- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Data Management and Algorithms
- Spectroscopy and Chemometric Analyses
- Advanced Chemical Sensor Technologies
- Advanced Database Systems and Queries
- Remote Sensing and Land Use
- Recommender Systems and Techniques
- Video Surveillance and Tracking Methods
- Digital and Cyber Forensics
- Water Quality Monitoring and Analysis
- Web Data Mining and Analysis
- Fire Detection and Safety Systems
- Complex Network Analysis Techniques
- Radiation Effects in Electronics
- Adversarial Robustness in Machine Learning
- Machine Learning and Data Classification
- Metaheuristic Optimization Algorithms Research
- Crystallography and molecular interactions
- Infrared Target Detection Methodologies
- Cryptographic Implementations and Security
- IoT-based Smart Home Systems
- Bayesian Modeling and Causal Inference
Chinese Academy of Sciences
2001-2024
Institute of Intelligent Machines
2012-2024
Hefei Institutes of Physical Science
2017-2024
University of Science and Technology of China
2021
University of Tsukuba
2004-2005
Fujian Institute of Research on the Structure of Matter
2001
Rapid, nondestructive and accurate detection of internal qualities the apple is an important research interest. In this study, brix, acidity brix/acidity ratio were rapidly detected by visible near-infrared spectroscopy (VIS-NIRS). By scanning spectra measuring reference values brix samples, relationship models between acidity, were, respectively, established. Sample division, characteristic wavelength optimization, modeling methods compared systematically, optimal prediction model each...
Selecting the decisive characteristic variables is particularly important to analyze soluble solids content (SSC) of an apple with visible/near-infrared spectroscopy (VIS-NIRS) technology. The multi-population genetic algorithm (MPGA) was applied variable selection for first time, best our knowledge. A hybrid method combined competitive adaptive reweighted sampling (CARS) MPGA (CARS-MPGA) proposed. In this method, CARS firstly used shrink space, and then further fine select variables. Based...
API call sequence-based approaches are proven to have significant superiority in malware detection but generally overlook or evade two core issues: ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</i> ) ignoring parameters and return values that contain more fine-grained security semantic sensitive information (SSSI) xmlns:xlink="http://www.w3.org/1999/xlink">ii</i> handling lengthy sequences roughly, causing the poor interpretability...
This study proposed an improved variable selection method based on causality analysis(CA), which effectively mined the influence mechanism of sugar substances apple brix detection, to improve accuracy prediction model. The approach is: by selecting feature wavelengths with strong causal relationship weighted screen strongest set correlating target variable. selected is used as input construct model partial least squares. experimental analysis "Red Fuji" spectral dataset showed that R2 7%,...
<title>Abstract</title> Timely detection of fires can significantly reduce the damage caused by them. Current fire algorithms are rarely designed specifically for endpoint devices, which results in slow execution on these devices. To address this issue, we investigate use single-stage target methods rapid and effective chips equipped with Neural Processing Units(NPUs). Our algorithm is consideration factors not accounted indicator Floating Point Operations (FLOPs), as well unique...
With the development of social networks, microblog has become major communication tool. There is a lot valuable information such as personal preference, public opinion, and marketing in microblog. Consequently, research on user interest prediction positive practical significance. In fact, how to extract associated with orientation from constantly updated blog posts not so easy. Existing approaches based probabilistic factor analysis use published by predict interest. However, these methods...
The soil moisture node and water-saving irragation distribute in the farmland constituted Wireless Sensor Network(WSN) of system via communication technology Internet Of Things(IOT) like ZigBee,3G/4G so on.Intelligent sensor collect data send to data-serving platform stored through WSN.Data-serving using sets build prediction model by grey method GM(1,1) neural network.The result combine with crop varieties irrigation threshod value make policy irrigated amount,the irriagtion nodes as...
In most profiles, while memory forensics analysis has been used to detect and defend attacks successfully, there are still many that we can't discover in time. Therefore, the live tracking of process an important research subject for a long For this reason, propose new method called MRB-PTE (Marking Reserved Bit Page Table Entry). It sets one reserved bits target page table PTE capture behavior process, which enables us track memory, it's featured with real time, lightweight overhead...
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security cryptosystem. These attacks continuously monitor memory addresses associated with victim’s secret information, which cause frequent access on these addresses. This paper proposes CacheHawkeye, uses characteristic attacker to detect attacks. CacheHawkeye monitors events by CPU hardware performance counters. We proved effectiveness Flush+Reload and Flush+Flush In addition, we evaluated accuracy under...
With the development of Cloud computing, more and people are accustomed to resource sharing or online shopping.And malware has become a major threat safety.Process hiding is powerful technique commonly used by stealthy evade detection anti-malware.In this paper, we present novel approach called VMPmonitor-an efficient modularity for hidden process detection.With help guest OS register information (mainly ESP) collected virtual machine monitor, VMPmonitor can implicitly capture target...
As a significant mean for users sharing useful information, microblogs have played an important role in people daily life. People are overwhelmed large amount of updated microblog information. It becomes increasing necessary social network to be recommended information interest them. In order meet the demand we put forward new method user prediction. Previous works focused on analyzing user’s relations and time by observing users’ history behavior. We extend currently approach...
Xen through the Dom0 to manage and control other guest domains enhance utilization efficiency of resources, but it also introduces new security risks. This paper presents a kernel-module-based model for active passive coexistence attacks in virtualization environment. The attack mode VirtAPCA can destroy all network-based services Dom0, offers ability steal domain user's privacy information. has hidden self-protection features that evade system checking deletion. Experiments show...
A new object tracking algorithm based on hierarchical siamese network is proposed to solve the challenges of target deformation and background interference in tasks. The introduction features makes up for lack information caused by too small target. similarity measure mechanism firstly learned through matching training extracted annotated datasets. Online achieved searching candidate images at multiple scales around center previous frame. adaptive examplar first frame exemplar are used...
Out-of-box methods can provide strict isolation between the security tool and target virtual machine (TVM), so they have strong anti-jamming abilities. Current monitoring are mostly based on memory snapshots at a time point or fixed period. Due to randomness of processes discontinuity methods, period that tools used monitor may result in high leakage rate. The real-time method be resolve this problem. However, all current require ready set, their range is strictly limited. They only...
It has been proved that the modified form of ridge regularized linear models (MRRLMs) can get "very close" to identifying a subset Markov boundary. However, it is assumed covariance matrix non-singular, so MRRLMs cannot be applied discover boundary (subset) from data sets when singular. The singularity means there are some collinear variables in sets, and such exist widely real world. In this paper, we present novel variant (VRRLMs) identify with non-collinear and, then, reveal relationship...