Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur...
详细信息
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable cod...
详细信息
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net...
详细信息
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz...
详细信息
To solve the multi-platform user association problem of complex trajectory matching process and high time cost in cross-platform association positioning of instant messaging users, and at the same time make full use o...
详细信息
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot...
详细信息
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot fundamentally solve *** paper provides new insights into coping with the ***,this study summarizes the false-positive problem in the mimic transformation,analyzes its possible harm and the root ***,three properties about the mimic scope are *** on the three properties and security quantification technology,the best mimic component set theory is put forward to solve the false-positive *** are two algorithms,the supplemental method and the subtraction *** best mimic component set obtained by these two algorithms can fundamentally solve the mimic system’s false-positive problem but reduce the cost of mimic *** make up for the lack of previous researches.
The geolocation information in social media user generated text is one of the important bases for inferring users' location. The existing methods often rely on the mentioned Point of Interest (POI) and location In...
详细信息
Zn–Mn aqueous batteries (ZMABs)present potential for grid-scale energy storage with the benefits of low cost,high safety and eco-friendliness [1].Since 1866 (Leclanchéwet cell), we have witnessed the prosperity ...
Zn–Mn aqueous batteries (ZMABs)present potential for grid-scale energy storage with the benefits of low cost,high safety and eco-friendliness [1].Since 1866 (Leclanchéwet cell), we have witnessed the prosperity of ZMABs in the primary battery market and an increasing interest in rechargeable ZMABs.
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi...
详细信息
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln...
详细信息
暂无评论