-
1
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
2
The small non-coding RNA response to virus infection in the Leishmania vector Lutzomyia longipalpis.
Published 2018-06-01“…RNA interference (RNAi) mechanisms utilize small non-coding RNAs to regulate different aspects of host-pathogen interactions. …”
Get full text
Article -
3
Characterization of Sus scrofa small non-coding RNAs present in both female and male gonads.
Published 2014-01-01“…Small non-coding RNAs (sncRNAs) are indispensable for proper germ cell development, emphasizing the need for greater elucidation of the mechanisms of germline development and regulation of this process by sncRNAs. …”
Get full text
Article -
4
A dataset of hidden small non-coding RNA in the testis of heat-stressed models revealed by Pandora-seq
Published 2024-07-01“…In this study, we utilized Pandora-seq technology to detect the small non-coding RNAs (sncRNAs) expression profile in the testicular tissue of heat-stressed mice. …”
Get full text
Article -
5
Optimal Design of Linear Space Code for MIMO Optical Wireless Communications
Published 2016-01-01“…In this paper, the design of linear full-diversity space code (FDSC) is considered for an intensity-modulated direct-detection multiple-input–multiple-output optical wireless communication (IM/DD MIMO-OWC) system, in which the channel suffers from log-normal fading and different links have different variances. …”
Get full text
Article -
6
Small target detection in coal mine underground based on improved RTDETR algorithm
Published 2025-04-01“…In order to increase the accuracy of tiny object detection and concentrate on the detail information in the shallow feature map, the small object detection layer P2 is simultaneously added to the Head of the coding section. …”
Get full text
Article -
7
DiallelX: a modern fortran code for calculating network cross-correlation
Published 2025-05-01“…Abstract In this paper, we develop a modern Fortran code to approximate network cross-correlation coefficients for seismic event detection. …”
Get full text
Article -
8
Two approaches to multiuser detection over fading channels
Published 2021-02-01“…In this paper, two different receiver structures to multiuser detection that are appropriate for the code-division multiple-access systems with antenna arrays in fading channels are investigated and compared. …”
Get full text
Article -
9
Fusion of multi-scale attention for aerial images small-target detection model based on PARE-YOLO
Published 2025-02-01“…Additionally, it incorporates a lightweight detection head that is optimized for small objects, thereby significantly improving detection performance in cluttered and intricate backgrounds. …”
Get full text
Article -
10
Welding defect detection with image processing on a custom small dataset: A comparative study
Published 2024-12-01“…It lays the groundwork for future exploration in larger datasets and varied welding scenarios, potentially contributing to defect detection practices in manufacturing industries. The dataset and the code repository links are also provided to support our findings.…”
Get full text
Article -
11
Small sample smart contract vulnerability detection method based on multi-layer feature fusion
Published 2025-03-01Get full text
Article -
12
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…The model achieves precision on par with existing mainstream algorithms, while being simpler, significantly reducing computational requirements, and being more suitable for small target detection tasks. The source code and test results of the models used in this study are available at https://github.com/lyzzzzyy/CSW-YOLO.git.…”
Get full text
Article -
13
X-SPIDE: An eXplainable Machine Learning Pipeline for Detecting Smart Ponzi Contracts in Ethereum
Published 2025-01-01Get full text
Article -
14
CSSDet: small object detection via cross-scale feature enhancement on drone-view images
Published 2024-12-01“…Quantitative results from the experiments indicate that the proposed CSSDet achieves optimal performance across a wide range of evaluation metrics, with particular strengths demonstrated in multi-scale object detection and small-size object detection. Qualitative results showcase its remarkable effectiveness in various aspects of object detection, including small object detection, objects at different scales and categories, multi-perspective scenarios, and complex scenes. …”
Get full text
Article -
15
Detectability of Emission from Exoplanet Outflows Calculated by pyTPCI, a New 1D Radiation-hydrodynamic Code
Published 2025-01-01“…Photoevaporation in exoplanet atmospheres is thought to contribute to the shaping of the small planet radius valley. Escaping atmospheres have been detected in transmission across a variety of exoplanet types, from hot Jupiters to mini-Neptunes. …”
Get full text
Article -
16
Bioinformatics approach to processing data from high-throughput sequencing of small RNA molecules
Published 2025-01-01Get full text
Article -
17
Characterization of small nucleolar RNA retaining transcripts in human normal and cancer cells
Published 2025-08-01“…Small nucleolar RNAs are non-coding RNAs typically encoded within the introns of both protein-coding and non-coding genes. …”
Get full text
Article -
18
Deep generative AI models analyzing circulating orphan non-coding RNAs enable detection of early-stage lung cancer
Published 2024-11-01“…In this study, we analyze orphan non-coding RNAs (oncRNAs) from serum samples of 1050 individuals diagnosed with non-small cell lung cancer (NSCLC) at various stages, as well as sex-, age-, and BMI-matched controls. …”
Get full text
Article -
19
-
20
LMSOE-Net: lightweight multi-scale small object enhancement network for UAV aerial images
Published 2025-06-01“…Abstract Detecting objects of varying scales, especially small ones, in Unmanned Aerial Vehicle (UAV) aerial images across diverse scenarios and viewpoints using onboard edge devices is a major challenge in computer vision. …”
Get full text
Article