Based on the Regional Specialized Meteorological Center(RSMC)Tokyo-Typhoon Center best-track data and the NCEP-NCAR reanalysis dataset,extratropical transitioning(ET)tropical cyclones(ETCs)over the western North Pacif...Based on the Regional Specialized Meteorological Center(RSMC)Tokyo-Typhoon Center best-track data and the NCEP-NCAR reanalysis dataset,extratropical transitioning(ET)tropical cyclones(ETCs)over the western North Pacific(WNP)during 1951–2021 are classified into six clusters using the fuzzy c-means clustering method(FCM)according to their track patterns.The characteristics of the six hard-clustered ETCs with the highest membership coefficient are shown.Most tropical cyclones(TCs)that were assigned to clusters C2,C5,and C6 made landfall over eastern Asian countries,which severely threatened these regions.Among landfalling TCs,93.2%completed their ET after landfall,whereas 39.8%of ETCs completed their transition within one day.The frequency of ETCs over the WNP has decreased in the past four decades,wherein cluster C5 demonstrated a significant decrease on both interannual and interdecadal timescales with the expansion and intensification of the western Pacific subtropical high(WPSH).This large-scale circulation pattern is favorable for C2 and causes it to become the dominant track pattern,owning to it containing the largest number of intensifying ETCs among the six clusters,a number that has increased insignificantly over the past four decades.The surface roughness variation and three-dimensional background circulation led to C5 containing the maximum number of landfalling TCs and a minimum number of intensifying ETCs.Our results will facilitate a better understanding of the spatiotemporal distributions of ET events and associated environment background fields,which will benefit the effective monitoring of these events over the WNP.展开更多
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim...Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher security.Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack implementation.To overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)algorithm.This approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear problems.This limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to detect.To verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat model.Based on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack methods.We also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering techniques.The experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior stealthiness.Furthermore,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.展开更多
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning me...While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.展开更多
Currently,cigarette smoke(CS)remains a major contributor to disease morbidity and mortality.CS can be divided into cigarette mainstream smoke(CMS)and side-stream smoke,depending on where it is produced by burning toba...Currently,cigarette smoke(CS)remains a major contributor to disease morbidity and mortality.CS can be divided into cigarette mainstream smoke(CMS)and side-stream smoke,depending on where it is produced by burning tobacco^([1]).CMS is inhaled by smokers from the filter end during cigarette combustion and is strongly associated with the development of several diseases^([2-4]).展开更多
BACKGROUND Despite advances in research on psychopathology and social media use,no comprehensive review has examined published papers on this type of research and considered how it was affected by the coronavirus dise...BACKGROUND Despite advances in research on psychopathology and social media use,no comprehensive review has examined published papers on this type of research and considered how it was affected by the coronavirus disease 2019(COVID-19)outbreak.AIM To explore the status of research on psychopathology and social media use before and after the COVID-19 outbreak.METHODS We used Bibliometrix(an R software package)to conduct a scientometric analysis of 4588 relevant studies drawn from the Web of Science Core Collection,PubMed,and Scopus databases.RESULTS Such research output was scarce before COVID-19,but exploded after the pandemic with the publication of a number of high-impact articles.Key authors and institutions,located primarily in developed countries,maintained their core positions,largely uninfluenced by COVID-19;however,research production and collaboration in developing countries increased significantly after COVID-19.Through the analysis of keywords,we identified commonly used methods in this field,together with specific populations,psychopathological conditions,and clinical treatments.Researchers have devoted increasing attention to gender differences in psychopathological states and linked COVID-19 strongly to depression,with depression detection becoming a new trend.Developments in research on psychopathology and social media use are unbalanced and uncoordinated across countries/regions,and more indepth clinical studies should be conducted in the future.CONCLUSION After COVID-19,there was an increased level of concern about mental health issues and a changing emphasis on social media use and the impact of public health emergencies.展开更多
BACKGROUND Lung cancer bone metastasis(LCBM)is a disease with a poor prognosis,high risk and large patient population.Although considerable scientific output has accumulated on LCBM,problems have emerged,such as confu...BACKGROUND Lung cancer bone metastasis(LCBM)is a disease with a poor prognosis,high risk and large patient population.Although considerable scientific output has accumulated on LCBM,problems have emerged,such as confusing research structures.AIM To organize the research frontiers and body of knowledge of the studies on LCBM from the last 22 years according to their basic research and translation,clinical treatment,and clinical diagnosis to provide a reference for the development of new LCBM clinical and basic research.METHODS We used tools,including R,VOSviewer and CiteSpace software,to measure and visualize the keywords and other metrics of 1903 articles from the Web of Science Core Collection.We also performed enrichment and proteinprotein interaction analyses of gene expression datasets from LCBM cases worldwide.RESULTS Research on LCBM has received extensive attention from scholars worldwide over the last 20 years.Targeted therapies and immunotherapies have evolved into the mainstream basic and clinical research directions.The basic aspects of drug resistance mechanisms and parathyroid hormone-related protein may provide new ideas for mechanistic study and improvements in LCBM prognosis.The produced molecular map showed that ribosomes and focal adhesion are possible pathways that promote LCBM occurrence.CONCLUSION Novel therapies for LCBM face animal testing and drug resistance issues.Future focus should centre on advancing clinical therapies and researching drug resistance mechanisms and ribosome-related pathways.展开更多
The characteristics and causes of a drop in temperature during a cold wave process in the early winter of 2020/2021 were analyzed.The results show that the air temperature at 700-600 hPa over China was firstly and mos...The characteristics and causes of a drop in temperature during a cold wave process in the early winter of 2020/2021 were analyzed.The results show that the air temperature at 700-600 hPa over China was firstly and mostly influenced by the cold wave process,and then the cold air gradually extended to the lower layer,causing the most severe cooling in North China and its nearby areas.During the cold wave,the longitude of the upper-level jet over the Chinese mainland was larger;the Ural blocking high and the East Asian trough were stronger,so that the geopotential height gradient between the two was also significantly larger;the meridional air flow was abnormally strong,which was conducive to the southward transport of cold air from the middle and high latitudes.Results of the diagnostic analysis further show that the outbreak of the cold wave and the negative temperature tendency anomaly in the key area were mainly caused by the meridional temperature horizontal advection anomaly,while the temperature rise accompanied by abnormal air subsidence compensated for the abnormal decrease in temperature,which was conducive to the gradual rise of temperature in the key area.展开更多
The deep learning model is overfitted and the accuracy of the test set is reduced when the deep learning model is trained in the network intrusion detection parameters, due to the traditional loss function convergence...The deep learning model is overfitted and the accuracy of the test set is reduced when the deep learning model is trained in the network intrusion detection parameters, due to the traditional loss function convergence problem. Firstly, we utilize a network model architecture combining Gelu activation function and deep neural network;Secondly, the cross-entropy loss function is improved to a weighted cross entropy loss function, and at last it is applied to intrusion detection to improve the accuracy of intrusion detection. In order to compare the effect of the experiment, the KDDcup99 data set, which is commonly used in intrusion detection, is selected as the experimental data and use accuracy, precision, recall and F1-score as evaluation parameters. The experimental results show that the model using the weighted cross-entropy loss function combined with the Gelu activation function under the deep neural network architecture improves the evaluation parameters by about 2% compared with the ordinary cross-entropy loss function model. Experiments prove that the weighted cross-entropy loss function can enhance the model’s ability to discriminate samples.展开更多
A new method of data access which can effectively resolve the problem of high speed and real time reading data of nuclear instrument in small storage space is introduced. This method applies the data storage mode of ...A new method of data access which can effectively resolve the problem of high speed and real time reading data of nuclear instrument in small storage space is introduced. This method applies the data storage mode of “linked list” to the system of Micro Control Unit (MCU), and realizes the pointer access of nuclear data on the small storage space of MCU. Experimental results show that this method can solve some problems of traditional data storage method, which has the advantages of simple program design, stable performance, accurate data, strong repeatability, saving storage space and so on.展开更多
In this study, a three-dimensional mesoscale model was used to numerically simulate the well-known "98.7" heavy rainfall event that affected the Yangtze Valley in July 1998. Two experiments were conducted to...In this study, a three-dimensional mesoscale model was used to numerically simulate the well-known "98.7" heavy rainfall event that affected the Yangtze Valley in July 1998. Two experiments were conducted to analyze the impact of moist processes on the development of meso-β scale vortices(MβV) and their triggering by mesoscale wind perturbation(MWP). In the experiment in which the latent heat feedback(LHF) scheme was switched off, a stable low-level col field(i.e., saddle field—a region between two lows and two highs in the isobaric surface) formed, and the MWP triggered a weak MβV. However, when the LHF scheme was switched on as the MWP was introduced into the model, the MβV developed quickly and intense rainfall and a mesoscale low-level jet(mLLJ) were generated. The thickness of the air column and average temperature between 400 and 700 hPa decreased without the feedback of latent heat, whereas they increased quickly when the LHF scheme was switched on, with the air pressure falling at low levels but rising at upper levels. A schematic representation of the positive feedbacks among the mesoscale vortex, rainfall, and mLLJ shows that in the initial stage of the MβV, the MWP triggers light rainfall and the latent heat occurs at low levels, which leads to weak convergence and ageostrophic winds. In the mature stage of the MβV, convection extends to the middle-to-upper levels, resulting in an increase in the average temperature and a stretching of the air column. A low-level cyclonic circulation forms under the effect of Coriolis torque, and the m LLJ forms to the southeast of the MβV.展开更多
基金supported by the National Natural Science Foundation of China(Grant Nos.42075053 and 41975128)。
文摘Based on the Regional Specialized Meteorological Center(RSMC)Tokyo-Typhoon Center best-track data and the NCEP-NCAR reanalysis dataset,extratropical transitioning(ET)tropical cyclones(ETCs)over the western North Pacific(WNP)during 1951–2021 are classified into six clusters using the fuzzy c-means clustering method(FCM)according to their track patterns.The characteristics of the six hard-clustered ETCs with the highest membership coefficient are shown.Most tropical cyclones(TCs)that were assigned to clusters C2,C5,and C6 made landfall over eastern Asian countries,which severely threatened these regions.Among landfalling TCs,93.2%completed their ET after landfall,whereas 39.8%of ETCs completed their transition within one day.The frequency of ETCs over the WNP has decreased in the past four decades,wherein cluster C5 demonstrated a significant decrease on both interannual and interdecadal timescales with the expansion and intensification of the western Pacific subtropical high(WPSH).This large-scale circulation pattern is favorable for C2 and causes it to become the dominant track pattern,owning to it containing the largest number of intensifying ETCs among the six clusters,a number that has increased insignificantly over the past four decades.The surface roughness variation and three-dimensional background circulation led to C5 containing the maximum number of landfalling TCs and a minimum number of intensifying ETCs.Our results will facilitate a better understanding of the spatiotemporal distributions of ET events and associated environment background fields,which will benefit the effective monitoring of these events over the WNP.
基金funded by National Natural Science Foundation of China under Grant No.61806171The Sichuan University of Science&Engineering Talent Project under Grant No.2021RC15Sichuan University of Science&Engineering Graduate Student Innovation Fund under Grant No.Y2023115,The Scientific Research and Innovation Team Program of Sichuan University of Science and Technology under Grant No.SUSE652A006.
文摘Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work efficiency.Nonethe-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security concerns.We aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher security.Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack implementation.To overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)algorithm.This approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear problems.This limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to detect.To verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat model.Based on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack methods.We also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering techniques.The experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior stealthiness.Furthermore,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.
基金This research was funded by National Natural Science Foundation of China under Grant No.61806171Sichuan University of Science&Engineering Talent Project under Grant No.2021RC15+2 种基金Open Fund Project of Key Laboratory for Non-Destructive Testing and Engineering Computer of Sichuan Province Universities on Bridge Inspection and Engineering under Grant No.2022QYJ06Sichuan University of Science&Engineering Graduate Student Innovation Fund under Grant No.Y2023115The Scientific Research and Innovation Team Program of Sichuan University of Science and Technology under Grant No.SUSE652A006.
文摘While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.
基金supported by the National Natural Science Foundation of China(Grant No.82060638)Academic and Technical Leaders of Major Disciplines in Jiangxi Province(Grant No.20194BCJ22032)
文摘Currently,cigarette smoke(CS)remains a major contributor to disease morbidity and mortality.CS can be divided into cigarette mainstream smoke(CMS)and side-stream smoke,depending on where it is produced by burning tobacco^([1]).CMS is inhaled by smokers from the filter end during cigarette combustion and is strongly associated with the development of several diseases^([2-4]).
基金Supported by Guangxi Higher Education Undergraduate Teaching Reform Project,No.2022JGA146Guangxi Educational Science Planning Key Project,No.2022ZJY2791+1 种基金Guangxi Medical University Key Textbook Construction Project,No.Gxmuzdjc2223Guangxi Medical High-Level Key Talents Training“139”Program.
文摘BACKGROUND Despite advances in research on psychopathology and social media use,no comprehensive review has examined published papers on this type of research and considered how it was affected by the coronavirus disease 2019(COVID-19)outbreak.AIM To explore the status of research on psychopathology and social media use before and after the COVID-19 outbreak.METHODS We used Bibliometrix(an R software package)to conduct a scientometric analysis of 4588 relevant studies drawn from the Web of Science Core Collection,PubMed,and Scopus databases.RESULTS Such research output was scarce before COVID-19,but exploded after the pandemic with the publication of a number of high-impact articles.Key authors and institutions,located primarily in developed countries,maintained their core positions,largely uninfluenced by COVID-19;however,research production and collaboration in developing countries increased significantly after COVID-19.Through the analysis of keywords,we identified commonly used methods in this field,together with specific populations,psychopathological conditions,and clinical treatments.Researchers have devoted increasing attention to gender differences in psychopathological states and linked COVID-19 strongly to depression,with depression detection becoming a new trend.Developments in research on psychopathology and social media use are unbalanced and uncoordinated across countries/regions,and more indepth clinical studies should be conducted in the future.CONCLUSION After COVID-19,there was an increased level of concern about mental health issues and a changing emphasis on social media use and the impact of public health emergencies.
文摘BACKGROUND Lung cancer bone metastasis(LCBM)is a disease with a poor prognosis,high risk and large patient population.Although considerable scientific output has accumulated on LCBM,problems have emerged,such as confusing research structures.AIM To organize the research frontiers and body of knowledge of the studies on LCBM from the last 22 years according to their basic research and translation,clinical treatment,and clinical diagnosis to provide a reference for the development of new LCBM clinical and basic research.METHODS We used tools,including R,VOSviewer and CiteSpace software,to measure and visualize the keywords and other metrics of 1903 articles from the Web of Science Core Collection.We also performed enrichment and proteinprotein interaction analyses of gene expression datasets from LCBM cases worldwide.RESULTS Research on LCBM has received extensive attention from scholars worldwide over the last 20 years.Targeted therapies and immunotherapies have evolved into the mainstream basic and clinical research directions.The basic aspects of drug resistance mechanisms and parathyroid hormone-related protein may provide new ideas for mechanistic study and improvements in LCBM prognosis.The produced molecular map showed that ribosomes and focal adhesion are possible pathways that promote LCBM occurrence.CONCLUSION Novel therapies for LCBM face animal testing and drug resistance issues.Future focus should centre on advancing clinical therapies and researching drug resistance mechanisms and ribosome-related pathways.
基金Supported by the National Natural Science Foundation of China(42075053,41275099).
文摘The characteristics and causes of a drop in temperature during a cold wave process in the early winter of 2020/2021 were analyzed.The results show that the air temperature at 700-600 hPa over China was firstly and mostly influenced by the cold wave process,and then the cold air gradually extended to the lower layer,causing the most severe cooling in North China and its nearby areas.During the cold wave,the longitude of the upper-level jet over the Chinese mainland was larger;the Ural blocking high and the East Asian trough were stronger,so that the geopotential height gradient between the two was also significantly larger;the meridional air flow was abnormally strong,which was conducive to the southward transport of cold air from the middle and high latitudes.Results of the diagnostic analysis further show that the outbreak of the cold wave and the negative temperature tendency anomaly in the key area were mainly caused by the meridional temperature horizontal advection anomaly,while the temperature rise accompanied by abnormal air subsidence compensated for the abnormal decrease in temperature,which was conducive to the gradual rise of temperature in the key area.
文摘The deep learning model is overfitted and the accuracy of the test set is reduced when the deep learning model is trained in the network intrusion detection parameters, due to the traditional loss function convergence problem. Firstly, we utilize a network model architecture combining Gelu activation function and deep neural network;Secondly, the cross-entropy loss function is improved to a weighted cross entropy loss function, and at last it is applied to intrusion detection to improve the accuracy of intrusion detection. In order to compare the effect of the experiment, the KDDcup99 data set, which is commonly used in intrusion detection, is selected as the experimental data and use accuracy, precision, recall and F1-score as evaluation parameters. The experimental results show that the model using the weighted cross-entropy loss function combined with the Gelu activation function under the deep neural network architecture improves the evaluation parameters by about 2% compared with the ordinary cross-entropy loss function model. Experiments prove that the weighted cross-entropy loss function can enhance the model’s ability to discriminate samples.
文摘A new method of data access which can effectively resolve the problem of high speed and real time reading data of nuclear instrument in small storage space is introduced. This method applies the data storage mode of “linked list” to the system of Micro Control Unit (MCU), and realizes the pointer access of nuclear data on the small storage space of MCU. Experimental results show that this method can solve some problems of traditional data storage method, which has the advantages of simple program design, stable performance, accurate data, strong repeatability, saving storage space and so on.
基金supported by the National Grand Fundamental Research 973 Program of China (Grant No.2015CB452800)the National Natural Science Foundation of China (Grant Nos.41275099,41205073 and 41275012)the Natural Science Foundation of the Nanjing Joint Center of Atmospheric Research (Grant No.NJCAR2016MS02)
文摘In this study, a three-dimensional mesoscale model was used to numerically simulate the well-known "98.7" heavy rainfall event that affected the Yangtze Valley in July 1998. Two experiments were conducted to analyze the impact of moist processes on the development of meso-β scale vortices(MβV) and their triggering by mesoscale wind perturbation(MWP). In the experiment in which the latent heat feedback(LHF) scheme was switched off, a stable low-level col field(i.e., saddle field—a region between two lows and two highs in the isobaric surface) formed, and the MWP triggered a weak MβV. However, when the LHF scheme was switched on as the MWP was introduced into the model, the MβV developed quickly and intense rainfall and a mesoscale low-level jet(mLLJ) were generated. The thickness of the air column and average temperature between 400 and 700 hPa decreased without the feedback of latent heat, whereas they increased quickly when the LHF scheme was switched on, with the air pressure falling at low levels but rising at upper levels. A schematic representation of the positive feedbacks among the mesoscale vortex, rainfall, and mLLJ shows that in the initial stage of the MβV, the MWP triggers light rainfall and the latent heat occurs at low levels, which leads to weak convergence and ageostrophic winds. In the mature stage of the MβV, convection extends to the middle-to-upper levels, resulting in an increase in the average temperature and a stretching of the air column. A low-level cyclonic circulation forms under the effect of Coriolis torque, and the m LLJ forms to the southeast of the MβV.