In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog...
详细信息
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection *** intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false ***,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)***,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency *** feature vector is then used as the learning target for the neural *** types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection *** results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged...
详细信息
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged in this *** methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-levelfeatures of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites,temporal features can exhibit significant variations due to changes in communication links and transmissionquality. Additionally, partial spatial features can change due to reasons like data reordering and *** with these challenges, identifying encrypted traffic solely based on packet byte-level features is significantlydifficult. To address this, we propose a universal packet-level encrypted traffic identification method, ComboPacket. This method utilizes convolutional neural networks to extract deep features of the current packet andits contextual information and employs spatial and channel attention mechanisms to select and locate effectivefeatures. Experimental data shows that Combo Packet can effectively distinguish between encrypted traffic servicecategories (e.g., File Transfer Protocol, FTP, and Peer-to-Peer, P2P) and encrypted traffic application categories (e.g.,BitTorrent and Skype). Validated on the ISCX VPN-non VPN dataset, it achieves classification accuracies of 97.0%and 97.1% for service and application categories, respectively. It also provides shorter training times and higherrecognition speeds. The performance and recognition capabilities of Combo Packet are significantly superior tothe existing classification methods mentioned.
The oxygen evolution reaction(OER) is crucial for the electrocatalytic water electrolysis into oxygen and hydrogen,but the fourelectron transfer process hinders the OER *** realize the highly efficient water splitti...
详细信息
The oxygen evolution reaction(OER) is crucial for the electrocatalytic water electrolysis into oxygen and hydrogen,but the fourelectron transfer process hinders the OER *** realize the highly efficient water splitting,the nonprecious metal-based electrodes that can optimize the adsorption energy of intermediates and generate H2with low overpotential and robust stability are ***,we report a surface modification strategy to grow the trimetallic FeCoNi hydroxide on the amine linkersgrafted carbon cloth(CC-NH2@FeCoNi) by ***-NH2@FeCoNi possesses a superhydrophilic/superaerophobic surface,which could significantly enhance the mass transfer,and meanwhile promote the in situ generation of MOOH active ***,the superhydrophilic surface could facilitate the adsorption of abundant OH-ions,and repel the Cl-ions via electrostatic repulsive force during seawater ***,compared with the CC@FeCoNi that grown on the pure CC(320 mV),the CC-NH2@FeCoNi needs an obviously smaller overpotential of 270 mV to achieve a current density of 100 mA cm-2,and meanwhile it exhibits a superior durability for 100 h at a current density of 200 m A cm-2in both alkaline water and *** strategy could be even applied universally in the preparation of other nonprecious metal hydroxides for efficient OER catalysis.
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we...
详细信息
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some well-known schemes, including the full-domain hash(FDH) signature(Eurocrypt1996) and the Boneh-Franklin identity-based encryption(IBE) scheme(Crypto 2001), are provably secure under CPReds;(2) we prove that a CPRed associated with an instance-extraction algorithm implies a reduction in the quantum ROM(QROM). This unifies several recent results, including the security of the Gentry-Peikert-Vaikuntanathan IBE scheme by Zhandry(Crypto 2012) and the key encapsulation mechanism(KEM) variants using the Fujisaki-Okamoto transform by Jiang et al.(Crypto 2018) in the ***, we show that CPReds are incomparable to non-programming reductions(NPReds) and randomly-programming reductions(RPReds) formalized by Fischlin et al.(Asiacrypt 2010).
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net...
详细信息
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of network traffic tracing,current watermarking methods cannot work efficiently due to the dependence on specific protocols,demand for large quantities of packets,weakness on resisting network channel interferences and so *** this end,we propose a robust network flow watermarking method based on IP packet sequence,called as *** is designed to utilize the packet sequence as watermark carrier with IP identification field which is insensitive to time jitter and suitable for all IP based *** enhance the robustness against packet loss and packet reordering,the detection sequence set is constructed in terms of the variation range of packet sequence,correcting the possible errors caused by the network *** improve the detection accuracy,the long watermark information is divided into several short sequences to embed in turn and assembled during *** a large number of experiments on the Internet,the overall detection rate and accuracy of IP-Pealing reach 99.91% and 99.42%*** comparison with the classical network flow watermarking methods,such as PROFW,IBW,ICBW,WBIPD and SBTT,the accuracy of IP-Pealing is increased by 13.70% to 54.00%.
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation ...
详细信息
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation is a hot research ***,the existing IP geolocation algorithms cannot effectively utilize the distance characteristics of the delay,and the nodes’connection relation,resulting in high geolocation *** is challenging to obtain the mapping between delay,nodes’connection relation,and geographical *** on the idea of network representation learning,we propose a representation learning model for IP nodes(IP2vec for short)and apply it to street-level IP ***2vec model vectorizes nodes according to the connection relation and delay between nodes so that the IP vectors can reflect the distance and topological proximity between IP *** steps of the street-level IP geolocation algorithm based on IP2vec model are as follows:Firstly,we measure landmarks and target IP to obtain delay and path information to construct the network ***,we use the IP2vec model to obtain the IP vectors from the network ***,we train a neural network to fit the mapping relation between vectors and locations of ***,the vector of target IP is fed into the neural network to obtain the geographical location of target *** algorithm can accurately infer geographical locations of target IPs based on delay and topological proximity embedded in the IP *** cross-validation experimental results on 10023 target IPs in New York,Beijing,Hong Kong,and Zhengzhou demonstrate that the proposed algorithm can achieve street-level *** with the existing algorithms such as Hop-Hot,IP-geolocater and SLG,the mean geolocation error of the proposed algorithm is reduced by 33%,39%,and 51%,respectively.
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly mo...
详细信息
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly more challenging. Hence, this study proposes a multi-modal perception-based solution for an elderly safety monitoring recognition system. The proposed approach introduces a recognition algorithm based on multi-modal cross-attention mechanism, innovatively incorporating complex information such as scene context and voice to achieve more accurate behavior recognition. By fusing four modalities, namely image, skeleton, sensor data, and audio, we further enhance the accuracy of recognition. Additionally, we introduce a novel human-robot interaction mode, where the system associates directly recognized intentions with robotic actions without explicit commands, delivering a more natural and efficient elderly assistance paradigm. This mode not only elevates the level of safety monitoring for the elderly but also facilitates a more natural and efficient caregiving approach. Experimental results demonstrate significant improvement in recognition accuracy for 11 typical elderly behaviors compared to existing methods.
Quantum communication is rapidly developing and is gradually being commercialized due to its technological maturity. Establishing dense communication links among multiple users in a scalable and efficient way is of gr...
详细信息
Quantum communication is rapidly developing and is gradually being commercialized due to its technological maturity. Establishing dense communication links among multiple users in a scalable and efficient way is of great significance for realizing a large-scale quantum communication network. Here, we propose a novel scheme to construct a fully connected polarizationentangled network, utilizing the engineering of spontaneous four-wave mixings(SFWMs) and a path-polarization converter. It does not require active optical switches which limit the communication speed, or trusted nodes which lead to potential security risks. The required frequency channels in the network grow linearly with the number of users. We experimentally demonstrate a six-user fully connected network with on-chip SFWM processes motivated by four pumps. Each user in the network receives a frequency channel, and all fifteen connections between the users are implemented simultaneously. Our work opens up a promising scheme to efficiently construct fully connected large-scale networks.
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed n...
详细信息
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed natural fibers such as cotton, hemp, silk and wool to make fabrics(Fig. 1a). Chinese ancestors had mastered the art of natural fiber weaving as early as the Neolithic *** thousand years ago, people were already familiar with and adept at techniques for spinning natural fibers [1].
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic str...
详细信息
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic structure based on experimental data,and the impact of the structure on junctions’properties can be investigated by combining different analysis *** order to build a physical model of the atomic structure and then analyze the factors that affect its performance,this paper briefly reviews the development and evolution of the RMC *** also summarizes the modeling process and structural feature analysis of the Josephson junction in combination with different feature extraction techniques for electrical characterization ***,the obstacles and potential directions of Josephson junction modeling,which serves as the theoretical foundation for the production of superconducting quantum devices at the atomic level,are discussed.
暂无评论