In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha...
详细信息
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr...
详细信息
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determi...
详细信息
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determination,which is one of the most widely used software in this *** researchers have devoted effort to improve the performance of RELION to satisfy the analysis for the ever-increasing volume of *** this paper,we focus on performance analysis of the most time-consuming computation steps in RELION and identify their performance bottlenecks for specific *** propose several performance optimization strategies to improve the overall performance of RELION,including optimization of expectation step,parallelization of maximization step,accelerating the computation of symmetries,and memory affinity *** experiment results show that our proposed optimizations achieve significant speedups of RELION across representative *** addition,we perform roofline model analysis to understand the effectiveness of our optimizations.
As a gateway to handle all intranet terminal traffic, SOHO router plays an important role in the network. In this paper, we introduced the security threats faced by SOHO routers, and on this basis, we propose a packet...
详细信息
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i...
详细信息
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin...
详细信息
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie...
详细信息
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running...
详细信息
It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m...
详细信息
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome...
详细信息
暂无评论