期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Remaining Time Prediction for Business Processes with Concurrency Based on Log Representation 被引量:1
1
作者 Rui Cao Weijian Ni +3 位作者 Qingtian Zeng faming lu Cong Liu Hua Duan 《China Communications》 SCIE CSCD 2021年第11期76-91,共16页
Remaining time prediction of business processes plays an important role in resource scheduling and plan making.The structural features of single process instance and the concurrent running of multiple process instance... Remaining time prediction of business processes plays an important role in resource scheduling and plan making.The structural features of single process instance and the concurrent running of multiple process instances are the main factors that affect the accuracy of the remaining time prediction.Existing prediction methods does not take full advantage of these two aspects into consideration.To address this issue,a new prediction method based on trace representation is proposed.More specifically,we first associate the prefix set generated by the event log to different states of the transition system,and encode the structural features of the prefixes in the state.Then,an annotation containing the feature representation for the prefix and the corresponding remaining time are added to each state to obtain an extended transition system.Next,states in the extended transition system are partitioned by the different lengths of the states,which considers concurrency among multiple process instances.Finally,the long short-term memory(LSTM)deep recurrent neural networks are applied to each partition for predicting the remaining time of new running instances.By extensive experimental evaluation using synthetic event logs and reallife event logs,we show that the proposed method outperforms existing baseline methods. 展开更多
关键词 business process monitoring remaining time prediction LSTM feature representation CONCURRENCY
在线阅读 下载PDF
Survey of Methods for Time Series Symbolic Aggregate Approximation
2
作者 Lin Wang faming lu +1 位作者 Minghao Cui Yunxia Bao 《国际计算机前沿大会会议论文集》 2019年第1期655-657,共3页
Time series analysis is widely used in the fields of finance, medical, and climate monitoring. However, the high dimension characteristic of time series brings a lot of inconvenience to its application. In order to so... Time series analysis is widely used in the fields of finance, medical, and climate monitoring. However, the high dimension characteristic of time series brings a lot of inconvenience to its application. In order to solve the high dimensionality problem of time series, symbolic representation, a method of time series feature representation is proposed, which plays an important role in time series classification and clustering, pattern matching, anomaly detection and others. In this paper, existing symbolization representation methods of time series were reviewed and compared. Firstly, the classical symbolic aggregate approximation (SAX) principle and its deficiencies were analyzed. Then, several SAX improvement methods, including aSAX, SMSAX, ESAX and some others, were introduced and classified;Meanwhile, an experiment evaluation of the existing SAX methods was given. Finally, some unresolved issues of existing SAX methods were summed up for future work. 展开更多
关键词 Time series SAX SYMBOLIC REPRESENTATION Data MINING
在线阅读 下载PDF
A Survey of Malware Classification Methods Based on Data Flow Graph
3
作者 Tingting Jiang Lingling Cui +1 位作者 Zedong Lin faming lu 《国际计算机前沿大会会议论文集》 2022年第1期80-93,共14页
Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the o... Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the obfuscation problem to a certain extent.Many malware classification methods based on data flow graphs have been proposed.Some of them are based on userdefined features or graph similarity of data flow graphs.Graph neural networks have also recently been used to implement malware classification recently.This paper provides an overview of current data flow graph-based malware classification methods.Their respective advantages and disadvantages are summarized as well.In addition,the future trend of the data flow graph-based malware classification method is analyzed,which is of great significance for promoting the development of malware detection technology. 展开更多
关键词 Malware detection Malware classification Data flow graph Graph neural network
原文传递
A Survey of Detection Methods for Software Use-After-Free Vulnerability
4
作者 faming lu Mengfan Tang +1 位作者 Yunxia Bao Xiaoyu Wang 《国际计算机前沿大会会议论文集》 2022年第2期272-297,共26页
Due to the absence of validity detection on pointers and automatic memory rubbish reclaim mechanisms in programming languages such as the C/C++language,software developed in these languages may have many memory safety... Due to the absence of validity detection on pointers and automatic memory rubbish reclaim mechanisms in programming languages such as the C/C++language,software developed in these languages may have many memory safety vulnerabilities,such as Use-After-Free(UAF)vulnerability.An UAF vulnerability occurs when a memory object has been freed,but it can still be accessed through a dangling pointer that points to the object before it is reclaimed.Since UAF vulnerabilities are frequently exploited by malware which may lead to memory data leakage or corruption,much research work has been carried out to detect UAF vulnerabilities.This paper investigates existing UAF detection methods.After comparing and categorizing these methods,an outlook on the future development of UAF detection methods is provided.This has an important reference value for subsequent research on UAF detection. 展开更多
关键词 Memory safety Use-after-free vulnerability Dangling pointer Software concurrency defect
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部