Target threat assessment involves many uncertainties and is a tactical decision assessment problem with incomplete and uncertain information. In traditional target threat assessment, only the influence of the target...
Target threat assessment involves many uncertainties and is a tactical decision assessment problem with incomplete and uncertain information. In traditional target threat assessment, only the influence of the target's state attributes on its threat level is considered, while the target's type is ignored. To address this issue, radar target recognition is incorporated into the threat assessment process, and a method based on radar target recognition is proposed to improve the accuracy of threat assessment by incorporating Radar Cross Section (RCS) feature classifier into a Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). Using simulations, the practicability and viability of the above method are examined.
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious JavaScript, among which static analysis-based methods play an important role because of their high effectiveness and efficiency. However, obfuscation techniques are commonly used in JavaScript, which makes the features extracted by static analysis contain many useless and disguised features, leading to many false positives and false negatives in detection results. In this paper, we propose a novel method to find out the essential features related to the semantics of JavaScript code. Specifically, we develop JS-Revealer, a robust, effective, scalable, and interpretable detector for malicious JavaScript. To test the capabilities of JSRevealer, we conduct comparative experiments with four other state-of-the-art malicious JavaScript detection tools. The experimental results show that JSRevealer has an average F1 of 84.8% on the data obfuscated by different obfuscators, which is 21.6%, 22.3%, 18.7%, and 22.9% higher than the tools CUJO, ZOZZLE, JAST, and JSTAP, respectively. Moreover, the detection results of JSRevealer can be interpreted, which can provide meaningful insights for further security research.
Purpose This paper aims to investigate the role of institutional quality in the relationship between mobile money and financial inclusion among Sub-Saharan Africa (SSA) from 2002 to 2022. Design/methodology/appro...
详细信息
Purpose This paper aims to investigate the role of institutional quality in the relationship between mobile money and financial inclusion among Sub-Saharan Africa (SSA) from 2002 to 2022. Design/methodology/approach The paper uses annual data from SSA on a bundle of four financial inclusion variables, six institutional quality indicators (i.e. rule of law, government effectiveness, control of corruption, voice and accountability, regulatory quality and political stability) and total volume of mobile money transaction in a year. The two-stage least squares regression was used to validate the hypotheses. Also, the random effects model was also used to account for potential unobserved heterogeneity across countries in SSA. Findings The empirical results reveal that institutional quality and mobile money have direct impact on financial inclusion. Also, institutional quality plays a positive and significant contingency role in the relationship between mobile money and financial inclusion. Originality/value The study contributes to financial inclusion theory by providing multi-country empirical evidence to validate the theory in explaining mobile money’s role in expanding financial access. It also highlights the key insight from financial inclusion theory regarding the need for strong governance institutions for technology-enabled inclusion. By examining interactions between mobile money, institutions and financial inclusion across 15 African SSA economies, the study allows for more generalizable conclusions about contextual dependencies.
Large-scale scene point cloud registration with limited overlap is a challenging task due to computational load and constrained data acquisition. To tackle these issues, we propose a point cloud registration method, M...
详细信息
Inverse material design is a cornerstone challenge in materials science, withsignificant applications across many industries. Traditional approaches thatinvert the structure-property (SP) linkage to identify microstru...
详细信息
We consider control design for a nonlinear ordinary differential equation (ODE) and transport partial differential equation (PDE) cascaded system whose propagation speed is spatially-varying. The ODE state is driven b...
详细信息
The microscopic cascade prediction task has wide applications in downstream areas like "rumor detection". Its goal is to forecast the diffusion routines of information cascade within networks. Existing works...
详细信息
—Previous research on code intelligence usually trains a deep learning model on a fixed dataset in an offline manner. However, in real-world scenarios, new code repositories emerge incessantly, and the carried new kn...
详细信息
Action segmentation plays an important role in video understanding, which is implemented by frame-wise action classification. Recent works on action segmentation capture long-term dependencies by increasing temporal c...
详细信息
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning operations to enjoy the benefit of "large model". Despite this promising prospect, the security of pre-trained encoder has not been thoroughly investigated yet, especially when the pre-trained encoder is publicly available for commercial *** this paper, we propose AdvEncoder, the first framework for generating downstream-agnostic universal adversarial examples based on the pre-trained encoder. AdvEncoder aims to construct a universal adversarial perturbation or patch for a set of natural images that can fool all the downstream tasks inheriting the victim pre-trained encoder. Unlike traditional adversarial example works, the pre-trained encoder only outputs feature vectors rather than classification labels. Therefore, we first exploit the high frequency component information of the image to guide the generation of adversarial examples. Then we design a generative attack framework to construct adversarial perturbations/patches by learning the distribution of the attack surrogate dataset to improve their attack success rates and transferability. Our results show that an attacker can successfully attack downstream tasks without knowing either the pre-training dataset or the downstream dataset. We also tailor four defenses for pre-trained encoders, the results of which further prove the attack ability of AdvEncoder. Our codes are available at: https://***/CGCL-codes/AdvEncoder.
暂无评论