期刊文献+
共找到81篇文章
< 1 2 5 >
每页显示 20 50 100
An Assisted Diagnosis of Alzheimer’s Disease Incorporating Attention Mechanisms Med-3D Transfer Modeling
1
作者 Yanmei Li Jinghong Tang +3 位作者 Weiwu Ding Jian Luo Naveed Ahmad Rajesh Kumar 《Computers, Materials & Continua》 SCIE EI 2024年第1期713-733,共21页
Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder.The subtle and insidious onset of its pathogenesis makes early detection of a formidable challenge in both contemporary neuroscience and clin... Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder.The subtle and insidious onset of its pathogenesis makes early detection of a formidable challenge in both contemporary neuroscience and clinical practice.In this study,we introduce an advanced diagnostic methodology rooted in theMed-3D transfermodel and enhanced with an attention mechanism.We aim to improve the precision of AD diagnosis and facilitate its early identification.Initially,we employ a spatial normalization technique to address challenges like clarity degradation and unsaturation,which are commonly observed in imaging datasets.Subsequently,an attention mechanism is incorporated to selectively focus on the salient features within the imaging data.Building upon this foundation,we present the novelMed-3D transfermodel,designed to further elucidate and amplify the intricate features associated withADpathogenesis.Our proposedmodel has demonstrated promising results,achieving a classification accuracy of 92%.To emphasize the robustness and practicality of our approach,we introduce an adaptive‘hot-updating’auxiliary diagnostic system.This system not only enables continuous model training and optimization but also provides a dynamic platform to meet the real-time diagnostic and therapeutic demands of AD. 展开更多
关键词 Alzheimer’s disease channel attention Med-3D hot update
下载PDF
A fault recognition method based on clustering linear regression
2
作者 陈雷 SHI Jiaqi ZHANG Ting 《High Technology Letters》 EI CAS 2023年第4期406-415,共10页
Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clus... Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clustering linear regression is proposed.Firstly,Hough transform is used to detect the line segment of the enhanced image obtained by the coherence cube algorithm.Secondly,the endpoint of the line segment detected by Hough transform is taken as the key point,and the adaptive clustering linear regression algorithm is used to cluster the key points adaptively according to the lin-ear relationship between them.Finally,a fault is generated from each category of key points based on least squares curve fitting method to realize fault identification.To verify the feasibility and pro-gressiveness of the proposed method,it is compared with the traditional method and the latest meth-od on the actual seismic data through experiments,and the effectiveness of the proposed method is verified by the experimental results on the actual seismic data. 展开更多
关键词 fault recognition CLUSTERING linear regression curve fitting seismic interpreta-tion
下载PDF
Bio-Inspired Optimal Dispatching of Wind Power Consumption Considering Multi-Time Scale Demand Response and High-Energy Load Participation
3
作者 Peng Zhao Yongxin Zhang +2 位作者 Qiaozhi Hua Haipeng Li Zheng Wen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第2期957-979,共23页
Bio-inspired computer modelling brings solutions fromthe living phenomena or biological systems to engineering domains.To overcome the obstruction problem of large-scale wind power consumption in Northwest China,this ... Bio-inspired computer modelling brings solutions fromthe living phenomena or biological systems to engineering domains.To overcome the obstruction problem of large-scale wind power consumption in Northwest China,this paper constructs a bio-inspired computer model.It is an optimal wind power consumption dispatching model of multi-time scale demand response that takes into account the involved high-energy load.First,the principle of wind power obstruction with the involvement of a high-energy load is examined in this work.In this step,highenergy load model with different regulation characteristics is established.Then,considering the multi-time scale characteristics of high-energy load and other demand-side resources response speed,a multi-time scale model of coordination optimization is built.An improved bio-inspired model incorporating particle swarm optimization is applied to minimize system operation and wind curtailment costs,as well as to find the most optimal energy configurationwithin the system.Lastly,we take an example of regional power grid in Gansu Province for simulation analysis.Results demonstrate that the suggested scheduling strategy can significantly enhance the wind power consumption level and minimize the system’s operational cost. 展开更多
关键词 Biological system multi-time scale wind power consumption demand response bio-inspired computermodelling particle swarm optimization
下载PDF
A PSO Improved with Imbalanced Mutation and Task Rescheduling for Task Offloading in End-Edge-Cloud Computing
4
作者 Kaili Shao Hui Fu +1 位作者 Ying Song Bo Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2259-2274,共16页
To serve various tasks requested by various end devices with different requirements,end-edge-cloud(E2C)has attracted more and more attention from specialists in both academia and industry,by combining both benefits of... To serve various tasks requested by various end devices with different requirements,end-edge-cloud(E2C)has attracted more and more attention from specialists in both academia and industry,by combining both benefits of edge and cloud computing.But nowadays,E2C still suffers from low service quality and resource efficiency,due to the geographical distribution of edge resources and the high dynamic of network topology and user mobility.To address these issues,this paper focuses on task offloading,which makes decisions that which resources are allocated to tasks for their processing.This paper first formulates the problem into binary non-linear programming and then proposes a particle swarm optimization(PSO)-based algorithm to solve the problem.The proposed algorithm exploits an imbalance mutation operator and a task rescheduling approach to improve the performance of PSO.The proposed algorithm concerns the resource heterogeneity by correlating the probability that a computing node is decided to process a task with its capacity,by the imbalance mutation.The task rescheduling approach improves the acceptance ratio for a task offloading solution,by reassigning rejected tasks to computing nodes with available resources.Extensive simulated experiments are conducted.And the results show that the proposed offloading algorithm has an 8.93%–37.0%higher acceptance ratio than ten of the classical and up-to-date algorithms,and verify the effectiveness of the imbalanced mutation and the task rescheduling. 展开更多
关键词 Cloud computing edge computing edge cloud task scheduling task offloading particle swarm optimization
下载PDF
A wireless geophone based on STM32
5
作者 陈雷 CAO Peilin +1 位作者 BAI Jinghao ZHANG Ting 《High Technology Letters》 EI CAS 2023年第3期318-324,共7页
Seismic geophone is the key instrument for seismic data acquisition in the fields of oil and gas exploration and other relevant fields.It plays an important role in data quality,subsequent processing and interpretatio... Seismic geophone is the key instrument for seismic data acquisition in the fields of oil and gas exploration and other relevant fields.It plays an important role in data quality,subsequent processing and interpretation.Aiming at the shortcomings of the existing geophones,such as large volume,heavy weight,unable to monitor in real-time,and heavy workload of data transmission and storage,this paper designs and implements a wireless geophone based on STM32 embedded microcontroller.It is mainly composed of STM32 microcontroller,acceleration sensor,global positioning system(GPS)module,Wi-Fi module and real-time seismic data receiving and processing module.Firstly,the acceleration of vibration in three directions is sensed by the acceleration sensor;secondly,the sampling and analog-to-digital conversion of the vibration data is controlled by the microcontroller;thirdly,the vibration and GPS data are sent to the personal computer(PC)through Wi-Fi,and the personal coomputer PC-side software module completes the reception,display,monitoring and storage of the seismic data;finally,the feasibility and effectiveness of the designed wireless geophone are verified through actual seismic data acquisition experiments. 展开更多
关键词 STM32 microcontroller GEOPHONE SENSOR global positioning system(GPS)
下载PDF
基于C/S结构的分布式数字视频监控系统的设计和实现 被引量:6
6
作者 李红英 吴健 陈帆 《科学技术与工程》 2007年第6期988-992,共5页
结合当前视频技术、计算机网络技术、通信技术的发展,介绍了基于C/S结构的分布式数字视频监控系统的设计和实现,详细描述了各模块的功能与实现,对系统中的关键技术,如C/S结构、视频编码技术和网络实时传输技术等进行了讨论。
关键词 视频监控 分布式 C/S MPEG
下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
7
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems,including the Diffie Hellman key exchange protocol,encryption scheme and etc,and it makes the study of resistant quantu... The emergence of quantum computer will threaten the security of existing public-key cryptosystems,including the Diffie Hellman key exchange protocol,encryption scheme and etc,and it makes the study of resistant quantum cryptography very urgent.This motivate us to design a new key exchange protocol and encryption scheme in this paper.Firstly,some acknowledged mathematical problems was introduced,such as ergodic matrix problem and tensor decomposition problem,the two problems have been proved to NPC hard.From the computational complexity prospective,NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them.From the algebraic structures prospective,non-commutative cryptography has been considered to resist quantum.The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures,so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures.Secondly,a new problem was constructed based on the introduced problems in this paper,then a key exchange protocol and a public key encryption scheme were proposed based on it.Finally the security analysis,efficiency,recommended parameters,performance evaluation and etc.were also been given.The two schemes has the following characteristics,provable security,security bits can be scalable,to achieve high efficiency,quantum resistance,and etc. 展开更多
关键词 密钥交换协议 量子计算机 加密方案 可证明安全性 公钥密码体制 计算复杂性理论 抗性 代数结构
下载PDF
System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS 被引量:7
8
作者 Weihong Han Zhihong Tian +2 位作者 Zizhong Huang Lin Zhong Yan Jia 《Computers, Materials & Continua》 SCIE EI 2019年第4期167-180,共14页
Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHS... Network Security Situation Awareness System YHSAS acquires,understands and displays the security factors which cause changes of network situation,and predicts the future development trend of these security factors.YHSAS is developed for national backbone network,large network operators,large enterprises and other large-scale network.This paper describes its architecture and key technologies:Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis,Knowledge Representation and Management of Super Large-Scale Network Security,Multi-Level,Multi-Granularity and Multi-Dimensional Network Security Index Construction Method,Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology,and so on.The performance tests show that YHSAS has high real-time performance and accuracy in security situation analysis and trend prediction.The system meets the demands of analysis and prediction for large-scale network security situation. 展开更多
关键词 Network security situation awareness network security situation analysis and prediction network security index association analysis multi-dimensional analysis
下载PDF
Design and Implementation of Weibo Sentiment Analysis Based on LDA and Dependency Parsing 被引量:4
9
作者 Yonggan Li Xueguang Zhou +1 位作者 Yan Sun Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第11期91-105,共15页
Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i... Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical. 展开更多
关键词 情感表达 句法分析 LDA 设计 网络空间安全 内容安全 合并算法 吉布斯抽样
下载PDF
“In-VM”模型的隐藏代码检测模型(英文) 被引量:2
10
作者 陈林 刘波 +2 位作者 胡华平 肖枫涛 张静 《China Communications》 SCIE CSCD 2011年第4期99-108,共10页
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and... Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and attacked by malicious codes,VMM-based anti-malware systems have recently become a hot research field.In this article,the existing malware hiding technique is analyzed,and a detecting model for hidden process based on "In-VM" idea is also proposed.Based on this detecting model,a hidden process detection technology which is based on HOOK SwapContext on the VMM platform is also implemented successfully.This technology can guarantee the detecting method not to be attacked by malwares and also resist all the current process hiding technologies.In order to detect the malwares which use remote injection method to hide themselves,a method by hijacking sysenter instruction is also proposed.Experiments show that the proposed methods guarantee the isolation of virtual machines,can detect all malware samples,and just bring little performance loss. 展开更多
关键词 network security Virtual Machine Monitor(VMM) malware detection hidden process hardware virtualization
下载PDF
Digital chaotic sequence generator based on coupled chaotic systems 被引量:5
11
作者 刘树波 孙婧 +1 位作者 徐正全 刘金硕 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第12期5219-5227,共9页
Chaotic systems perform well as a new rich source of cryptography and pseudo-random coding. Unfortunately their digital dynamical properties would degrade due to the finite computing precision. Proposed in this paper ... Chaotic systems perform well as a new rich source of cryptography and pseudo-random coding. Unfortunately their digital dynamical properties would degrade due to the finite computing precision. Proposed in this paper is a modified digital chaotic sequence generator based on chaotic logistic systems with a coupling structure where one chaotic subsystem generates perturbation signals to disturb the control parameter of the other one. The numerical simulations show that the length of chaotic orbits, the output distribution of chaotic system, and the security of chaotic sequences have been greatly improved. Moreover the chaotic sequence period can be extended at least by one order of magnitude longer than that of the uncoupled logistic system and the difficulty in decrypting increases 2^128*2^128 times indicating that the dynamical degradation of digital chaos is effectively improved. A field programmable gate array (FPGA) implementation of an algorithm is given and the corresponding experiment shows that the output speed of the generated chaotic sequences can reach 571.4 Mbps indicating that the designed generator can he applied to the real-time video image encryption. 展开更多
关键词 CHAOS coupling structure sequence generator
下载PDF
Depth Similarity Enhanced Image Summarization Algorithm for Hole-Filling in Depth Image-Based Rendering 被引量:2
12
作者 SONG Lin HU Ruimin ZHONG Rui 《China Communications》 SCIE CSCD 2014年第11期60-68,共9页
In free viewpoint video(FVV)and 3DTV,the depth image-based rendering method has been put forward for rendering virtual view video based on multi-view video plus depth(MVD) format.However,the projection with slightly d... In free viewpoint video(FVV)and 3DTV,the depth image-based rendering method has been put forward for rendering virtual view video based on multi-view video plus depth(MVD) format.However,the projection with slightly different perspective turns the covered background regions into hole regions in the rendered video.This paper presents a depth enhanced image summarization generation model for the hole-filling via exploiting the texture fidelity and the geometry consistency between the hole and the remaining nearby regions.The texture fidelity and the geometry consistency are enhanced by drawing texture details and pixel-wise depth information into the energy cost of similarity measure correspondingly.The proposed approach offers significant improvement in terms of 0.2dB PSNR gain,0.06 SSIM gain and subjective quality enhancement for the hole-filling images in virtual viewpoint video. 展开更多
关键词 相似性度量 深度图像 图像增强算法 填充 渲染 空穴 几何一致性 虚拟视图
下载PDF
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
13
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 安全风险评价 安全度量 框架 诱导 HTTP服务器 APACHE 定量评估 网络空间
下载PDF
MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption 被引量:1
14
作者 WANG Jing HUANG Chuanhe +3 位作者 YANG Kan WANG Jinhai WANG Xiaomao CHEN Xi 《China Communications》 SCIE CSCD 2015年第6期126-140,共15页
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte... In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice. 展开更多
关键词 加密控制 解密器 权向量 访问控制 访问策略 安全性 秘密密钥 控制方案
下载PDF
FACOR:Flexible Access Control with Outsourceable Revocation in Mobile Clouds 被引量:2
15
作者 ZHOU Shungan DU Ruiying +3 位作者 CHEN Jing SHEN Jian DENG Hua ZHANG Huanguo 《China Communications》 SCIE CSCD 2016年第4期136-150,共15页
Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile d... Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation(FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our FACOR scheme achieves data security against collusion attacks and unauthorized accesses from revoked users. Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds. 展开更多
关键词 mobile cloud computing ABE OUTSOURCING user revocation
下载PDF
Pedestrian Attributes Recognition in Surveillance Scenarios with Hierarchical Multi-Task CNN Models 被引量:2
16
作者 Wenhua Fang Jun Chen Ruimin Hu 《China Communications》 SCIE CSCD 2018年第12期208-219,共12页
Pedestrian attributes recognition is a very important problem in video surveillance and video forensics. Traditional methods assume the pedestrian attributes are independent and design handcraft features for each one.... Pedestrian attributes recognition is a very important problem in video surveillance and video forensics. Traditional methods assume the pedestrian attributes are independent and design handcraft features for each one. In this paper, we propose a joint hierarchical multi-task learning algorithm to learn the relationships among attributes for better recognizing the pedestrian attributes in still images using convolutional neural networks(CNN). We divide the attributes into local and global ones according to spatial and semantic relations, and then consider learning semantic attributes through a hierarchical multi-task CNN model where each CNN in the first layer will predict each group of such local attributes and CNN in the second layer will predict the global attributes. Our multi-task learning framework allows each CNN model to simultaneously share visual knowledge among different groups of attribute categories. Extensive experiments are conducted on two popular and challenging benchmarks in surveillance scenarios, namely, the PETA and RAP pedestrian attributes datasets. On both benchmarks, our framework achieves superior results over the state-of-theart methods by 88.2% on PETA and 83.25% on RAP, respectively. 展开更多
关键词 attributes RECOGNITION CNN MULTI-TASK learning
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
17
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the secur... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnormal behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete information game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the performance of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 无线MESH网络 入侵检测模型 不完全信息 贝叶斯纳什均衡 网状网络 节约能源 无线网状网 公共场所
下载PDF
Cryptanalysis of Cryptosystems Based on General Linear Group 被引量:1
18
作者 Jianwei Jia Jinhui Liu Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第6期217-224,共8页
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai... Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work. 展开更多
关键词 一般线性群 密码分析 公钥密码系统 EIGAMAL 攻击方法 代数结构 量子计算机 时间复杂度
下载PDF
Collaborative Reversing of Input Formats and Program Data Structures for Security Applications 被引量:1
19
作者 ZHAO Lei 《China Communications》 SCIE CSCD 2014年第9期135-147,共13页
Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications.In this paper,we propose a collaborative reversing ... Reversing the syntactic format of program inputs and data structures in binaries plays a vital role for understanding program behaviors in many security applications.In this paper,we propose a collaborative reversing technique by capturing the mapping relationship between input fields and program data structures.The key insight behind our paper is that program uses corresponding data structures as references to parse and access different input fields,and every field could be identified by reversing its corresponding data structure.In details,we use a finegrained dynamic taint analysis to monitor the propagation of inputs.By identifying base pointers for each input byte,we could reverse data structures and conversely identify fields based on their referencing data structures.We construct several experiments to evaluate the effectiveness.Experiment results show that our approach could effectively reverse precise input formats,and provide unique benefits to two representative security applications,exploit diagnosis and malware analysis. 展开更多
关键词 输入格式 数据结构 应用程序 安全应用 反转 协同 倒车技术 二进制文件
下载PDF
Super-Resolution for Face Image with an Improved K-NN Search Strategy 被引量:1
20
作者 QU Shenming HU Ruimin +3 位作者 CHEN Shihong JIANG Junjun WANG Zhongyuan ZHANG Maosheng 《China Communications》 SCIE CSCD 2016年第4期151-161,共11页
Recently, neighbor embedding based face super-resolution(SR) methods have shown the ability for achieving high-quality face images, those methods are based on the assumption that the same neighborhoods are preserved i... Recently, neighbor embedding based face super-resolution(SR) methods have shown the ability for achieving high-quality face images, those methods are based on the assumption that the same neighborhoods are preserved in both low-resolution(LR) training set and high-resolution(HR) training set. However, due to the "one-to-many" mapping between the LR image and HR ones in practice, the neighborhood relationship of the LR patch in LR space is quite different with that of the HR counterpart, that is to say the neighborhood relationship obtained is not true. In this paper, we explore a novel and effective re-identified K-nearest neighbor(RIKNN) method to search neighbors of LR patch. Compared with other methods, our method uses the geometrical information of LR manifold and HR manifold simultaneously. In particular, it searches K-NN of LR patch in the LR space and refines the searching results by re-identifying in the HR space, thus giving rise to accurate K-NN and improved performance. A statistical analysis of the influence of the training set size and nearest neighbor number is given, experimental results on some public face databases show the superiority of our proposed scheme over state-of-the-art face hallucination approaches in terms of subjective and objective results as well as computational complexity. 展开更多
关键词 face hallucination K-NN re-identify SUPER-RESOLUTION manifold learning
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部