Zobrazeno 1 - 10
of 2 587
pro vyhledávání: '"MA Jianfeng"'
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Publikováno v:
网络与信息安全学报, Vol 10, Pp 38-51 (2024)
Distributed computing systems based on cloud-edge-device have been successfully serving thousands of applications and have become mainstream, characterized by a wide audience, high user experience requirements, and high security expectations. However
Externí odkaz:
https://doaj.org/article/16b436b91de9463898692d50a30e66a9
Publikováno v:
Tongxin xuebao, Vol 45, Pp 95-113 (2024)
To address the issues of inaccurate parsing and unstable performance in existing log parsing methods, a streaming online log parsing method based on heuristic rules, known as heuristic regex tree (HRTree), was proposed. Based on the drain method of p
Externí odkaz:
https://doaj.org/article/855d438b65884cdb9ed4f33ced8fb050
Autor:
Ma Jianfeng, Gan Mailin, Yang Yiting, Chen Lei, Zhao Ye, Niu Lili, Wang Yan, Zhang Shunhua, Wang Jingyong, Zhu Li, Shen Linyuan
Publikováno v:
Scientific Data, Vol 11, Iss 1, Pp 1-1 (2024)
Externí odkaz:
https://doaj.org/article/30ea2083574048fb9dc0ac649ae19b64
Autor:
Ma Jianfeng, Gan Mailin, Yang Yiting, Chen Lei, Zhao Ye, Niu Lili, Wang Yan, Zhang Shunhua, Wang Jingyong, Zhu Li, Shen Linyuan
Publikováno v:
Scientific Data, Vol 10, Iss 1, Pp 1-10 (2023)
Abstract Intrauterine growth restriction (IUGR) impairs neonatal weight and causes multiple organ dysplasia. IUGR not only threatens human health but is also a significant constraint to the development of animal husbandry. However, the molecular mech
Externí odkaz:
https://doaj.org/article/2f146a252c4742949c9aa4136aac983b
Autor:
Qiao, Wei, Feng, Yebo, Li, Teng, Zhang, Zijian, Xu, Zhengzi, Ma, Zhuo, Shen, Yulong, Ma, JianFeng, Liu, Yang
Advanced Persistent Threats (APTs) represent sophisticated cyberattacks characterized by their ability to remain undetected within the victim system for extended periods, aiming to exfiltrate sensitive data or disrupt operations. Existing detection a
Externí odkaz:
http://arxiv.org/abs/2410.17910
Metaverse is a vast virtual world parallel to the physical world, where the user acts as an avatar to enjoy various services that break through the temporal and spatial limitations of the physical world. Metaverse allows users to create arbitrary dig
Externí odkaz:
http://arxiv.org/abs/2409.10850
Publikováno v:
Ceramics-Silikáty, Vol 65, Iss 2, Pp 176-186 (2021)
Ceramsite was sintered using coal gasification slag, fly ash, construction spoils, and municipal sludge. The influence of the municipal sludge content on the ceramsite performance was studied by TG-DSC, XRD, MIP, and SEM. The optimal sintering condit
Externí odkaz:
https://doaj.org/article/6edb2ab3ac7a467f8cf958d714195677
Autor:
WU Qixuan, MA Jianfeng, SUN Cong
Publikováno v:
网络与信息安全学报, Vol 5, Iss 2, Pp 50-57 (2019)
In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events, an integrity threat tree to quantify the integrity of the system information flow, and the co
Externí odkaz:
https://doaj.org/article/372767669e5543799522325591fead5c
Memory corruption attacks (MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or perturbations to ongoing proces
Externí odkaz:
http://arxiv.org/abs/2309.05978
Autor:
Niu, Jun, Zhu, Xiaoyan, Zeng, Moxuan, Zhang, Ge, Zhao, Qingyang, Huang, Chunhui, Zhang, Yangming, An, Suyu, Wang, Yangzhong, Yue, Xinghui, He, Zhipeng, Guo, Weihao, Shen, Kuo, Liu, Peng, Shen, Yulong, Jiang, Xiaohong, Ma, Jianfeng, Zhang, Yuqing
Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. However, it has been increasingly recognized that the "comparing different MI attacks" methodology used in the
Externí odkaz:
http://arxiv.org/abs/2307.06123