Suggested Topics within your search.
Suggested Topics within your search.
- Enterprise application integration (Computer systems) 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Management information systems 1
- Mass media 1
- Mass media and technology 1
- Philosophy 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
- Study and teaching 1
- Technological innovations 1
-
41
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
42
A Semantic Segmentation Method for Winter Wheat in North China Based on Improved HRNet
Published 2024-10-01“…Compared to traditional methods, our model demonstrated better segmentation performance in winter wheat semantic segmentation tasks. …”
Get full text
Article -
43
Face Detection Method based on Lightweight Network and Weak Semantic Segmentation Attention Mechanism
Published 2022-01-01“…A face detection method based on lightweight network and weak semantic segmentation attention mechanism is proposed in this paper, aiming at the problems of low detection accuracy and slow detection speed in face detection in complex scenes. …”
Get full text
Article -
44
THE PRINCIPLES AND METHODS OF INFORMATION AND EDUCATIONAL SPACE SEMANTIC STRUCTURING BASED ON ONTOLOGIC APPROACH REALIZATION
Published 2016-08-01“…This article reveals principles of semantic structuring of information and educational space of objects of knowledge and scientific and educational services with use of methods of ontologic engineering. …”
Get full text
Article -
45
Secondary Operation Risk Assessment Method Integrating Graph Convolutional Networks and Semantic Embeddings
Published 2025-03-01“…Finally, the model employs a hybrid similarity measurement mechanism that comprehensively considers both semantic and structural features, combining K-means clustering similarity search with a multi-node weighted evaluation method to achieve efficient and accurate risk assessment. …”
Get full text
Article -
46
A Multi-Semantic Feature Fusion Method for Complex Address Matching of Chinese Addresses
Published 2025-06-01“…This paper proposes a multi-semantic feature fusion method for complex address matching of Chinese addresses that formulates address matching as a classification task that directly predicts whether two addresses refer to the same location, without relying on predefined similarity thresholds. …”
Get full text
Article -
47
Precise Feature Removal Method Based on Semantic and Geometric Dual Masks in Dynamic SLAM
Published 2025-06-01“…The proposed method first identifies outlier feature points through rigorous geometric consistency checks, then employs morphological dilation to expand the initially detected dynamic regions. …”
Get full text
Article -
48
A method for feature division of Soccer Foul actions based on salience image semantics
Published 2025-01-01Get full text
Article -
49
Building extraction method for aerial images based on DeepLabv3+ semantic segmentation
Published 2024-12-01Get full text
Article -
50
A Multi-Branch Attention Fusion Method for Semantic Segmentation of Remote Sensing Images
Published 2025-05-01“…To address these challenges in remote sensing image semantic segmentation, we propose a highly generalizable multi-branch attention fusion method based on shallow and deep features. …”
Get full text
Article -
51
A Semantically Enhanced Label Prediction Method for Imbalanced POI Data Category Distribution
Published 2024-10-01“…This result surpasses the performance of traditional methods, highlighting the effectiveness of the proposed method.…”
Get full text
Article -
52
A method for feature division of Soccer Foul actions based on salience image semantics.
Published 2025-01-01Get full text
Article -
53
SNN-Based Semantic Segmentation Method Using Adaptive Threshold and Multi-Feature Fusion
Published 2024-12-01“…Additionally, the proposed method consumed less energy compared to ANN-based semantic segmentation algorithms.…”
Get full text
Article -
54
A Localization Method for UAV Aerial Images Based on Semantic Topological Feature Matching
Published 2025-05-01“…In order to address the problem of Unmanned Aerial Vehicles (UAVs) being difficult to locate in environments without Global Navigation Satellite System (GNSS) signals or with weak signals, this paper proposes a localization method for UAV aerial images based on semantic topological feature matching. …”
Get full text
Article -
55
Liver Semantic Segmentation Method Based on Multi-Channel Feature Extraction and Cross Fusion
Published 2025-06-01“…To address these challenges, this study proposes an improved U-Net-based liver semantic segmentation method that enhances segmentation performance through optimized feature extraction and fusion mechanisms. …”
Get full text
Article -
56
Semantic Segmentation Method for High-Resolution Tomato Seedling Point Clouds Based on Sparse Convolution
Published 2024-12-01“…However, existing semantic segmentation methods often suffer from issues such as low precision and slow inference speed. …”
Get full text
Article -
57
Novel channel attention-based filter pruning methods for low-complexity semantic segmentation models
Published 2025-09-01“…While the aforementioned models have been deemed very successful in segmenting medical targets including organs and diseases in high resolution images, the computational complexity represents a burden for the real-time application of the algorithms or the deployment of the models on resource-constrained platforms. Until recently, few methods have been introduced for optimizing or pruning of the parameters of the semantic segmentation models. …”
Get full text
Article -
58
Improved Indoor 3D Point Cloud Semantic Segmentation Method Based on PointNet++
Published 2025-01-01Get full text
Article -
59
Possibilities of Searching for Linguistic Means of Expressing Semantic Categories in Translation by Using Corpus-Based Methods
Published 2022-02-01Subjects: Get full text
Article -
60
Intrusion detection method based on hierarchical hidden Markov model and variable-length semantic pattern
Published 2010-01-01“…The defects of intrusion detection using fixed-length short system call sequences were analyzed. A method of extracting variable-length short system call sequences, grounded on the function return addresses stored in the process stacks, was proposed. …”
Get full text
Article