Zobrazeno 1 - 10
of 415
pro vyhledávání: '"Binxing Fang"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-22 (2024)
Abstract Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs. Existing work has shown that coverage metrics are a crucial factor in guiding fuzzing exploration of targets. A fine-grained coverage metric can help f
Externí odkaz:
https://doaj.org/article/2a3aa1684e6a4842b746790c1441a5d0
Publikováno v:
Mathematics, Vol 12, Iss 19, p 3114 (2024)
To facilitate a direct comparison of the differences in network resources among countries worldwide, this paper proposes a method for quantifying the relationship between autonomous systems and territorial networks from the perspective of network top
Externí odkaz:
https://doaj.org/article/de31d573c76f441e849d4c5984084e61
Publikováno v:
网络与信息安全学报, Vol 9, Pp 178-188 (2023)
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cy
Externí odkaz:
https://doaj.org/article/77907540f12047c192c71751a786e5af
Publikováno v:
Tongxin xuebao, Vol 44, Pp 49-63 (2023)
Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled,
Externí odkaz:
https://doaj.org/article/fba08b07166e42b689fcb629c5d2720d
Publikováno v:
网络与信息安全学报, Vol 8, Pp 182-189 (2022)
The machine learning is different from other courses for its large span of mathematical knowledge, widely application of techniques, and fast updating of models.In traditional machine learning classes, due to the separation between review of mathemat
Externí odkaz:
https://doaj.org/article/a6c6e0b66cf14dc59d4fdc2515bd4185
Publikováno v:
Asian Pacific Journal of Tropical Medicine, Vol 14, Iss 9, Pp 417-428 (2021)
Objective: To determine the most influential data features and to develop machine learning approaches that best predict hospital readmissions among patients with diabetes. Methods: In this retrospective cohort study, we surveyed patient statistics an
Externí odkaz:
https://doaj.org/article/9b452c07ad8d4d189d637c3b373c071b
Publikováno v:
Tongxin xuebao, Vol 41, Pp 55-65 (2020)
To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic p
Externí odkaz:
https://doaj.org/article/de825140992d42cd88464d8d4c1713a9
Publikováno v:
IEEE Access, Vol 8, Pp 68449-68459 (2020)
Browser-based cloud storage services are still broadly used in enterprises for online sharing and collaboration. However, sensitive information in images or documents may be easily leaked outside trusted enterprise on-premises due to such cloud servi
Externí odkaz:
https://doaj.org/article/f39d7e35a7764bb08f2b4586368b004a
Publikováno v:
Tongxin xuebao, Vol 40, Pp 1-9 (2019)
The rapid development of online social networks leads to an explosion of information,however,there are great differences in the popularity of different messages,and accurate prediction is always a great difficulty is the current study.Popularity pred
Externí odkaz:
https://doaj.org/article/5a533e6044cf40fe9007ef6517687be8
Publikováno v:
IEEE Access, Vol 7, Pp 62817-62832 (2019)
In real-world networks, an edge (or vertex) may be associated with a transaction database, where each transaction consists of a set of items to describe the attributes or behaviors of the edge (or vertex). This type of graph is named as a transaction
Externí odkaz:
https://doaj.org/article/ff404445fd984a31bd0b9e3f8fabf65e