The paper presents a new calculation similarity method. It's called the constrained similarity method. Compared with the traditional cosine similarity and dot product method, the proposed method can maintain the s...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
The effectiveness of modeling contextual information has been empirically shown in numerous computer vision tasks. In this paper, we propose a simple yet efficient augmented fully convolutional network(AugFCN) by aggr...
详细信息
The effectiveness of modeling contextual information has been empirically shown in numerous computer vision tasks. In this paper, we propose a simple yet efficient augmented fully convolutional network(AugFCN) by aggregating content-and position-based object contexts for semantic ***, motivated because each deep feature map is a global, class-wise representation of the input,we first propose an augmented nonlocal interaction(AugNI) to aggregate the global content-based contexts through all feature map interactions. Compared to classical position-wise approaches, AugNI is more efficient. Moreover, to eliminate permutation equivariance and maintain translation equivariance, a learnable,relative position embedding branch is then supportably installed in AugNI to capture the global positionbased contexts. AugFCN is built on a fully convolutional network as the backbone by deploying AugNI before the segmentation head network. Experimental results on two challenging benchmarks verify that AugFCN can achieve a competitive 45.38% mIoU(standard mean intersection over union) and 81.9% mIoU on the ADE20K val set and Cityscapes test set, respectively, with little computational overhead. Additionally, the results of the joint implementation of AugNI and existing context modeling schemes show that AugFCN leads to continuous segmentation improvements in state-of-the-art context modeling. We finally achieve a top performance of 45.43% mIoU on the ADE20K val set and 83.0% mIoU on the Cityscapes test set.
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solve...
详细信息
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solved in the *** this paper,an Unmanned Aerial Vehicles-supported Intelligent Truth Discovery(UAV-ITD)scheme is proposed to obtain truth data at low-cost communications for *** main innovations of the UAV-ITD scheme are as follows:(1)UAV-ITD scheme takes the first step in employing UAV joint Deep Matrix Factorization(DMF)to discover truth data based on the trust mechanism for an Information Elicitation Without Verification(IEWV)problem in MCS.(2)This paper introduces a truth data discovery scheme for the first time that only needs to collect a part of n data samples to infer the data of the entire network with high accuracy,which saves more communication costs than most previous data collection schemes,where they collect n or kn data ***,we conducted extensive experiments to evaluate the UAV-ITD *** results show that compared with previous schemes,our scheme can reduce estimated truth error by 52.25%–96.09%,increase the accuracy of workers’trust evaluation by 0.68–61.82 times,and save recruitment costs by 24.08%–54.15%in truth data discovery.
For the optimisation of video splicing quality in video splicing, an improved optimal stitching video splicing method is proposed. The method first extracts corner points and feature points using the improved FAST alg...
详细信息
We theoretically investigate the photoelectron momentum distributions (PMDs) of the argon atom by using an inhomogeneous polarization-gated pulse. The numerical results show that the symmetry of the PMDs is disrupted ...
详细信息
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism withou...
详细信息
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism without prior ***,endogenous security lacks a scientific and formal definition in industrial ***,firstly we give a formal definition of endogenous security in industrial Internet and propose a new industrial Internet endogenous security architecture with cost ***,the endogenous security innovation mechanism is clearly ***,an improved clone selection algorithm based on federated learning is ***,we analyze the threat model of the industrial Internet identity authentication scenario,and propose cross-domain authentication mechanism based on endogenous key and zero-knowledge *** conduct identity authentication experiments based on two types of blockchains and compare their experimental *** on the experimental analysis,Ethereum alliance blockchain can be used to provide the identity resolution services on the industrial *** of Things Application(IOTA)public blockchain can be used for data aggregation analysis of Internet of Things(IoT)edge ***,we propose three core challenges and solutions of endogenous security in industrial Internet and give future development directions.
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone...
详细信息
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone to serious intra-class and inter-class imbalance problems, which can significantly degrade the classification performance. To address the above issues, we propose the multi-label weighted broad learning system(MLW-BLS) from the perspective of label imbalance weighting and label correlation mining. Further, we propose the multi-label adaptive weighted broad learning system(MLAW-BLS) to adaptively adjust the specific weights and values of labels of MLW-BLS and construct an efficient imbalanced classifier set. Extensive experiments are conducted on various datasets to evaluate the effectiveness of the proposed model, and the results demonstrate its superiority over other advanced approaches.
Nanocatalytic therapy shows great potential for therapeutic ***,therapeutic efficiency is often limited by unsatisfactory enzyme activity and lack of the coordination of immune ***,engineering nanozymes activity enhan...
详细信息
Nanocatalytic therapy shows great potential for therapeutic ***,therapeutic efficiency is often limited by unsatisfactory enzyme activity and lack of the coordination of immune ***,engineering nanozymes activity enhancement while activating immune system will be an effective strategy to achieve efficient tumor ***,we synthesize a DSPE-PEG-FA modified manganese dioxide-based dual-atom nanozyme(MDF),on which iridium and platinum atoms are *** obtained MDF can simultaneously mimic four enzyme activities of catalase,oxidase,peroxidase,and glutathione oxidase,set off a reactive oxygen species(ROS)storm,cause tumor cell *** enzyme activity of MDF can be enhanced by its own photothermal ***,MDF can consume intracellular glutathione and release Mn^(2+),which can prevent generated ROS from consumption and further activate cyclic guanosine monophosphate-adenosine monophosphate synthase-stimulator of interferon genes(cGAS-STING)pathway and promote the secretion of type I interferon,which will help promote dendritic cells maturation,present antigens to T lymphocytes to help kill tumor ***,MDF shows excellent tumor suppressive *** work provides a new paradigm for the field of nanozymes and offers a new reference for involvement of cGAS-STING pathway activation in tumor catalytic therapy.
Thermal stable intermetallic particles are important for the heat resistance of magnesium(Mg)*** this work,many lath-like particles formed in α-Mg grains of a Mg-8Gd-3Sm-0.7Al casting alloy when heat-treated at 873 *...
详细信息
Thermal stable intermetallic particles are important for the heat resistance of magnesium(Mg)*** this work,many lath-like particles formed in α-Mg grains of a Mg-8Gd-3Sm-0.7Al casting alloy when heat-treated at 873 ***-resolution high-angle annular dark field scanning transmission electron microscopy(HAADF-STEM) characterizations indicate that most of them are Mg-containing Al_(2)(Gd,Sm),with the atomic ratio of Mg:Al:(Gd,Sm) being ~1:1:1;a small part of them with relatively wider thickness are long-period stacking ordered(LPSO) phases simultaneously containing both 14H and 18R *** followed common orientation relationships with Mg matrix as those reported in previous *** addition,many Mg laths were observed in the primary blocky Al_(2)(Gd,Sm) phase at grain boundaries,where the atomic ratio of Al:(Gd,Sm) in the Al_(2)(Gd,Sm) matrix was 2:***,density functional theory(DFT) calculations illustrated the detail structure of the re-constructed Mg/Al_(2)RE interface and simultaneously deduced the underlying reason for the re-dissolution of the newly formed Mg-containing Al_(2)(Gd,Sm) plates in α-Mg matrix.
暂无评论