Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Mingqi LV"'
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-15 (2024)
Abstract Smart contracts have significant losses due to various types of vulnerabilities. However, traditional vulnerability detection methods rely extensively on expert rules, resulting in low detection accuracy and poor adaptability to novel attack
Externí odkaz:
https://doaj.org/article/b5efcd0eeddb4fe09c9afbf409f90ea0
Autor:
Haixia Long, Zihao Chen, Xinli Xu, Qianwei Zhou, Zhaolin Fang, Mingqi Lv, Xu-Hua Yang, Jie Xiao, Hui Sun, Ming Fan
Publikováno v:
NeuroImage, Vol 297, Iss , Pp 120722- (2024)
Previous studies have shown that major depressive disorder (MDD) patients exhibit structural and functional impairments, but few studies have investigated changes in higher-order coupling between structure and function. Here, we systematically invest
Externí odkaz:
https://doaj.org/article/1e623043cf10482eb55934c23f427835
Publikováno v:
Dianxin kexue, Vol 36, Pp 136-145 (2020)
In the context of the industrial internet,automatic and effective anomaly detection methods are of great significance to the safe and stable production of industrial systems.Traditional anomaly detection methods have the disadvantages of requiring a
Externí odkaz:
https://doaj.org/article/9d707307b00b4fda8033a7925e075566
Publikováno v:
Applied Sciences, Vol 12, Iss 24, p 12946 (2022)
The language inclusion checking of timed automata is described as the following: given two timed automata M and N, where M is a system model and N is a specification model (which represents the properties that the system needs to satisfy), check whet
Externí odkaz:
https://doaj.org/article/f970b381febb45bd8e30ad0b7f3fc867
Publikováno v:
Dianxin kexue, Vol 35, Pp 9-17 (2019)
A new Android malware detection method based on byte-code image and deep learning was proposed. Firstly, Android malware byte-code files were mapped to RGB colorful images which had three channels. Also, the Shannon entropy as Alpha channel of images
Externí odkaz:
https://doaj.org/article/23ffcb1984c44461b1135a33776ba902
Publikováno v:
Applied Sciences, Vol 11, Iss 16, p 7188 (2021)
Malicious HTTP traffic detection plays an important role in web application security. Most existing work applies machine learning and deep learning techniques to build the malicious HTTP traffic detection model. However, they still suffer from the pr
Externí odkaz:
https://doaj.org/article/56c24930f8764524b2a3aa5ec0be9947
Autor:
Jie Ying, Tiantian Zhu, Qiang Liu, Chunlin Xiong, Zhengqiu Weng, Tieming Chen, Lei Fu, Mingqi Lv, Han Wu, Ting Wang, Yan Chen
Publikováno v:
IEEE Transactions on Mobile Computing. :1-18
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 23:17201-17211
Publikováno v:
IEEE Transactions on Mobile Computing. 21:2967-2977
Trajectory prediction for mobile phone users is a cornerstone component to support many higher-level applications in LBSs (Location-Based Services). Most existing methods are designed based on the assumption that the explicit location information of
Autor:
Tiantian Zhu, Yan Chen, Chen Yuan, Zhengqiu Weng, Song Qijie, Tieming Chen, Qiang Liu, Mingqi Lv
Publikováno v:
IEEE Transactions on Mobile Computing. 21:555-572