期刊文献+
共找到1,166篇文章
< 1 2 59 >
每页显示 20 50 100
A Review on the Application of Deep Learning Methods in Detection and Identification of Rice Diseases and Pests
1
作者 Xiaozhong Yu Jinhua Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期197-225,共29页
In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the s... In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests. 展开更多
关键词 Deep learning rice diseases and pests image recognition object detection
下载PDF
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
2
作者 Renwan Bi Mingfeng Zhao +2 位作者 Zuobin Ying Youliang Tian Jinbo Xiong 《Digital Communications and Networks》 SCIE CSCD 2024年第2期380-388,共9页
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in IoT.However,sensing users as data uploaders... With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in IoT.However,sensing users as data uploaders lack a balance between data benefits and privacy threats,leading to conservative data uploads and low revenue or excessive uploads and privacy breaches.To solve this problem,a Dynamic Privacy Measurement and Protection(DPMP)framework is proposed based on differential privacy and reinforcement learning.Firstly,a DPM model is designed to quantify the amount of data privacy,and a calculation method for personalized privacy threshold of different users is also designed.Furthermore,a Dynamic Private sensing data Selection(DPS)algorithm is proposed to help sensing users maximize data benefits within their privacy thresholds.Finally,theoretical analysis and ample experiment results show that DPMP framework is effective and efficient to achieve a balance between data benefits and sensing user privacy protection,in particular,the proposed DPMP framework has 63%and 23%higher training efficiency and data benefits,respectively,compared to the Monte Carlo algorithm. 展开更多
关键词 Mobile edge crowdsensing Dynamic privacy measurement Personalized privacy threshold Privacy protection Reinforcement learning
下载PDF
Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles 被引量:1
3
作者 Bingcai Wei Di Wang +1 位作者 Zhuang Wang Liye Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1975-1988,共14页
With the increasing popularity of artificial intelligence applications,machine learning is also playing an increasingly important role in the Internet of Things(IoT)and the Internet of Vehicles(IoV).As an essential pa... With the increasing popularity of artificial intelligence applications,machine learning is also playing an increasingly important role in the Internet of Things(IoT)and the Internet of Vehicles(IoV).As an essential part of the IoV,smart transportation relies heavily on information obtained from images.However,inclement weather,such as snowy weather,negatively impacts the process and can hinder the regular operation of imaging equipment and the acquisition of conventional image information.Not only that,but the snow also makes intelligent transportation systems make the wrong judgment of road conditions and the entire system of the Internet of Vehicles adverse.This paper describes the single image snowremoval task and the use of a vision transformer to generate adversarial networks.The residual structure is used in the algorithm,and the Transformer structure is used in the network structure of the generator in the generative adversarial networks,which improves the accuracy of the snow removal task.Moreover,the vision transformer has good scalability and versatility for larger models and has a more vital fitting ability than the previously popular convolutional neural networks.The Snow100K dataset is used for training,testing and comparison,and the peak signal-to-noise ratio and structural similarity are used as evaluation indicators.The experimental results show that the improved snow removal algorithm performs well and can obtain high-quality snow removal images. 展开更多
关键词 Artificial intelligence Internet of Things vision transformer deep learning image desnow
下载PDF
Application of improved virtual sample and sparse representation in face recognition 被引量:1
4
作者 Yongjun Zhang Zewei Wang +4 位作者 Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1391-1402,共12页
Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face ... Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face recognition,differences in expression,angle,posture,and lighting conditions have become key factors that affect recognition accuracy.Essentially,there may be significant differences between different image samples of the same face,which makes image classification very difficult.Therefore,how to build a robust virtual image representation becomes a vital issue.To solve the above problems,this paper proposes a novel image classification algorithm.First,to better retain the global features and contour information of the original sample,the algorithm uses an improved non‐linear image representation method to highlight the low‐intensity and high‐intensity pixels of the original training sample,thus generating a virtual sample.Second,by the principle of sparse representation,the linear expression coefficients of the original sample and the virtual sample can be calculated,respectively.After obtaining these two types of coefficients,calculate the distances between the original sample and the test sample and the distance between the virtual sample and the test sample.These two distances are converted into distance scores.Finally,a simple and effective weight fusion scheme is adopted to fuse the classification scores of the original image and the virtual image.The fused score will determine the final classification result.The experimental results show that the proposed method outperforms other typical sparse representation classification methods. 展开更多
关键词 REPRESENTATION SAMPLE IMAGE
下载PDF
An object detection approach with residual feature fusion and second-order term attention mechanism
5
作者 Cuijin Li Zhong Qu Shengye Wang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期411-424,共14页
Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging research.Since the boundary box location is not sufficiently accurate a... Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging research.Since the boundary box location is not sufficiently accurate and it is difficult to distinguish overlapping and occluded objects,the authors propose a network model with a second-order term attention mechanism and occlusion loss.First,the backbone network is built on CSPDarkNet53.Then a method is designed for the feature extraction network based on an item-wise attention mechanism,which uses the filtered weighted feature vector to replace the original residual fusion and adds a second-order term to reduce the information loss in the process of fusion and accelerate the convergence of the model.Finally,an objected occlusion regression loss function is studied to reduce the problems of missed detections caused by dense objects.Sufficient experimental results demonstrate that the authors’method achieved state-of-the-art performance without reducing the detection speed.The mAP@.5 of the method is 85.8%on the Foggy_cityscapes dataset and the mAP@.5 of the method is 97.8%on the KITTI dataset. 展开更多
关键词 artificial intelligence computer vision image processing machine learning neural network object recognition
下载PDF
A Time Series Short-Term Prediction Method Based on Multi-Granularity Event Matching and Alignment
6
作者 Haibo Li Yongbo Yu +1 位作者 Zhenbo Zhao Xiaokang Tang 《Computers, Materials & Continua》 SCIE EI 2024年第1期653-676,共24页
Accurate forecasting of time series is crucial across various domains.Many prediction tasks rely on effectively segmenting,matching,and time series data alignment.For instance,regardless of time series with the same g... Accurate forecasting of time series is crucial across various domains.Many prediction tasks rely on effectively segmenting,matching,and time series data alignment.For instance,regardless of time series with the same granularity,segmenting them into different granularity events can effectively mitigate the impact of varying time scales on prediction accuracy.However,these events of varying granularity frequently intersect with each other,which may possess unequal durations.Even minor differences can result in significant errors when matching time series with future trends.Besides,directly using matched events but unaligned events as state vectors in machine learning-based prediction models can lead to insufficient prediction accuracy.Therefore,this paper proposes a short-term forecasting method for time series based on a multi-granularity event,MGE-SP(multi-granularity event-based short-termprediction).First,amethodological framework for MGE-SP established guides the implementation steps.The framework consists of three key steps,including multi-granularity event matching based on the LTF(latest time first)strategy,multi-granularity event alignment using a piecewise aggregate approximation based on the compression ratio,and a short-term prediction model based on XGBoost.The data from a nationwide online car-hailing service in China ensures the method’s reliability.The average RMSE(root mean square error)and MAE(mean absolute error)of the proposed method are 3.204 and 2.360,lower than the respective values of 4.056 and 3.101 obtained using theARIMA(autoregressive integratedmoving average)method,as well as the values of 4.278 and 2.994 obtained using k-means-SVR(support vector regression)method.The other experiment is conducted on stock data froma public data set.The proposed method achieved an average RMSE and MAE of 0.836 and 0.696,lower than the respective values of 1.019 and 0.844 obtained using the ARIMA method,as well as the values of 1.350 and 1.172 obtained using the k-means-SVR method. 展开更多
关键词 Time series short-term prediction multi-granularity event ALIGNMENT event matching
下载PDF
An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
7
作者 Linlin Yuan Tiantian Zhang +2 位作者 Yuling Chen Yuxiang Yang Huang Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1561-1579,共19页
The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an eff... The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss. 展开更多
关键词 Blockchain big data K-ANONYMITY 2-means clustering greedy algorithm mean-center method
下载PDF
Starlet:Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT
8
作者 Hui Xia Ning Huang +2 位作者 Xuecai Feng Rui Zhang Chao Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第3期586-596,共11页
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ... The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility. 展开更多
关键词 Internet of things Defense resource sharing Multi-armed bandits Defense resource allocation
下载PDF
Adversarial attacks and defenses for digital communication signals identification
9
作者 Qiao Tian Sicheng Zhang +1 位作者 Shiwen Mao Yun Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第3期756-764,共9页
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ... As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research. 展开更多
关键词 Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
10
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 Internet of Things(IoT) Internet of Medical Things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
Estimating Key Phenological Dates of Multiple Rice Accessions Using Unmanned Aerial Vehicle-Based Plant Height Dynamics for Breeding
11
作者 HONG Weiyuan LI Ziqiu +5 位作者 FENG Xiangqian QIN Jinhua WANG Aidong JIN Shichao WANG Danying CHEN Song 《Rice science》 SCIE CSCD 2024年第5期617-628,I0066-I0070,共17页
Efficient and high-quality estimation of key phenological dates in rice is of great significance in breeding work. Plant height(PH) dynamics are valuable for estimating phenological dates. However, research on estimat... Efficient and high-quality estimation of key phenological dates in rice is of great significance in breeding work. Plant height(PH) dynamics are valuable for estimating phenological dates. However, research on estimating the key phenological dates of multiple rice accessions based on PH dynamics has been limited. In 2022, field traits were collected using unmanned aerial vehicle(UAV)-based images across 435 plots, including 364 rice varieties. PH, dates of initial heading(IH) and full heading(FH), and panicle initiation(PI), and growth period after transplanting(GPAT) were collected during the rice growth stage. PHs were extracted using a digital surface model(DSM) and fitted using Fourier and logistic models. Machine learning algorithms, including multiple linear regression, random forest(RF), support vector regression, least absolute shrinkage and selection operator, and elastic net regression, were employed to estimate phenological dates. Results indicated that the optimal percentile of the DSM for extracting rice PH was the 95th(R^(2) = 0.934, RMSE = 0.056 m). The Fourier model provided a better fit for PH dynamics compared with the logistic models. Additionally, curve features(CF) and GPAT were significantly associated with PI, IH, and FH. The combination of CF and GPAT outperformed the use of CF alone, with RF demonstrating the best performance among the algorithms. Specifically, the combination of CF extracted from the logistic models, GPAT, and RF yielded the best performance for estimating PI(R^(2) = 0.834, RMSE = 4.344 d), IH(R^(2) = 0.877, RMSE = 2.721 d), and FH(R^(2) = 0.883, RMSE = 2.694 d). Overall, UAV-based rice PH dynamics combined with machine learning effectively estimated the key phenological dates of multiple rice accessions, providing a novel approach for investigating key phenological dates in breeding work. 展开更多
关键词 phenological date plant height unmanned aerial vehicle machine learning rice breeding
下载PDF
Improved simulation of winter wheat yield in North China Plain by using PRYM-Wheat integrated dry matter distribution coefficient
12
作者 Xuan Li Shaowen Wang +6 位作者 Yifan Chen Danwen Zhang Shanshan Yang Jingwen Wang Jiahua Zhang Yun Bai Sha Zhang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第4期1381-1392,共12页
The accurate simulation of regional-scale winter wheat yield is important for national food security and the balance of grain supply and demand in China.Presently,most remote sensing process models use the“biomass... The accurate simulation of regional-scale winter wheat yield is important for national food security and the balance of grain supply and demand in China.Presently,most remote sensing process models use the“biomass×harvest index(HI)”method to simulate regional-scale winter wheat yield.However,spatiotemporal differences in HI contribute to inaccuracies in yield simulation at the regional scale.Time-series dry matter partition coefficients(Fr)can dynamically reflect the dry matter partition of winter wheat.In this study,Fr equations were fitted for each organ of winter wheat using site-scale data.These equations were then coupled into a process-based and remote sensingdriven crop yield model for wheat(PRYM-Wheat)to improve the regional simulation of winter wheat yield over the North China Plain(NCP).The improved PRYM-Wheat model integrated with the fitted Fr equations(PRYM-Wheat-Fr)was validated using data obtained from provincial yearbooks.A 3-year(2000-2002)averaged validation showed that PRYM-Wheat-Fr had a higher coefficient of determination(R^(2)=0.55)and lower root mean square error(RMSE=0.94 t ha^(-1))than PRYM-Wheat with a stable HI(abbreviated as PRYM-Wheat-HI),which had R^(2) and RMSE values of 0.30 and 1.62 t ha^(-1),respectively.The PRYM-Wheat-Fr model also performed better than PRYM-Wheat-HI for simulating yield in verification years(2013-2015).In conclusion,the PRYM-Wheat-Fr model exhibited a better accuracy than the original PRYM-Wheat model,making it a useful tool for the simulation of regional winter wheat yield. 展开更多
关键词 dry matter partition remote sensing model winter wheat yield North China Plain
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
13
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
Side-Channel Leakage Analysis of Inner Product Masking
14
作者 Yuyuan Li Lang Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第4期1245-1262,共18页
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher... The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent. 展开更多
关键词 Side-channel analysis inner product masking mutual information nonlinear leakage
下载PDF
On-chip quantum NOON state sensing for temperature and humidity
15
作者 Weihong Luo Chao Wu +5 位作者 Yuxing Du Chang Zhao Miaomiao Yu Pingyu Zhu Kaikai Zhang Ping Xu 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期15-20,共6页
A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum enhancedprecision.In this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interf... A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum enhancedprecision.In this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interferometerswherein the two-photon NOON state,sensing element for temperature or humidity,is generated.Compared with classicallight or single photon case,two-photon NOON state sensing shows a solid enhancement in the sensing resolution andprecision.As the first demonstration of on-chip quantum photonic sensing,it reveals the advantages of photonic chips forhigh integration density,small-size,stability for multiple-parameter sensing serviceability.A higher sensing precision isexpected to beat the standard quantum limit with a higher photon number NOON state. 展开更多
关键词 quantum sensing NOON state photonic chip
下载PDF
Fuzzing:Progress,Challenges,and Perspectives
16
作者 Zhenhua Yu Zhengqi Liu +2 位作者 Xuya Cong Xiaobo Li Li Yin 《Computers, Materials & Continua》 SCIE EI 2024年第1期1-29,共29页
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target progr... As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system.In recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the technique.This paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its performance.Finally,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers. 展开更多
关键词 FUZZING VULNERABILITY software testing software security
下载PDF
Identification of Important FPGA Modules Based on Complex Network
17
作者 Senjie Zhang Jinbo Wang +3 位作者 Shan Zhou Jingpei Wang Zhenyong Zhang Ruixue Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1027-1047,共21页
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,exi... The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes. 展开更多
关键词 Hardware security FPGA circuits node importance interdependent network
下载PDF
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
18
作者 Shiyan Zhang Ruohan Xu +3 位作者 Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第2期2287-2308,共22页
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms. 展开更多
关键词 MULTI-DOMAIN data center networks AUTONOMOUS ROUTING
下载PDF
S^(2)ANet:Combining local spectral and spatial point grouping for point cloud processing
19
作者 Yujie LIU Xiaorui SUN +1 位作者 Wenbin SHAO Yafu YUAN 《虚拟现实与智能硬件(中英文)》 EI 2024年第4期267-279,共13页
Background Despite the recent progress in 3D point cloud processing using deep convolutional neural networks,the inability to extract local features remains a challenging problem.In addition,existing methods consider ... Background Despite the recent progress in 3D point cloud processing using deep convolutional neural networks,the inability to extract local features remains a challenging problem.In addition,existing methods consider only the spatial domain in the feature extraction process.Methods In this paper,we propose a spectral and spatial aggregation convolutional network(S^(2)ANet),which combines spectral and spatial features for point cloud processing.First,we calculate the local frequency of the point cloud in the spectral domain.Then,we use the local frequency to group points and provide a spectral aggregation convolution module to extract the features of the points grouped by the local frequency.We simultaneously extract the local features in the spatial domain to supplement the final features.Results S^(2)ANet was applied in several point cloud analysis tasks;it achieved stateof-the-art classification accuracies of 93.8%,88.0%,and 83.1%on the ModelNet40,ShapeNetCore,and ScanObjectNN datasets,respectively.For indoor scene segmentation,training and testing were performed on the S3DIS dataset,and the mean intersection over union was 62.4%.Conclusions The proposed S^(2)ANet can effectively capture the local geometric information of point clouds,thereby improving accuracy on various tasks. 展开更多
关键词 Local frequency Spectral and spatial aggregation convolution Spectral group convolution Point cloud representation learning Graph convolutional network
下载PDF
A Survey of Web Information Technology and Application 被引量:1
20
作者 MENG Xiao-feng XU Bao-wen +4 位作者 LIU Qing YU Ge SHEN Jun-yi LU Zheng-ding HE Yan-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第1期1-5,共5页
0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big cha... 0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big challenges to us. Since the Web provides cross-platform universal access to resources for the massive user population, even greater demand is requested to manage data and services effectively. 展开更多
下载PDF
上一页 1 2 59 下一页 到第
使用帮助 返回顶部