期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
An effector of Erysiphe necator translocates to chloroplasts and plasma membrane to suppress host immunity in grapevine
1
作者 Bo Mu Zhaolin Teng +4 位作者 Ruixin Tang Mengjiao Lu jinfu chen Xiangnan Xu Ying-Qiang Wen 《Horticulture Research》 SCIE CSCD 2023年第9期207-219,共13页
The powdery mildew(Erysiphe necator)is a prevalent pathogen hampering grapevine growth in the vineyard.An arsenal of candidate secreted effector proteins(CSEPs)was encoded in the E.necator genome,but it is largely unc... The powdery mildew(Erysiphe necator)is a prevalent pathogen hampering grapevine growth in the vineyard.An arsenal of candidate secreted effector proteins(CSEPs)was encoded in the E.necator genome,but it is largely unclear what role CSEPs plays during the E.necator infection.In the present study,we identified a secreted effector CSEP080 of E.necator,which was located in plant chloroplasts and plasma membrane.Transient expressing CSEP080 promotes plant photosynthesis and inhibits INF1-induced cell death in tobacco leaves.We found that CSEP080 was a necessary effector for the E.necator pathogenicity,which interacted with grapevine chloroplast protein VviB6f(cytochrome b6-f complex iron–sulfur subunit),affecting plant photosynthesis.Transient silencing VviB6f increased the plant hydrogen peroxide production,and the plant resistance to powdery mildew.In addition,CSEP080 manipulated the VviPE(pectinesterase)to promote pectin degradation.Our results demonstrated the molecular mechanisms that an effector of E.necator translocates to host chloroplasts and plasma membrane,which suppresses with the grapevine immunity system by targeting the chloroplast protein VviB6f to suppress hydrogen peroxide accumulation and manipulating VviPE to promote pectin degradation. 展开更多
关键词 immunity ERYSIPHE expressing
下载PDF
An Effective Long String Searching Algorithm towards Component Security Testing 被引量:2
2
作者 jinfu chen Lili Zhu +4 位作者 Zhibin Xie Michael Omari Hilary Ackah-Arthur Saihua Cai Rubing Huang 《China Communications》 SCIE CSCD 2016年第11期153-169,共17页
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t... In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing. 展开更多
关键词 搜索算法 安全测试 面向构件 测试组件 字符串 搜索过程 搜索方法 实验分析
下载PDF
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
3
作者 Jin Li jinfu chen +5 位作者 Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie chen Zufa Zhang 《China Communications》 SCIE CSCD 2018年第2期190-208,共19页
Software vulnerability mining is an important way to detect whether there are some loopholes existing in the software, and also is an important way to ensure the security of information systems. With the rapid develop... Software vulnerability mining is an important way to detect whether there are some loopholes existing in the software, and also is an important way to ensure the security of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively detect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the commonly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of evaluation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Finally, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guidance to aid the selection of the most appropriate and effective method or tools in vulnerability detection activity. 展开更多
关键词 测试框架 采矿方法 评估方法 度量标准 危险 集成 软件检测 信息系统
下载PDF
The heat and work of quantum thermodynamic processes with quantum coherence
4
作者 苏山河 陈劲夫 +2 位作者 马宇翰 陈金灿 孙昌璞 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第6期195-202,共8页
Energy is often partitioned into heat and work by two independent paths corresponding to the change in the eigenenergies or the probability distributions of a quantum system. The discrepancies of the heat and work for... Energy is often partitioned into heat and work by two independent paths corresponding to the change in the eigenenergies or the probability distributions of a quantum system. The discrepancies of the heat and work for various quantum thermodynamic processes have not been well characterized in literature. Here we show how the work in quantum machines is differentially related to the isochoric, isothermal, and adiabatic processes. We prove that the energy exchanges during the quantum isochoric and isothermal processes are simply depending on the change in the eigenenergies or the probability distributions. However, for a time-dependent system in a non-adiabatic quantum evolution, the transitions between the different quantum states representing the quantum coherence can affect the essential thermodynamic properties, and thus the general definitions of the heat and work should be clarified with respect to the microscopic generic time-dependent system. By integrating the coherence effects in the exactly-solvable dynamics of quantum-spin precession, the internal energy is rigorously transferred as the work in the thermodynamic adiabatic process. The present study demonstrates that the quantum adiabatic process is sufficient but not necessary for the thermodynamic adiabatic process. 展开更多
关键词 heat and work thermodynamic adiabatic process quantum coherence
下载PDF
An Improved String-Searching Algorithm and Its Application in Component Security Testing 被引量:1
5
作者 jinfu chen Saihua Cai +4 位作者 Lili Zhu Yuchi Guo Rubing Huang Xiaolei Zhao Yunqi Sheng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期281-294,共14页
Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keywor... Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches. 展开更多
关键词 component testing security vulnerabilities detection monitor log abnormal information string-searching
原文传递
Worst-Input Mutation Approach to Web Services Vulnerability Testing Based on SOAP Messages 被引量:1
6
作者 jinfu chen Huanhuan Wang +3 位作者 Dave Towey chengying Mao Rubing Huang Yongzhao Zhan 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期429-441,共13页
The growing popularity and application of Web services have led to increased attention regarding the vulnerability of software based on these services. Vulnerability testing examines the trustworthiness and reduces th... The growing popularity and application of Web services have led to increased attention regarding the vulnerability of software based on these services. Vulnerability testing examines the trustworthiness and reduces the security risks of software systems. This paper proposes a worst-input mutation approach for testing Web service vulnerability based on Simple Object Access Protocol (SOAP) messages. Based on characteristics of SOAP messages, the proposed approach uses the farthest neighbor concept to guide generation of the test suite. The corresponding automatic test case generation algorithm, namely, the Test Case generation based on the Farthest Neighbor (TCFN), is also presented. The method involves partitioning the input domain into sub-domains according to the number and type of SOAP message parameters in the TCFN, selecting the candidate test case whose distance is the farthest from all executed test cases, and applying it to test the Web service. We also implement and describe a prototype Web service vulnerability testing tool. The tool was applied to the testing of Web services on the Internet. The experimental results show that the proposed approach can find more vulnerability faults than other related approaches. 展开更多
关键词 security testing Web service vulnerability SOAP message test case generation mutation operator
原文传递
A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features 被引量:1
7
作者 Jinchang Hu jinfu chen +4 位作者 Lin Zhang Yisong Liu Qihao Bao Hilary Ackah-Arthur Chi Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期604-613,共10页
Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source... Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source code features of vulnerabilities to improve vulnerability detection.Notwithstanding the success achieved by these techniques,the existing studies mainly focus on the conceptual description without an accurate definition of vulnerability features.In this study,we introduce a novel and efficient Memory-Related Vulnerability Detection Approach using Vulnerability Features (MRVDAVF).Our framework uses three distinct strategies to improve vulnerability detection.In the first stage,we introduce an improved Control Flow Graph (CFG) and Pointer-related Control Flow Graph (PCFG) to describe the features of some common vulnerabilities,including memory leak,doublefree,and use-after-free.Afterward,two algorithms,namely Vulnerability Judging algorithm based on Vulnerability Feature (VJVF) and Feature Judging (FJ) algorithm,are employed to detect memory-related vulnerabilities.Finally,the proposed model is validated using three test cases obtained from Juliet Test Suite.The experimental results show that the proposed approach is feasible and effective. 展开更多
关键词 vulnerability feature Control Flow Graph(CFG) Memory Leak(ML) Double-Free(DF) Use-After-Free(UAF)
原文传递
A software defect prediction method with metric compensation based on feature selection and transfer learning
8
作者 jinfu chen Xiaoli WANG +3 位作者 Saihua CAI Jiaping XU Jingyi chen Haibo chen 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第5期715-731,共17页
Cross-project software defect prediction solves the problem of insufficient training data for traditional defect prediction,and overcomes the challenge of applying models learned from multiple different source project... Cross-project software defect prediction solves the problem of insufficient training data for traditional defect prediction,and overcomes the challenge of applying models learned from multiple different source projects to target project.At the same time,two new problems emerge:(1)too many irrelevant and redundant features in the model training process will affect the training efficiency and thus decrease the prediction accuracy of the model;(2)the distribution of metric values will vary greatly from project to project due to the development environment and other factors,resulting in lower prediction accuracy when the model achieves cross-project prediction.In the proposed method,the Pearson feature selection method is introduced to address data redundancy,and the metric compensation based transfer learning technique is used to address the problem of large differences in data distribution between the source project and target project.In this paper,we propose a software defect prediction method with metric compensation based on feature selection and transfer learning.The experimental results show that the model constructed with this method achieves better results on area under the receiver operating characteristic curve(AUC)value and F1-measure metric. 展开更多
关键词 Defect prediction Feature selection Transfer learning Metric compensation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部