期刊文献+
共找到968篇文章
< 1 2 49 >
每页显示 20 50 100
A Method for Head-shoulder Segmentation and Human Facial Feature Positioning 被引量:1
1
作者 HuTianjian CaiDejun 《通信学报》 EI CSCD 北大核心 1998年第5期28-33,共6页
AMethodforHeadshoulderSegmentationandHumanFacialFeaturePositioningHuTianjianCaiDejunDepartmentofElectricala... AMethodforHeadshoulderSegmentationandHumanFacialFeaturePositioningHuTianjianCaiDejunDepartmentofElectricalandInformationEngi... 展开更多
关键词 模型适应 边缘检测 图像编码 头肩分节 人面部特征定位
下载PDF
Learning compact binary code based on multiple heterogeneous features
2
作者 左欣 罗立民 +1 位作者 沈继锋 于化龙 《Journal of Southeast University(English Edition)》 EI CAS 2013年第4期372-378,共7页
A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples ... A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples in the feature space to boost the performance of each weak classifier in the asymmetric boosting framework. Then, the weak classifier based on a novel linear discriminate analysis (LDA) algorithm which is learned from the subspace of heterogeneous features is integrated into the framework. Finally, the proposed method deals with each bit of the code sequentially, which utilizes the samples misclassified in each round in order to learn compact and balanced code. The heterogeneous information from different modalities can be effectively complementary to each other, which leads to much higher performance. The experimental results based on the two public benchmarks demonstrate that this method is superior to many of the state- of-the-art methods. In conclusion, the performance of the retrieval system can be improved with the help of multiple heterogeneous features and the compact hash codes which can be learned by the imbalanced learning method. 展开更多
关键词 hashing code linear discriminate analysis asymmetric boosting heterogeneous feature
下载PDF
A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families
3
作者 Li Li Qing Zhang Youran Kong 《Computers, Materials & Continua》 SCIE EI 2024年第7期801-818,共18页
Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families ... Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants.This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images.The method includes a lightweight classifier and a simulator.The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile,embedded,and other devices.The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model’s performance.This process helps identify model vulnerabilities and security risks,facilitating model enhancement and development.The classifier achieves 98.61%and 97.59%accuracy on the MMCC dataset and Malevis dataset,respectively.The simulator’s generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72±0.42.The classifier’s accuracy for tracing the family of malicious code variants is as high as 90.29%,surpassing that of mainstream neural network models.This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code. 展开更多
关键词 Malicious code variant traceability feature reuse lightweight neural networks code visualization attention mechanism
下载PDF
Lightweight Malicious Code Classification Method Based on Improved Squeeze Net
4
作者 Li Li Youran Kong Qing Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第1期551-567,共17页
With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the netw... With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the network being attacked by malicious code.Therefore,it is important to identify malicious codes on computer systems efficiently.However,most of the existing malicious code detection methods have two problems:(1)The ability of the model to extract features is weak,resulting in poor model performance.(2)The large scale of model data leads to difficulties deploying on devices with limited resources.Therefore,this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet(LCMISNet).In this paper,the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi-size depthwise separable convolution module.The feature slicing module reduces the number of parameters by grouping features.The multi-size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes.In addition,this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet.The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%,respectively.It proves that LCMISNet has a powerful malicious code recognition performance.In addition,compared with other network models,LCMISNet has better performance,and a lower number of parameters and computations. 展开更多
关键词 Lightweight neural network malicious code classification feature slicing feature splicing multi-size depthwise separable convolution
下载PDF
Multi-Index Image Retrieval Hash Algorithm Based on Multi-View Feature Coding
5
作者 Rong Duan Junshan Tan +3 位作者 Jiaohua Qin Xuyu Xiang Yun Tan N.eal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第12期2335-2350,共16页
In recent years,with the massive growth of image data,how to match the image required by users quickly and efficiently becomes a challenge.Compared with single-view feature,multi-view feature is more accurate to descr... In recent years,with the massive growth of image data,how to match the image required by users quickly and efficiently becomes a challenge.Compared with single-view feature,multi-view feature is more accurate to describe image information.The advantages of hash method in reducing data storage and improving efficiency also make us study how to effectively apply to large-scale image retrieval.In this paper,a hash algorithm of multi-index image retrieval based on multi-view feature coding is proposed.By learning the data correlation between different views,this algorithm uses multi-view data with deeper level image semantics to achieve better retrieval results.This algorithm uses a quantitative hash method to generate binary sequences,and uses the hash code generated by the association features to construct database inverted index files,so as to reduce the memory burden and promote the efficient matching.In order to reduce the matching error of hash code and ensure the retrieval accuracy,this algorithm uses inverted multi-index structure instead of single-index structure.Compared with other advanced image retrieval method,this method has better retrieval performance. 展开更多
关键词 HASHING multi-view feature large-scale image retrieval feature coding feature matching
下载PDF
A SEMI-OPEN-LOOP CODING MODE SELECTION ALGORITHM BASED ON EFM AND SELECTED AMR-WB+ FEATURES
6
作者 Hong Ying Zhao Shenghui Kuang Jingming 《Journal of Electronics(China)》 2009年第2期274-278,共5页
To solve the problems of the AMR-WB+(Extended Adaptive Multi-Rate-WideBand) semi-open-loop coding mode selection algorithm,features for ACELP(Algebraic Code Excited Linear Prediction) and TCX(Transform Coded eXcitatio... To solve the problems of the AMR-WB+(Extended Adaptive Multi-Rate-WideBand) semi-open-loop coding mode selection algorithm,features for ACELP(Algebraic Code Excited Linear Prediction) and TCX(Transform Coded eXcitation) classification are investigated.11 classifying features in the AMR-WB+ codec are selected and 2 novel classifying features,i.e.,EFM(Energy Flatness Measurement) and stdEFM(standard deviation of EFM),are proposed.Consequently,a novel semi-open-loop mode selection algorithm based on EFM and selected AMR-WB+ features is proposed.The results of classifying test and listening test show that the performance of the novel algorithm is much better than that of the AMR-WB+ semi-open-loop coding mode selection algorithm. 展开更多
关键词 Speech/Audio Semi-open-loop coding mode selection features selection Energy Flat-ness Measurement(EFM)
下载PDF
Integrated Multi-featured Android Malicious Code Detection
7
作者 Qing Yu Hui Zhao 《国际计算机前沿大会会议论文集》 2019年第1期215-216,共2页
To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection, an Android malicious code detection mechanism is proposed based on integra... To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection, an Android malicious code detection mechanism is proposed based on integrated learning on the basis of dynamic and static detection. Considering three types of Android behavior characteristics, a three-layer hybrid algorithm was proposed. And it combined the malicious code detection based on digital signature to improve the detection efficiency. The digital signature of the known malicious code was extracted to form a malicious sample library. The authority that can reflect Android malicious behavior, API call and the running system call features were also extracted. An expandable hybrid discriminant algorithm was designed for the above three types of features. The algorithm was tested with machine learning method by constructing the optimal classifier suitable for the above features. Finally, the Android malicious code detection system was designed and implemented based on the multi-layer hybrid algorithm. The experimental results show that the system performs Android malicious code detection based on the combination of signature and dynamic and static features. Compared with other related work, the system has better performance in execution efficiency and detection rate. 展开更多
关键词 MALICIOUS CODE feature Optimal algorithm
下载PDF
Coding of Topological Entities in Feature-Based Parametric Modeling System 被引量:1
8
作者 Wu Tao Bai Yuewei Chen Zhuoning Bin Hongzan School of Mechanical Engineering, Huazhong University of Science and Technology, Wuhan 430074, China 《Computer Aided Drafting,Design and Manufacturing》 2001年第1期19-25,共7页
How to identify topological entities during rebuilding features is a critical problem in Feature-Based Parametric Modeling System (FBPMS). In the article, authors proposes a new coding approach to distinguish differen... How to identify topological entities during rebuilding features is a critical problem in Feature-Based Parametric Modeling System (FBPMS). In the article, authors proposes a new coding approach to distinguish different entities. The coding mechanism is expatiated,and some typical examples are presented. At last, the algorithm of decoding is put forward based on set theory. 展开更多
关键词 feature-based modeling entity coding DEcoding
全文增补中
Digital signature systems based on smart card and fingerprint feature 被引量:3
9
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
下载PDF
Robust Speech Recognition System Using Conventional and Hybrid Features of MFCC,LPCC,PLP,RASTA-PLP and Hidden Markov Model Classifier in Noisy Conditions 被引量:7
10
作者 Veton Z.Kepuska Hussien A.Elharati 《Journal of Computer and Communications》 2015年第6期1-9,共9页
In recent years, the accuracy of speech recognition (SR) has been one of the most active areas of research. Despite that SR systems are working reasonably well in quiet conditions, they still suffer severe performance... In recent years, the accuracy of speech recognition (SR) has been one of the most active areas of research. Despite that SR systems are working reasonably well in quiet conditions, they still suffer severe performance degradation in noisy conditions or distorted channels. It is necessary to search for more robust feature extraction methods to gain better performance in adverse conditions. This paper investigates the performance of conventional and new hybrid speech feature extraction algorithms of Mel Frequency Cepstrum Coefficient (MFCC), Linear Prediction Coding Coefficient (LPCC), perceptual linear production (PLP), and RASTA-PLP in noisy conditions through using multivariate Hidden Markov Model (HMM) classifier. The behavior of the proposal system is evaluated using TIDIGIT human voice dataset corpora, recorded from 208 different adult speakers in both training and testing process. The theoretical basis for speech processing and classifier procedures were presented, and the recognition results were obtained based on word recognition rate. 展开更多
关键词 Speech Recognition Noisy Conditions feature Extraction Mel-Frequency Cepstral Coefficients Linear Predictive coding Coefficients Perceptual Linear Production RASTA-PLP Isolated Speech Hidden Markov Model
下载PDF
Feature Extraction of Fabric Defects Based on Complex Contourlet Transform and Principal Component Analysis 被引量:1
11
作者 吴一全 万红 叶志龙 《Journal of Donghua University(English Edition)》 EI CAS 2013年第4期282-286,共5页
To extract features of fabric defects effectively and reduce dimension of feature space,a feature extraction method of fabric defects based on complex contourlet transform (CCT) and principal component analysis (PC... To extract features of fabric defects effectively and reduce dimension of feature space,a feature extraction method of fabric defects based on complex contourlet transform (CCT) and principal component analysis (PCA) is proposed.Firstly,training samples of fabric defect images are decomposed by CCT.Secondly,PCA is applied in the obtained low-frequency component and part of highfrequency components to get a lower dimensional feature space.Finally,components of testing samples obtained by CCT are projected onto the feature space where different types of fabric defects are distinguished by the minimum Euclidean distance method.A large number of experimental results show that,compared with PCA,the method combining wavdet low-frequency component with PCA (WLPCA),the method combining contourlet transform with PCA (CPCA),and the method combining wavelet low-frequency and highfrequency components with PCA (WPCA),the proposed method can extract features of common fabric defect types effectively.The recognition rate is greatly improved while the dimension is reduced. 展开更多
关键词 fabric defects feature extraction complex contourlet transform(CCT) principal component analysis(PCA)CLC number:TP391.4 TS103.7Document code:AArticle ID:1672-5220(2013)04-0282-05
下载PDF
Multi-Level Feature-Based Ensemble Model for Target-Related Stance Detection
12
作者 Shi Li Xinyan Cao Yiting Nan 《Computers, Materials & Continua》 SCIE EI 2020年第10期777-788,共12页
Stance detection is the task of attitude identification toward a standpoint.Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during highe... Stance detection is the task of attitude identification toward a standpoint.Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during higher-level abstracting.Moreover,because the target is not always mentioned in the text,most methods have ignored target information.In order to solve these problems,we propose a neural network ensemble method that combines the timing dependence bases on long short-term memory(LSTM)and the excellent extracting performance of convolutional neural networks(CNNs).The method can obtain multi-level features that consider both local and global features.We also introduce attention mechanisms to magnify target information-related features.Furthermore,we employ sparse coding to remove noise to obtain characteristic features.Performance was improved by using sparse coding on the basis of attention employment and feature extraction.We evaluate our approach on the SemEval-2016Task 6-A public dataset,achieving a performance that exceeds the benchmark and those of participating teams. 展开更多
关键词 ATTENTION sparse coding multi-level features ensemble model
下载PDF
Wake-Up-Word Feature Extraction on FPGA
13
作者 Veton ZKepuska Mohamed MEljhani Brian HHight 《World Journal of Engineering and Technology》 2014年第1期1-12,共12页
Wake-Up-Word Speech Recognition task (WUW-SR) is a computationally very demand, particularly the stage of feature extraction which is decoded with corresponding Hidden Markov Models (HMMs) in the back-end stage of the... Wake-Up-Word Speech Recognition task (WUW-SR) is a computationally very demand, particularly the stage of feature extraction which is decoded with corresponding Hidden Markov Models (HMMs) in the back-end stage of the WUW-SR. The state of the art WUW-SR system is based on three different sets of features: Mel-Frequency Cepstral Coefficients (MFCC), Linear Predictive Coding Coefficients (LPC), and Enhanced Mel-Frequency Cepstral Coefficients (ENH_MFCC). In (front-end of Wake-Up-Word Speech Recognition System Design on FPGA) [1], we presented an experimental FPGA design and implementation of a novel architecture of a real-time spectrogram extraction processor that generates MFCC, LPC, and ENH_MFCC spectrograms simultaneously. In this paper, the details of converting the three sets of spectrograms 1) Mel-Frequency Cepstral Coefficients (MFCC), 2) Linear Predictive Coding Coefficients (LPC), and 3) Enhanced Mel-Frequency Cepstral Coefficients (ENH_MFCC) to their equivalent features are presented. In the WUW- SR system, the recognizer’s frontend is located at the terminal which is typically connected over a data network to remote back-end recognition (e.g., server). The WUW-SR is shown in Figure 1. The three sets of speech features are extracted at the front-end. These extracted features are then compressed and transmitted to the server via a dedicated channel, where subsequently they are decoded. 展开更多
关键词 Speech Recognition System feature Extraction Mel-Frequency Cepstral Coefficients Linear Predictive coding Coefficients Enhanced Mel-Frequency Cepstral Coefficients Hidden Markov Models Field-Programmable Gate Arrays
下载PDF
Supervised Fuzzy Mixture of Local Feature Models
14
作者 Mingyang Xu Michael Golay 《Intelligent Information Management》 2011年第3期87-103,共17页
This paper addresses an important issue in model combination, that is, model locality. Since usually a global linear model is unable to reflect nonlinearity and to characterize local features, especially in a complex ... This paper addresses an important issue in model combination, that is, model locality. Since usually a global linear model is unable to reflect nonlinearity and to characterize local features, especially in a complex sys-tem, we propose a mixture of local feature models to overcome these weaknesses. The basic idea is to split the entire input space into operating domains, and a recently developed feature-based model combination method is applied to build local models for each region. To realize this idea, three steps are required, which include clustering, local modeling and model combination, governed by a single objective function. An adaptive fuzzy parametric clustering algorithm is proposed to divide the whole input space into operating regimes, local feature models are created in each individual region by applying a recently developed fea-ture-based model combination method, and finally they are combined into a single mixture model. Corre-spondingly, a three-stage procedure is designed to optimize the complete objective function, which is actu-ally a hybrid Genetic Algorithm (GA). Our simulation results show that the adaptive fuzzy mixture of local feature models turns out to be superior to global models. 展开更多
关键词 Adaptive FUZZY MIXTURE Supervised CLUSTERING Local feature Model PCA ICA Phase Transition FUZZY PARAMETRIC CLUSTERING Real-Coded GENETIC Algorithm
下载PDF
改进YOLOv8的农作物叶片病虫害识别算法
15
作者 张书贵 陈书理 赵展 《中国农机化学报》 北大核心 2024年第7期255-260,共6页
针对传统检测网络难以准确、高效地提取农作物叶片病虫害特征信息的问题,通过改进YOLOv8网络,提出一种多层级多尺度特征融合的农作物叶片病虫害识别算法。通过学习不同层级特征直接的特征关系,构建多层级特征编码模块,学习全面的特征表... 针对传统检测网络难以准确、高效地提取农作物叶片病虫害特征信息的问题,通过改进YOLOv8网络,提出一种多层级多尺度特征融合的农作物叶片病虫害识别算法。通过学习不同层级特征直接的特征关系,构建多层级特征编码模块,学习全面的特征表达;在Transformer的基础上设计多尺度空间—通道注意力模块,利用学习细粒度、粗粒度等多尺度全面的特征表达模式,捕获不同尺度特征之间的互补关系,并将所有特征表示有效融合起来,构成完整的图像特征表示,进而获取更佳的识别结果。在Plant Village公开数据集进行试验验证,结果表明:提出的改进方法能够有效提升配准精度,准确地识别出农作物叶片上同时存在的不同病虫害,对番茄叶片检测的mAP 0.5达到88.74%,比传统YOLOv8方法提升8.53%,且计算耗时没有明显增加。消融试验也充分证明所提各个模块的有效性,能够更好地实现高精度识别叶片病虫害,为农田智慧化管理提供有力支持和保障。 展开更多
关键词 叶片病虫害识别 多层级特征编码 多尺度特征融合 通道注意力 特征表达
下载PDF
知识图谱特征重构下无线传感网络数据存储恢复
16
作者 何芳州 王祉淇 《传感技术学报》 CAS CSCD 北大核心 2024年第7期1265-1270,共6页
为了提升无线传感网络数据存储恢复成功率,保障无线传感网络数据存储安全性,提出知识图谱特征重构下无线传感网络数据存储恢复方法。通过基于知识图谱的特征重构方法优化数据存储结构;利用BP神经网络和LEACH算法,对特征重构后的数据进... 为了提升无线传感网络数据存储恢复成功率,保障无线传感网络数据存储安全性,提出知识图谱特征重构下无线传感网络数据存储恢复方法。通过基于知识图谱的特征重构方法优化数据存储结构;利用BP神经网络和LEACH算法,对特征重构后的数据进行融合。最后,结合多级网络编码和纠删码的原理,构建多级编码矩阵对融合数据进行多级编码,并生成多份数据副本进行存储,实现无线传感网络数据存储恢复。实验结果表明,该方法能够提升数据存储恢复成功率至90%以上,通信代价低于1.5×10^(5) Mbit/s,存储恢复时间低于0.7 ms,可以在提升恢复成功率的同时,降低存储通信代价和存储恢复时间。 展开更多
关键词 无线传感网络 数据存储恢复 知识图谱 特征重构 纠删码
下载PDF
一种基于边界斜率拟合的角点检测方法
17
作者 黄天云 姚远 《西南民族大学学报(自然科学版)》 CAS 2024年第4期428-435,共8页
图像中的角点为描述物体特征提供关键信息,是复杂应用(如图像分类、目标检测和跟踪、定位和测量)的预处理步骤,角点检测的质量将直接影响后续图像处理的有效性.在工业环境中,角点检测算法需要在各类噪声和干扰因素下,对大规模数据集进... 图像中的角点为描述物体特征提供关键信息,是复杂应用(如图像分类、目标检测和跟踪、定位和测量)的预处理步骤,角点检测的质量将直接影响后续图像处理的有效性.在工业环境中,角点检测算法需要在各类噪声和干扰因素下,对大规模数据集进行高效处理,以实现实时和准确的角点检测.因此,研究和设计快速高效、高准确性的角点检测算法具有重要意义.针对传统算法需要进行曲率计算或曲线拟合的局限性,提出了一种基于Freeman边界链码的快速、轻量级角点检测算法,通过对Freeman链码在角点之前和之后的连续多个点进行线段的斜率拟合和夹角的阈值判定,进而识别出角点.从准确性、鲁棒性和计算速度等方面,在NRS工业图像集上与主流角点检测算法进行了对比实验.结果表明,所提出的算法具有较少漏检和误检的角点数量,并实现了更快的检测速度,在工业应用中更具有优势. 展开更多
关键词 角点检测 特征提取 FREEMAN链码 工业应用
下载PDF
基于可靠度差值特征的自适应判决多元LDPC译码算法
18
作者 孙友明 韦礼乐 +3 位作者 黄奕俊 莫莉歆 黎相成 孙洪民 《电讯技术》 北大核心 2024年第6期945-951,共7页
利用变量节点符号可靠度在迭代过程中的分布特征,提出了一种基于可靠度差值特征的自适应判决多元低密度奇偶校验(Low Density Parity Check, LDPC)译码算法。整个迭代过程划分为两个阶段,针对不同阶段节点可靠度的差值特征分别采用不同... 利用变量节点符号可靠度在迭代过程中的分布特征,提出了一种基于可靠度差值特征的自适应判决多元低密度奇偶校验(Low Density Parity Check, LDPC)译码算法。整个迭代过程划分为两个阶段,针对不同阶段节点可靠度的差值特征分别采用不同的判决策略:前期阶段,采用传统的基于最大可靠度的判决策略;后期阶段,根据最大、次大可靠度之间的差值特征,设计自适应的码元符号判决策略。仿真结果表明,所提算法在相当的译码复杂度前提下,能获得0.15~0.4 dB的性能增益。同时,对于列重较小的LDPC码,具有更低的译码错误平层。 展开更多
关键词 多元LDPC码 大数逻辑译码 自适应判决 差值特征
下载PDF
基于学习的源代码漏洞检测研究与进展
19
作者 苏小红 郑伟宁 +3 位作者 蒋远 魏宏巍 万佳元 魏子越 《计算机学报》 EI CSCD 北大核心 2024年第2期337-374,共38页
源代码漏洞自动检测是源代码漏洞修复的前提和基础,对于保障软件安全具有重要意义.传统的方法通常是基于安全专家人工制定的规则检测漏洞,但是人工制定规则的难度较大,且可检测的漏洞类型依赖于安全专家预定义的规则.近年来,人工智能技... 源代码漏洞自动检测是源代码漏洞修复的前提和基础,对于保障软件安全具有重要意义.传统的方法通常是基于安全专家人工制定的规则检测漏洞,但是人工制定规则的难度较大,且可检测的漏洞类型依赖于安全专家预定义的规则.近年来,人工智能技术的快速发展为实现基于学习的源代码漏洞自动检测提供了机遇.基于学习的漏洞检测方法是指使用基于机器学习或深度学习技术来进行漏洞检测的方法,其中基于深度学习的漏洞检测方法由于能够自动提取代码中漏洞相关的语法和语义特征,避免特征工程,在漏洞检测领域表现出了巨大的潜力,并成为近年来的研究热点.本文主要回顾和总结了现有的基于学习的源代码漏洞检测技术,对其研究和进展进行了系统的分析和综述,重点对漏洞数据挖掘与数据集构建、面向漏洞检测任务的程序表示方法、基于机器学习和深度学习的源代码漏洞检测方法、源代码漏洞检测的可解释方法、细粒度的源代码漏洞检测方法等五个方面的研究工作进行了系统的分析和总结.在此基础上,给出了一种结合层次化语义感知、多粒度漏洞分类和辅助漏洞理解的漏洞检测参考框架.最后对基于学习的源代码漏洞检测技术的未来研究方向进行了展望. 展开更多
关键词 软件安全 源代码漏洞检测 漏洞数据挖掘 漏洞特征提取 代码表示学习 深度学习 模型可解释性 漏洞检测
下载PDF
融合笔迹特征的可信签字图章生成及验证方法
20
作者 李莉 高尚 +2 位作者 左珮良 宣佳铮 宋涵 《网络与信息安全学报》 2024年第1期48-57,共10页
随着电子通信与互联网技术的迅速发展,文件流转和处理正在逐步转向数字化,电子文件的签署方式呈现出更为便捷灵活与多样化的趋势,如在线签字采集、远程签字确认以及电子签名认证等。与此同时,文件的签署和验证过程在真实性、完整性等方... 随着电子通信与互联网技术的迅速发展,文件流转和处理正在逐步转向数字化,电子文件的签署方式呈现出更为便捷灵活与多样化的趋势,如在线签字采集、远程签字确认以及电子签名认证等。与此同时,文件的签署和验证过程在真实性、完整性等方面面临着诸多严峻挑战。不法分子以低成本手段截取、复制和伪造签字图像冒名签署文件、篡改和伪造签名文件等案例层出不穷,电子签章系统的应用过程面临成本较高、部署受限、普适性缺乏,以及真实性和一致性校验复杂等方面的困境。为了应对这些潜在的风险和挑战,实现个人文件签署流转过程中的可靠验证,提出了一种融合笔迹特征的可信签字图章生成及验证方法,该方法主要通过可信身份认证平台的人脸识别和身份信息匹配功能,融合签字笔迹特征,对签字笔迹特征唯一绑定并对签名者身份可靠认证,并基于此生成融合笔迹特征、签署文件验证链接和数字签名二维码的签字图章。分析表明:所提方法的签字图章不仅具备身份验证的功能,而且能够实现对文件签署真实性的辨别,二维码中签署文件验证链接可通过在线渠道直接验证签名人的身份、笔迹以及签署文件的真实性和一致性,这为纸质文件验证提供了更为便捷的途径,所提方法在电子文件流转处理和电子与纸质文件真实性验证领域具有广泛的应用前景。 展开更多
关键词 笔迹特征 数字签名 签字图章 二维码 可信签字
下载PDF
上一页 1 2 49 下一页 到第
使用帮助 返回顶部