期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Transformer Based on Feedback Attention Mechanism for Diagnosis of Coronary Heart Disease Using Echocardiographic Images
1
作者 chunlai du Xin Gu +4 位作者 Yanhui Guo Siqi Guo Ziwei Pang Yi du Guoqing du 《Computers, Materials & Continua》 2025年第5期3435-3450,共16页
Coronary artery disease is a highly lethal cardiovascular condition,making early diagnosis crucial for patients.Echocardiograph is employed to identify coronary heart disease(CHD).However,due to issues such as fuzzy o... Coronary artery disease is a highly lethal cardiovascular condition,making early diagnosis crucial for patients.Echocardiograph is employed to identify coronary heart disease(CHD).However,due to issues such as fuzzy object boundaries,complex tissue structures,and motion artifacts in ultrasound images,it is challenging to detect CHD accurately.This paper proposes an improved Transformer model based on the Feedback Self-Attention Mechanism(FSAM)for classification of ultrasound images.The model enhances attention weights,making it easier to capture complex features.Experimental results show that the proposed method achieves high levels of accuracy,recall,precision,F1 score,and area under the receiver operating characteristic curve(72.3%,79.5%,82.0%,81.0%,and 0.73%,respectively).The proposed model was compared with widely used models,including convolutional neural network and visual Transformer model,and the results show that our model outperforms others in the above evaluation metrics.In conclusion,the proposed model provides a promising approach for diagnosing CHD using echocardiogram. 展开更多
关键词 Computer-aided diagnosis(CAD) TRANSFORMER coronary heart disease feedback self-attention mechanism
在线阅读 下载PDF
Using Object Detection Network for Malware Detection and Identification in Network Traffic Packets 被引量:6
2
作者 chunlai du Shenghui Liu +2 位作者 Lei Si Yanhui Guo Tong Jin 《Computers, Materials & Continua》 SCIE EI 2020年第9期1785-1796,共12页
In recent years,the number of exposed vulnerabilities has grown rapidly and more and more attacks occurred to intrude on the target computers using these vulnerabilities such as different malware.Malware detection has... In recent years,the number of exposed vulnerabilities has grown rapidly and more and more attacks occurred to intrude on the target computers using these vulnerabilities such as different malware.Malware detection has attracted more attention and still faces severe challenges.As malware detection based traditional machine learning relies on exports’experience to design efficient features to distinguish different malware,it causes bottleneck on feature engineer and is also time-consuming to find efficient features.Due to its promising ability in automatically proposing and selecting significant features,deep learning has gradually become a research hotspot.In this paper,aiming to detect the malicious payload and identify their categories with high accuracy,we proposed a packet-based malicious payload detection and identification algorithm based on object detection deep learning network.A dataset of malicious payload on code execution vulnerability has been constructed under the Metasploit framework and used to evaluate the performance of the proposed malware detection and identification algorithm.The experimental results demonstrated that the proposed object detection network can efficiently find and identify malicious payloads with high accuracy. 展开更多
关键词 Intrusion detection malicious payload deep learning object detection network
在线阅读 下载PDF
FastAFLGo:Toward a Directed Greybox Fuzzing
3
作者 chunlai du Tong Jin +2 位作者 Yanhui Guo Binghao Jia Bin Li 《Computers, Materials & Continua》 SCIE EI 2021年第12期3845-3855,共11页
While the size and complexity of software are rapidly increasing,not only is the number of vulnerabilities increasing,but their forms are diversifying.Vulnerability has become an important factor in network attack and... While the size and complexity of software are rapidly increasing,not only is the number of vulnerabilities increasing,but their forms are diversifying.Vulnerability has become an important factor in network attack and defense.Therefore,automatic vulnerability discovery has become critical to ensure software security.Fuzzing is one of the most important methods of vulnerability discovery.It is based on the initial input,i.e.,a seed,to generate mutated test cases as new inputs of a tested program in the next execution loop.By monitoring the path coverage,fuzzing can choose high-value test cases for inclusion in the new seed set and capture crashes used for triggering vulnerabilities.Although there have been remarkable achievements in terms of the number of discovered vulnerabilities,the reduction of time cost is still inadequate.This paper proposes a fast directed greybox fuzzing model,FastAFLGo.A fast convergence formula of temperature is designed,and the energy scheduling scheme can quickly determine the best seed to make the program execute toward the target basic blocks.Experimental results show that FastAFLGo can discover more vulnerabilities than the traditional fuzzing method in the same execution time. 展开更多
关键词 Directed greybox FUZZING power schedule
在线阅读 下载PDF
A Generation Method of Letter-Level Adversarial Samples
4
作者 Huixuan Xu chunlai du +2 位作者 Yanhui Guo Zhijian Cui Haibo Bai 《Journal on Artificial Intelligence》 2021年第2期45-53,共9页
In recent years,with the rapid development of natural language processing,the security issues related to it have attracted more and more attention.Character perturbation is a common security problem.It can try to comp... In recent years,with the rapid development of natural language processing,the security issues related to it have attracted more and more attention.Character perturbation is a common security problem.It can try to completely modify the input classification judgment of the target program without people’s attention by adding,deleting,or replacing several characters,which can reduce the effectiveness of the classifier.Although the current research has provided various methods of perturbation attacks on characters,the success rate of some methods is still not ideal.This paper mainly studies the sample generation of optimal perturbation characters and proposes a characterlevel text adversarial sample generation method.The goal is to use this method to achieve the best effect on character perturbation.After sentiment classification experiments,this model has a higher perturbation success rate on the IMDB dataset,which proves the effectiveness and rationality of this method for text perturbation and provides a reference for future research work. 展开更多
关键词 Perturbation attack sentiment analysis adversarial examples
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部