *** results improve the best known results that the numbers of enzymatic variables are 13 and 52 for the all-parallel and one-parallel systems, respectively.
Canonical correlation analysis (CCA) is one of the most well-known methods to extract features from multi- view data and has attracted much attention in recent years. However, classical CCA is unsupervised and does ...
详细信息
Canonical correlation analysis (CCA) is one of the most well-known methods to extract features from multi- view data and has attracted much attention in recent years. However, classical CCA is unsupervised and does not take discriminant information into account. In this paper, we add discriminant information into CCA by using random cross- view correlations between within-class samples and propose a new method for multi-view dimensionality reduction called canonical random correlation analysis (RCA). In RCA, two approaches for randomly generating cross-view correlation samples are developed on the basis of bootstrap technique. Furthermore, kernel RCA (KRCA) is proposed to extract nonlinear correlations between different views. Experiments on several multi-view data sets show the effectiveness of the proposed methods.
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing...
详细信息
Heterogeneous information Networks(HINs)contain multiple types of nodes and edges;therefore,they can preserve the semantic information and structure *** analysis using an HIN has obvious advantages over a transformati...
详细信息
Heterogeneous information Networks(HINs)contain multiple types of nodes and edges;therefore,they can preserve the semantic information and structure *** analysis using an HIN has obvious advantages over a transformation into a homogenous information network,which can promote the clustering results of different types of *** our study,we applied a Nonnegative Matrix Tri-Factorization(NMTF)in a cluster analysis of multiple metapaths in *** the parameter estimation method of the probability distribution in previous studies,NMTF can obtain several dependent latent variables simultaneously,and each latent variable in NMTF is associated with the cluster of the corresponding node in the *** method is suited to co-clustering leveraging multiple metapaths in HIN,because NMTF is employed for multiple nonnegative matrix factorizations simultaneously in our *** results on the real dataset show that the validity and correctness of our method,and the clustering result are better than that of the existing similar clustering algorithm.
College students majoring in computerscience and software engineering need to master skills for high-quality ***,rich research has shown that both the teaching and learning of high-quality programming are challenging...
详细信息
College students majoring in computerscience and software engineering need to master skills for high-quality ***,rich research has shown that both the teaching and learning of high-quality programming are challenging and deficient in most college education ***,the continuous inspection paradigm has been widely used by developers on social coding sites(e.g.,GitHub)as an important method to ensure the internal quality of massive code *** paper presents a case where continuous inspection is introduced into the classroom setting to improve students’programming *** the study,we first designed a specific continuous inspection process for students’collaborative projects and built an execution environment for the *** then conducted a controlled experiment with 48 students from the same course during two school years to evaluate how the process affects their programming *** results show that continuous inspection can help students in identifying their bad coding habits,mastering a set of good coding rules and significantly reducing the density of code quality issues introduced in the ***,we describe the lessons learned during the study and propose ideas to replicate and improve the process and its execution platform.
暂无评论