首页 > 最新文献

Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning最新文献

英文 中文
A water quality parameter prediction method based on transformer architecture and multi-sensor data fusion 基于变压器结构和多传感器数据融合的水质参数预测方法
Bowei Fang, Hao Liu, Wei He, Dexin Li, Chengzhao Liu
Water quality monitoring provides a basis for water quality control and water resources management. Prediction of water quality parameters can plan water use strategies, prevent further water pollution and improve water resource utilization efficiency. We propose a water quality parameter prediction method based on transformer architecture model and multi-sensor data fusion. The proposed multiple water quality parameter prediction model accepts multiple types of water quality parameter data input at the same time. The data embedding module integrates multiple types of water quality parameter information and assigns a unique position code to the data at each time step. The self-attention mechanism of the model mining the potential correlation between different time step data. The model can learn the internal relationship of the fusion data of multiple water quality parameters, and effectively predict the future trend of water quality parameters. The effectiveness of the proposed algorithm is verified by the measured data, and the advantages of the proposed method are verified by comparative experiments.
水质监测为水质控制和水资源管理提供了依据。对水质参数的预测可以规划水资源利用策略,防止进一步的水污染,提高水资源利用效率。提出了一种基于变压器结构模型和多传感器数据融合的水质参数预测方法。提出的多水质参数预测模型可以同时接受多种类型的水质参数数据输入。数据嵌入模块集成了多种类型的水质参数信息,并在每个时间步长为数据分配唯一的位置代码。模型的自注意机制挖掘了不同时间步长数据之间的潜在相关性。该模型可以学习多个水质参数融合数据的内在关系,有效预测水质参数的未来趋势。实测数据验证了所提算法的有效性,对比实验验证了所提方法的优越性。
{"title":"A water quality parameter prediction method based on transformer architecture and multi-sensor data fusion","authors":"Bowei Fang, Hao Liu, Wei He, Dexin Li, Chengzhao Liu","doi":"10.1145/3590003.3590037","DOIUrl":"https://doi.org/10.1145/3590003.3590037","url":null,"abstract":"Water quality monitoring provides a basis for water quality control and water resources management. Prediction of water quality parameters can plan water use strategies, prevent further water pollution and improve water resource utilization efficiency. We propose a water quality parameter prediction method based on transformer architecture model and multi-sensor data fusion. The proposed multiple water quality parameter prediction model accepts multiple types of water quality parameter data input at the same time. The data embedding module integrates multiple types of water quality parameter information and assigns a unique position code to the data at each time step. The self-attention mechanism of the model mining the potential correlation between different time step data. The model can learn the internal relationship of the fusion data of multiple water quality parameters, and effectively predict the future trend of water quality parameters. The effectiveness of the proposed algorithm is verified by the measured data, and the advantages of the proposed method are verified by comparative experiments.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MergeTree: a Tree Model with Merged Nodes for Threat Induction 合并树:用于威胁诱导的合并节点树模型
Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren
Threat tree model can clearly organize threat induction information and thus is widely used for risk analysis in software assurance. Threat tree will grow to complicated structures, e.g., the number of nodes and branches, when the threat information grows to a huge volume. To extend the scalability of the threat tree model, we propose a tree model with merged nodes so as to largely decrease the number of nodes and branches. The formal model and dedicated algorithms are proposed in details. The experimental results show the practicality of MergeTree. We also formally analyze the soundness and completeness of the proposed model.
威胁树模型可以清晰地组织威胁诱导信息,因此被广泛应用于软件保障中的风险分析。当威胁信息数量庞大时,威胁树的结构也会变得复杂,例如节点和分支的数量。为了扩展威胁树模型的可扩展性,我们提出了一种合并节点的树模型,从而大大减少了节点和分支的数量。本文详细介绍了形式模型和专用算法。实验结果表明了合并树的实用性。我们还从形式上分析了所提模型的合理性和完整性。
{"title":"MergeTree: a Tree Model with Merged Nodes for Threat Induction","authors":"Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren","doi":"10.1145/3590003.3590012","DOIUrl":"https://doi.org/10.1145/3590003.3590012","url":null,"abstract":"Threat tree model can clearly organize threat induction information and thus is widely used for risk analysis in software assurance. Threat tree will grow to complicated structures, e.g., the number of nodes and branches, when the threat information grows to a huge volume. To extend the scalability of the threat tree model, we propose a tree model with merged nodes so as to largely decrease the number of nodes and branches. The formal model and dedicated algorithms are proposed in details. The experimental results show the practicality of MergeTree. We also formally analyze the soundness and completeness of the proposed model.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-channel Conformance Test Analysis of S-band Dual-polarization Radar s波段双极化雷达双通道一致性测试分析
Yuxin Gong, Qian Zhang, Weijia Sun, Chuancheng Ma, Yucheng Gong, Juxiu Wu, Xiqiang Yuan
The consistency of the dual-channel radar plays a crucial role in the performance of the dual-polarization radar. In theory, the performance of the two channels is required to be completely consistent, but it cannot be completely consistent due to the influence of hardware errors, temperature and noise in practical applications. Therefore, it is necessary to test the consistency of horizontal and vertical channels of radar regularly in business applications. Aiming at this problem, the receiving system of Jinan S-band dual polarization radar is tested by off-line manual testing and online automatic testing. The offline measurement uses two signal sources inside and outside the machine to test separately, it is found that the output power difference between the two channels is too large. After the connection lines of the two channels and the two-channel power divider are exchanged, the output power of the two channels is basically the same. The test results of noise coefficient and echo intensity of the two channels are good and meet the requirement of consistency. CW signal source and TS signal source are used for online automatic test. The amplitude and phase standard deviation of the CW signal and the TS signal meet the requirements of the index. However, TS signal is used to calibrate the received full link, which increases the loss of azimuth rotation joint, so its amplitude and phase standard difference are higher than CW signal. Therefore, it is necessary to test and correct the deviation caused by the rotation joint regularly after running for a long time for the dual polarization radar. The two measurement methods in this paper can effectively detect the dual-channel consistency of radar.
双通道雷达的一致性对双极化雷达的性能起着至关重要的作用。理论上,要求两个通道的性能完全一致,但在实际应用中,由于硬件误差、温度和噪声的影响,不能完全一致。因此,在业务应用中,有必要定期测试雷达水平和垂直信道的一致性。针对这一问题,对济南s波段双极化雷达接收系统进行了离线人工测试和在线自动测试。离线测量采用机内外两个信号源分别测试,发现两个通道输出功率差过大。两个通道的连接线和两个通道的功率分配器交换后,两个通道的输出功率基本相同。两个通道的噪声系数和回波强度测试结果良好,符合一致性要求。在线自动测试采用CW信号源和TS信号源。连续波信号和TS信号的幅值和相位标准差均满足指标要求。但由于接收到的全链路采用TS信号进行校准,增加了方位旋转接头的损耗,因此其幅值和相位标准差均高于连续波信号。因此,双偏振雷达在长时间运行后,有必要定期对旋转接头产生的偏差进行检测和校正。本文提出的两种测量方法都能有效地检测雷达的双通道一致性。
{"title":"Two-channel Conformance Test Analysis of S-band Dual-polarization Radar","authors":"Yuxin Gong, Qian Zhang, Weijia Sun, Chuancheng Ma, Yucheng Gong, Juxiu Wu, Xiqiang Yuan","doi":"10.1145/3590003.3590035","DOIUrl":"https://doi.org/10.1145/3590003.3590035","url":null,"abstract":"The consistency of the dual-channel radar plays a crucial role in the performance of the dual-polarization radar. In theory, the performance of the two channels is required to be completely consistent, but it cannot be completely consistent due to the influence of hardware errors, temperature and noise in practical applications. Therefore, it is necessary to test the consistency of horizontal and vertical channels of radar regularly in business applications. Aiming at this problem, the receiving system of Jinan S-band dual polarization radar is tested by off-line manual testing and online automatic testing. The offline measurement uses two signal sources inside and outside the machine to test separately, it is found that the output power difference between the two channels is too large. After the connection lines of the two channels and the two-channel power divider are exchanged, the output power of the two channels is basically the same. The test results of noise coefficient and echo intensity of the two channels are good and meet the requirement of consistency. CW signal source and TS signal source are used for online automatic test. The amplitude and phase standard deviation of the CW signal and the TS signal meet the requirements of the index. However, TS signal is used to calibrate the received full link, which increases the loss of azimuth rotation joint, so its amplitude and phase standard difference are higher than CW signal. Therefore, it is necessary to test and correct the deviation caused by the rotation joint regularly after running for a long time for the dual polarization radar. The two measurement methods in this paper can effectively detect the dual-channel consistency of radar.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127579495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum kernel subspace alignment for unsupervised domain adaptation 无监督域自适应的量子核子空间对准
Xi He, Feiyu Du
Domain adaptation (DA), the sub-realm of the transfer learning, attempts to deal with machine learning tasks on an unprocessed data domain with the different, but related labeled source domain. However, the classical DA can not efficiently deal with the cross-domain tasks in quantum mechanical scenarios. In this paper, the quantum kernel subspace alignment algorithm is proposed to achieve the procedure of DA by extracting the non-linear features with the quantum kernel method and aligning the two domains with the unitary evolution. The method presented in our work can be implemented on the universal quantum computer with the quantum basic linear algebra subroutines. Based on the algorithmic complexity analysis, the procedure of the QKSA can be implemented with at least quadratic quantum speedup compared with the classical DA algorithms.
领域自适应(DA)是迁移学习的子领域,它试图在未处理的数据域上处理具有不同但相关的标记源域的机器学习任务。然而,经典的数据分析不能有效地处理量子力学场景下的跨域任务。本文提出了量子核子空间对齐算法,通过量子核方法提取非线性特征,并对两个域进行幺正演化对齐,实现数据分析过程。本文提出的方法可以用量子基本线性代数子程序在通用量子计算机上实现。基于算法复杂度分析,与经典的数据挖掘算法相比,QKSA的实现速度至少提高了2倍。
{"title":"Quantum kernel subspace alignment for unsupervised domain adaptation","authors":"Xi He, Feiyu Du","doi":"10.1145/3590003.3590054","DOIUrl":"https://doi.org/10.1145/3590003.3590054","url":null,"abstract":"Domain adaptation (DA), the sub-realm of the transfer learning, attempts to deal with machine learning tasks on an unprocessed data domain with the different, but related labeled source domain. However, the classical DA can not efficiently deal with the cross-domain tasks in quantum mechanical scenarios. In this paper, the quantum kernel subspace alignment algorithm is proposed to achieve the procedure of DA by extracting the non-linear features with the quantum kernel method and aligning the two domains with the unitary evolution. The method presented in our work can be implemented on the universal quantum computer with the quantum basic linear algebra subroutines. Based on the algorithmic complexity analysis, the procedure of the QKSA can be implemented with at least quadratic quantum speedup compared with the classical DA algorithms.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123216542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Monte Carlo Tree Search for Latent Skill Planning 潜在技能规划的分层蒙特卡罗树搜索
Yue Pei
Monte Carlo Tree Search (MCTS) continues to confront the issue of exponential complexity growth in certain tasks when the planning horizon is excessively long, causing the trajectory’s past to grow exponentially. Our study presents Hierarchical MCTS Latent Skill Planner, an algorithm based on skill discovery that automatically identifies skills based on intrinsic rewards and integrates them with MCTS, enabling efficient decision-making at a higher level. In the grid world maze domain, we found that latent skill search outperformed the standard MCTS approach that do not contain skills in terms of efficiency and performance.
蒙特卡洛树搜索(MCTS)在某些任务中,当规划范围过长,导致轨迹的过去呈指数级增长时,仍然面临着指数级复杂性增长的问题。我们的研究提出了一种基于技能发现的分层MCTS潜在技能规划算法,该算法可以根据内在奖励自动识别技能,并将其与MCTS集成,从而实现更高层次的高效决策。在网格世界迷宫领域,我们发现潜在技能搜索在效率和性能上都优于不包含技能的标准MCTS方法。
{"title":"Hierarchical Monte Carlo Tree Search for Latent Skill Planning","authors":"Yue Pei","doi":"10.1145/3590003.3590005","DOIUrl":"https://doi.org/10.1145/3590003.3590005","url":null,"abstract":"Monte Carlo Tree Search (MCTS) continues to confront the issue of exponential complexity growth in certain tasks when the planning horizon is excessively long, causing the trajectory’s past to grow exponentially. Our study presents Hierarchical MCTS Latent Skill Planner, an algorithm based on skill discovery that automatically identifies skills based on intrinsic rewards and integrates them with MCTS, enabling efficient decision-making at a higher level. In the grid world maze domain, we found that latent skill search outperformed the standard MCTS approach that do not contain skills in terms of efficiency and performance.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Identification Method of Gap Nonlinear Vibration 间隙非线性振动辨识方法研究
Jialiang Sun, Jingying Liu
The research of linear vibration has been very mature, but the gap nonlinear element widely exists in the actual structure and vibration system. The general linear vibration theory can not meet the needs of solving the nonlinear dynamic problems of clearance, and the research on the nonlinear vibration of clearance is essential. Based on the description function method, the forced response calculation of linear and nonlinear systems and the nonlinear detection method of clearance systems are studied in this paper. The forced response calculation of linear and clearance nonlinear systems mainly depends on the digital filtering method to realize the corresponding simulation of the system with clearance nonlinear. Based on the definition of linear system, a concrete scheme for judging whether the system contains the nonlinear characteristics of clearance is given. The position identification of the clearance nonlinear system based on the description function and the polynomial fitting inversion of the description function is studied and verified by an example.
线性振动的研究已经非常成熟,但间隙非线性元素广泛存在于实际结构和振动系统中。一般的线性振动理论已不能满足求解间隙非线性动力学问题的需要,对间隙非线性振动的研究是十分必要的。本文基于描述函数法,研究了线性和非线性系统的强迫响应计算以及间隙系统的非线性检测方法。线性和间隙非线性系统的强迫响应计算主要依靠数字滤波方法来实现间隙非线性系统的相应仿真。根据线性系统的定义,给出了判断系统是否包含间隙非线性特性的具体方案。研究了基于描述函数和描述函数的多项式拟合反演的间隙非线性系统的位置识别问题,并通过实例进行了验证。
{"title":"Research on Identification Method of Gap Nonlinear Vibration","authors":"Jialiang Sun, Jingying Liu","doi":"10.1145/3590003.3590138","DOIUrl":"https://doi.org/10.1145/3590003.3590138","url":null,"abstract":"The research of linear vibration has been very mature, but the gap nonlinear element widely exists in the actual structure and vibration system. The general linear vibration theory can not meet the needs of solving the nonlinear dynamic problems of clearance, and the research on the nonlinear vibration of clearance is essential. Based on the description function method, the forced response calculation of linear and nonlinear systems and the nonlinear detection method of clearance systems are studied in this paper. The forced response calculation of linear and clearance nonlinear systems mainly depends on the digital filtering method to realize the corresponding simulation of the system with clearance nonlinear. Based on the definition of linear system, a concrete scheme for judging whether the system contains the nonlinear characteristics of clearance is given. The position identification of the clearance nonlinear system based on the description function and the polynomial fitting inversion of the description function is studied and verified by an example.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124913953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized model analysis of blockchain PoW procotol under long delay attack 长延时攻击下区块链PoW协议的优化模型分析
Tao Feng, Yufeng Liu
Abstract:Proof of work(POW) is one of the most widely used consensus method of bitcoin. In some chains, because of the large number of users, the huge amount of information interaction data, equipment hardware failure or malicious attacks on some nodes may cause communication delay, All of these may engender forks on the blockchain resulting data lose. Therefore, whether the blockchain protocol can achieve sufficient security in the asynchronous network environment with long delay, so how to reduce fork and user's data loss caused by long delay attack are important issue related to blockchain protocol. In this study,we optimized the existing model and proposed TOD to describe the evolution state of the main chain accurately.
摘要:工作量证明(POW)是比特币使用最广泛的共识方法之一。在一些链中,由于用户数量庞大,信息交互数据量巨大,设备硬件故障或某些节点受到恶意攻击,可能导致通信延迟,这些都可能在区块链上产生分叉,导致数据丢失。因此,区块链协议能否在长时延的异步网络环境下实现足够的安全性,从而如何减少长时延攻击导致的分叉和用户数据丢失是与区块链协议相关的重要问题。在本研究中,我们对现有模型进行了优化,提出了TOD来准确描述主链的演化状态。
{"title":"Optimized model analysis of blockchain PoW procotol under long delay attack","authors":"Tao Feng, Yufeng Liu","doi":"10.1145/3590003.3590008","DOIUrl":"https://doi.org/10.1145/3590003.3590008","url":null,"abstract":"Abstract:Proof of work(POW) is one of the most widely used consensus method of bitcoin. In some chains, because of the large number of users, the huge amount of information interaction data, equipment hardware failure or malicious attacks on some nodes may cause communication delay, All of these may engender forks on the blockchain resulting data lose. Therefore, whether the blockchain protocol can achieve sufficient security in the asynchronous network environment with long delay, so how to reduce fork and user's data loss caused by long delay attack are important issue related to blockchain protocol. In this study,we optimized the existing model and proposed TOD to describe the evolution state of the main chain accurately.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Graph representation learning and software homology matching based A study of JAVA code vulnerability detection techniques 基于图表示学习和软件同源匹配的JAVA代码漏洞检测技术研究
Yibin Yang, Xin Bo, Zitong Wang, Xinrui Shao, Xinjie Xie
In nowadays using different tools and apps is a basic need of people's behavior in life, but the security issues arising from the existence of source code plagiarism among tools and apps are likely to bring huge losses to companies and even countries, so detecting the existence of vulnerabilities or malicious code in software becomes an important part of protecting information and detecting software security. This project is based on the aspect of JAVA code vulnerability detection based on graph representation learning and software homology comparison to carry out research. This project will be based on the content of deep learning, using a large number of vulnerable source code, extracting its features, and transforming it into a graph so that it can be tested source code for comparison and report the vulnerability content. The main work and results of this project are as follows: 1.By extracting the example dataset and generating json files to save the feature information of relevant java code; by generating vector files, bytecode files and dot files, and batch extracting nodes and edges based on the contents of the dot files for subsequent machine learning use, the before and after steps and operations form a logical self-consistency to ensure the integrity of the project. 2.Through the study of graph neural networks and graph convolutional neural networks, relevant models are selected for machine learning using predecessor files and manual model tuning is performed to ensure good learning results and feedback for the machine learning part of the project. 3.This project training dataset negative samples for sard above the shared dataset, which contains 46636 java vulnerability source code, and dataset support environment, test dataset negative samples dataset also from sard, positive samples dataset are generated from the relevant person in charge. 4.Based on Graph Neural Network (GNN) and Graph Convolutional Neural Network (GCN), this project will design and implement a whole set of automated vulnerability detection system for java code. 5. All the related contents of this project, after the human extensive search of domestic and foreign related papers and materials, there are not all projects or contents similar to this project, the same papers and materials appear, all the problems involved in this project and related ideas are for the project this group of people thinking, looking for solutions.
如今,使用不同的工具和应用程序是人们生活行为的基本需求,但工具和应用程序之间存在源代码抄袭而产生的安全问题很可能给公司甚至国家带来巨大的损失,因此检测软件中是否存在漏洞或恶意代码成为保护信息和检测软件安全的重要组成部分。本项目是基于基于图表示学习的JAVA代码漏洞检测和软件同源性比较方面进行研究。本项目将以深度学习的内容为基础,利用大量的漏洞源代码,提取其特征,并将其转换成图形,以便测试源代码进行比对,并报告漏洞内容。本课题的主要工作和成果如下:1。通过提取样例数据集并生成json文件保存相关java代码的特征信息;通过生成矢量文件、字节码文件和点文件,并根据点文件的内容批量提取节点和边供后续机器学习使用,前后步骤和操作形成逻辑自一致性,保证项目的完整性。2.通过对图神经网络和图卷积神经网络的研究,利用前驱文件选择相关模型进行机器学习,并进行人工模型调优,确保项目机器学习部分有良好的学习效果和反馈。3.。本项目训练数据集的负样本为sard以上的共享数据集,其中包含46636个java漏洞源代码,并且数据集支持环境,测试数据集的负样本数据集也来自sard,正样本数据集由相关负责人生成。4.本项目将基于图神经网络(GNN)和图卷积神经网络(GCN),设计并实现一套完整的java代码漏洞自动检测系统。5. 本项目的所有相关内容,经过对国内外相关论文和资料的人工广泛检索,并不是所有的项目或内容都与本项目相似,相同的论文和资料出现,本项目所涉及的所有问题和相关思路都是针对本项目这群人的思考,寻找解决方案。
{"title":"Graph representation learning and software homology matching based A study of JAVA code vulnerability detection techniques","authors":"Yibin Yang, Xin Bo, Zitong Wang, Xinrui Shao, Xinjie Xie","doi":"10.1145/3590003.3590028","DOIUrl":"https://doi.org/10.1145/3590003.3590028","url":null,"abstract":"In nowadays using different tools and apps is a basic need of people's behavior in life, but the security issues arising from the existence of source code plagiarism among tools and apps are likely to bring huge losses to companies and even countries, so detecting the existence of vulnerabilities or malicious code in software becomes an important part of protecting information and detecting software security. This project is based on the aspect of JAVA code vulnerability detection based on graph representation learning and software homology comparison to carry out research. This project will be based on the content of deep learning, using a large number of vulnerable source code, extracting its features, and transforming it into a graph so that it can be tested source code for comparison and report the vulnerability content. The main work and results of this project are as follows: 1.By extracting the example dataset and generating json files to save the feature information of relevant java code; by generating vector files, bytecode files and dot files, and batch extracting nodes and edges based on the contents of the dot files for subsequent machine learning use, the before and after steps and operations form a logical self-consistency to ensure the integrity of the project. 2.Through the study of graph neural networks and graph convolutional neural networks, relevant models are selected for machine learning using predecessor files and manual model tuning is performed to ensure good learning results and feedback for the machine learning part of the project. 3.This project training dataset negative samples for sard above the shared dataset, which contains 46636 java vulnerability source code, and dataset support environment, test dataset negative samples dataset also from sard, positive samples dataset are generated from the relevant person in charge. 4.Based on Graph Neural Network (GNN) and Graph Convolutional Neural Network (GCN), this project will design and implement a whole set of automated vulnerability detection system for java code. 5. All the related contents of this project, after the human extensive search of domestic and foreign related papers and materials, there are not all projects or contents similar to this project, the same papers and materials appear, all the problems involved in this project and related ideas are for the project this group of people thinking, looking for solutions.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infrared small target detection based on the combination of single image super-resolution reconstruction and YOLOX 基于单幅图像超分辨重建与YOLOX相结合的红外小目标检测
Zhiyong Wang, Xuefu Xiang, Kan Zeng, Zhenyu Zhang, Yanan Li, Dengpan Song
For the infrared search and tracking system, it is necessary to increase the ability to detect small infrared targets against complex backgrounds. YOLOX is a high-performance detector, but its detection performance is constrained when it uses data from low-resolution infrared images with small targets. However, occasionally design constraints and budgetary restraints will prevent the optical system and sensor resolution from being increased enough to improve image quality. Real-ESRGAN is used to solve this issue by reconstructing a high-resolution infrared image from its low-resolution counterpart, which will be used as YOLOX-S's input. Also, the YOLOX-S training strategy is modified further to make it appropriate for the detection of infrared small targets, including the Mosaic and MixUp data augmentation and the size of ground-truth. The average precision achieved by the suggested method in this work increases from 63.70% to 77.19%, which shows a considerable improvement in infrared small target detection when compared with the original model by inputting original images.
对于红外搜索跟踪系统来说,必须提高对复杂背景下红外小目标的检测能力。YOLOX是一种高性能探测器,但是当它使用带有小目标的低分辨率红外图像数据时,其探测性能受到限制。然而,偶尔的设计限制和预算限制将阻止光学系统和传感器分辨率提高到足以提高图像质量。Real-ESRGAN通过从低分辨率红外图像中重建高分辨率红外图像来解决这个问题,该图像将被用作YOLOX-S的输入。此外,进一步修改了YOLOX-S训练策略,使其适合红外小目标的检测,包括马赛克和混合数据增强和地面真值的大小。本文方法的平均精度从63.70%提高到77.19%,与输入原始图像的原始模型相比,对红外小目标的检测有了较大的提高。
{"title":"Infrared small target detection based on the combination of single image super-resolution reconstruction and YOLOX","authors":"Zhiyong Wang, Xuefu Xiang, Kan Zeng, Zhenyu Zhang, Yanan Li, Dengpan Song","doi":"10.1145/3590003.3590104","DOIUrl":"https://doi.org/10.1145/3590003.3590104","url":null,"abstract":"For the infrared search and tracking system, it is necessary to increase the ability to detect small infrared targets against complex backgrounds. YOLOX is a high-performance detector, but its detection performance is constrained when it uses data from low-resolution infrared images with small targets. However, occasionally design constraints and budgetary restraints will prevent the optical system and sensor resolution from being increased enough to improve image quality. Real-ESRGAN is used to solve this issue by reconstructing a high-resolution infrared image from its low-resolution counterpart, which will be used as YOLOX-S's input. Also, the YOLOX-S training strategy is modified further to make it appropriate for the detection of infrared small targets, including the Mosaic and MixUp data augmentation and the size of ground-truth. The average precision achieved by the suggested method in this work increases from 63.70% to 77.19%, which shows a considerable improvement in infrared small target detection when compared with the original model by inputting original images.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130243717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADCapsNet: An Efficient and Robust Capsule Network Model for Anomaly Detection ADCapsNet:一种高效鲁棒的异常检测胶囊网络模型
Xiangyu Cai, Ruliang Xiao, Zhixia Zeng, Ping Gong, Shenmin Zhang
With the rapid development of the industrial internet of things(IIoT), the anomalies will cause significant damage to the ordinary operation of the industry. Anomaly detection work has increasingly become a hot spot. Although many related kinds of research exist, some problems still need to be solved. This paper proposes an efficient and robust semi-supervised capsule network (ADCapsNet) for anomaly detection by changing the convolution structure to better extract the features of the data and adding a new SecondaryCaps layer to better extract spatial relationships. Besides, we optimize the vector selection for dynamic anomaly detection routing and propose the scoring operation, the modified probability mechanism. The modified probability mechanism can widen the score gap between positive and negative samples. This model can accurately identify and output the spatial relationships. Extensive experiments on four datasets show that the ADCapsNet has good performance in anomaly detection.
随着工业物联网(IIoT)的快速发展,异常会对工业的正常运行造成重大破坏。异常检测工作日益成为研究的热点。虽然已有许多相关的研究,但仍有一些问题需要解决。本文提出了一种高效鲁棒的半监督胶囊网络(ADCapsNet)用于异常检测,通过改变卷积结构来更好地提取数据特征,并增加新的SecondaryCaps层来更好地提取空间关系。此外,对动态异常检测路由的向量选择进行了优化,并提出了改进的概率机制——评分操作。修正后的概率机制可以扩大正负样本之间的得分差距。该模型能够准确地识别和输出空间关系。在4个数据集上的大量实验表明,ADCapsNet具有良好的异常检测性能。
{"title":"ADCapsNet: An Efficient and Robust Capsule Network Model for Anomaly Detection","authors":"Xiangyu Cai, Ruliang Xiao, Zhixia Zeng, Ping Gong, Shenmin Zhang","doi":"10.1145/3590003.3590009","DOIUrl":"https://doi.org/10.1145/3590003.3590009","url":null,"abstract":"With the rapid development of the industrial internet of things(IIoT), the anomalies will cause significant damage to the ordinary operation of the industry. Anomaly detection work has increasingly become a hot spot. Although many related kinds of research exist, some problems still need to be solved. This paper proposes an efficient and robust semi-supervised capsule network (ADCapsNet) for anomaly detection by changing the convolution structure to better extract the features of the data and adding a new SecondaryCaps layer to better extract spatial relationships. Besides, we optimize the vector selection for dynamic anomaly detection routing and propose the scoring operation, the modified probability mechanism. The modified probability mechanism can widen the score gap between positive and negative samples. This model can accurately identify and output the spatial relationships. Extensive experiments on four datasets show that the ADCapsNet has good performance in anomaly detection.","PeriodicalId":340225,"journal":{"name":"Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124603164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1