With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin...
详细信息
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine...
详细信息
IP geolocation technology can estimate or determine the geographical location of terminal device through IP address, which is an important basis for location-based network services. The existing IP geolocation methods...
详细信息
As quantum computing continues to advance, the complexity of control systems for superconducting qubits also increases. This paper presents a genetic algorithm (GA) approach for optimizing the control systems in quant...
详细信息
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability...
详细信息
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
详细信息
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in...
详细信息
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d...
详细信息
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem...
详细信息
Directed greybox fuzzing directs fuzzers to specified code areas and has gained great achievements in 1-day vulnerability detection. However, existing directed graybox fuzzers fail to generate the crash sample even if...
详细信息
暂无评论