This research explores basketball match predictions within the field of sports analytics utilized Deep Learning (DL) technique to analyse the outcomes of National Basketball Association (NBA) games based on player per...
详细信息
QR code is a typical two-dimensional code tag consisting of square symbols, which is widely used in social life due to the advantages of high readability and large storage capacity. However, its security performance i...
详细信息
Artificial bee colony optimization algorithm (ABC) is an optimization algorithm based on swarm intelligence which is obtained by observing the behavior of bees looking for nectar and sharing food information with bees...
详细信息
In recent years, several normalization methods have been proposed in order to train neural networks, including batch normalization, layer normalization, weight normalization, and group normalization. However, it does ...
详细信息
Network protocol software is usually characterized by complicated functions and a vast state *** this type of program,a massive number of stateful variables that are used to represent the evolution of the states and s...
详细信息
Network protocol software is usually characterized by complicated functions and a vast state *** this type of program,a massive number of stateful variables that are used to represent the evolution of the states and store some information about the sessions are prone to potentialflaws caused by violations of protocol specification requirements and program *** such variables is significant in discovering and exploiting vulnerabilities in protocol software,and still needs massive manual *** this paper,we propose a novel method that could automatically discover the use of stateful variables in network protocol *** core idea is that a stateful variable features information of the communication entities and the software states,so it will exist in the form of a global or static variable during program *** on recording and replaying a protocol program’s execution,varieties of variables in the life cycle can be tracked with the technique of dynamic *** draw up some rules from multiple dimensions by taking full advantage of the existing vulnerability knowledge to determine whether the data stored in critical memory areas have stateful *** also implement a prototype system that can discover stateful variables automatically and then perform it on nine programs in Pro FuzzBench and two complex real-world software *** the help of available open-source code,the evaluation results show that the average true positive rate(TPR)can reach 82%and the average precision can be approximately up to 96%.
The pharmaceutical industry is paying more attention to medicinal plants since they are less likely to cause undesirable responses and are less expensive than current medicines. These features have attracted researche...
详细信息
Large volumes of manufacturing data may now be collected because to the growing popularity of smart Industry 4.0. Product quality may be predicted from manufacturing data acquired during production using machine learn...
详细信息
Energy preservation in wireless sensor network (WSN) is vital for prolonging the network lifetime as sensors have stringent energy constraints. Reducing energy consumption is an uphill task, and process of clustering ...
详细信息
Rapid advancements in wireless communication have led to a dramatic upsurge in data volumes within mobile edge networks. These substantial data volumes offer opportunities for training Artificial Intelligence-Generate...
详细信息
As the Internet of Things (IoT) continues to evolve, smart devices increasingly depend on edge computing for services characterized by low latency and high efficiency. The rapid proliferation of smart devices and the ...
详细信息
暂无评论