Artificial intelligence(AI)researchers and cheminformatics specialists strive to identify effective drug precursors while optimizing costs and accelerating development processes.Digital molecular representation plays ...Artificial intelligence(AI)researchers and cheminformatics specialists strive to identify effective drug precursors while optimizing costs and accelerating development processes.Digital molecular representation plays a crucial role in achieving this objective by making molecules machine-readable,thereby enhancing the accuracy of molecular prediction tasks and facilitating evidence-based decision making.This study presents a comprehensive review of small molecular representations and AI-driven drug discovery downstream tasks utilizing these representations.The research methodology begins with the compilation of small molecule databases,followed by an analysis of fundamental molecular representations and the models that learn these representations from initial forms,capturing patterns and salient features across extensive chemical spaces.The study then examines various drug discovery downstream tasks,including drug-target interaction(DTI)prediction,drug-target affinity(DTA)prediction,drug property(DP)prediction,and drug generation,all based on learned representations.The analysis concludes by highlighting challenges and opportunities associated with machine learning(ML)methods for molecular representation and improving downstream task performance.Additionally,the representation of small molecules and AI-based downstream tasks demonstrates significant potential in identifying traditional Chinese medicine(TCM)medicinal substances and facilitating TCM target discovery.展开更多
Let F_(1)be the virtual field consisting of one element and(Q,I)a string pair.In this paper,we study the representations of string pairs over the virtual field F_(1).It is proved that an indecomposable F_(1)-represent...Let F_(1)be the virtual field consisting of one element and(Q,I)a string pair.In this paper,we study the representations of string pairs over the virtual field F_(1).It is proved that an indecomposable F_(1)-representation is either a string representation or a band representation by using the coefficient quivers.It is worth noting that for a given band and a positive integer,there exists a unique band representation up to isomorphism.展开更多
The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce t...The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce the representation of modifiedλ-differential Lie-Yamaguti algebras.Furthermore,we establish the cohomology of a modifiedλ-differential Lie-Yamaguti algebra with coefficients in a representation.Finally,we investigate the one-parameter formal deformations and Abelian extensions of modifiedλ-differential Lie-Yamaguti algebras using the second cohomology group.展开更多
Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation va...Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications.展开更多
When the G20 was created in 1999 in the wake of the Asian financial crisis,few imagined it would one day become the nerve centre of global governance.Twenty-six years later,the G20 members,which represent 85 percent o...When the G20 was created in 1999 in the wake of the Asian financial crisis,few imagined it would one day become the nerve centre of global governance.Twenty-six years later,the G20 members,which represent 85 percent of the global GDP and two-thirds of the world population,are once again navigating a turbulent era marked by geopolitical rivalry,economic fragmentation and widening inequality.展开更多
This article revisits the concept of epistemological rupture by questioning the stark division between scientific and non-scientific thought. Drawing on the theory of representation, it contends that both forms of kno...This article revisits the concept of epistemological rupture by questioning the stark division between scientific and non-scientific thought. Drawing on the theory of representation, it contends that both forms of knowledge are socially constructed, moulded by communication, norms and group dynamics. Rather than labelling non-scientific thought as flawed or regressive, the discussion shows how decontextualization and recontextualization processes apply equally to everyday ‘natural' knowledge and formal science,exposing the social and historical contingencies shaping concepts. Consequently, rupture appears less a sudden break than a gradual threshold reached through dialectical transformations in cognition and society. Rather than conferring total superiority on science, ruptures highlight how certain discourses gain legitimacy while others become ‘non-knowledge'. The article concludes that science's dominance reflects broader power relationships and evolving modes of production and validation. By situating epistemological rupture within these processes, it illuminates how different knowledge forms coexist, evolve and sometimes conflict in stratified social fields—ultimately challenging a simplistic binary between scientific progress and supposedly primitive or natural thought. This viewpoint opens new possibilities for examining the shifting boundaries between rational explanations and the shared beliefs shaping collective reality and daily life.展开更多
十二生肖在中国流传千年,那这些生肖是怎么选出来的呢?People in China have 12 zodiac animals.Each animal represents one year in the Chinese calendar.These animals are Rat,Ox,Tiger,Rabbit,Dragon,Snake,Horse,Goat,Monkey,Roo...十二生肖在中国流传千年,那这些生肖是怎么选出来的呢?People in China have 12 zodiac animals.Each animal represents one year in the Chinese calendar.These animals are Rat,Ox,Tiger,Rabbit,Dragon,Snake,Horse,Goat,Monkey,Rooster,Dog and Pig.展开更多
The escalating complexity and heterogeneity of modern energy systems—particularly in smart grid and distributed energy infrastructures—has intensified the need for intelligent and scalable security vulnerability cla...The escalating complexity and heterogeneity of modern energy systems—particularly in smart grid and distributed energy infrastructures—has intensified the need for intelligent and scalable security vulnerability classification.To address this challenge,we propose Vulnerability2Vec,a graph-embedding-based framework designed to enhance the automated classification of security vulnerabilities that threaten energy system resilience.Vulnerability2Vec converts Common Vulnerabilities and Exposures(CVE)text explanations to semantic graphs,where nodes represent CVE IDs and key terms(nouns,verbs,and adjectives),and edges capture co-occurrence relationships.Then,it embeds the semantic graphs to a low-dimensional vector space with random-walk sampling and skip-gram with negative sampling.It is possible to identify the latent relationships and structural patterns that traditional sparse vector methods fail to capture.Experimental results demonstrate a classification accuracy of up to 80%,significantly outperforming baseline methods.This approach offers a theoretical basis for classifying vulnerability types as structured semantic patterns in complex software systems.The proposed method models the semantic structure of vulnerabilities,providing a theoretical foundation for their classification.展开更多
This paper considers the notions of common sense and interobjectivity to articulate an understanding of how different cultural realities give rise to different construals of scientific phenomena across distinct cultur...This paper considers the notions of common sense and interobjectivity to articulate an understanding of how different cultural realities give rise to different construals of scientific phenomena across distinct cultures. Our main focus in this paper is on the social sciences. We propose a quadrant of different cultural–scientific stances from which the study of social phenomena is possible, based on the emic–etic dimension pertaining to the study of culture from contrasting perspectives. Although the emic–etic distinction is normal y applied in fields within the science of culture, it is proposed here that the distinction is in some ways germane to scientific practice in general, making it amenable for use in a culture of science(CoS) programme. The four perspectives that emerge from the quadrant are illustrated using exemplars. Different aspects of CoS—that is, scientific practice, scientific conventions and representations of science—are then discussed in further detail, including in two tables illustrating points of convergence and divergence between the East and West when it comes to different aspects of CoS.展开更多
In global navigation satellite system denial environment,cross-view geo-localization based on image retrieval presents an exceedingly critical visual localization solution for Unmanned Aerial Vehicle(UAV)systems.The e...In global navigation satellite system denial environment,cross-view geo-localization based on image retrieval presents an exceedingly critical visual localization solution for Unmanned Aerial Vehicle(UAV)systems.The essence of cross-view geo-localization resides in matching images containing the same geographical targets from disparate platforms,such as UAV-view and satellite-view images.However,images of the same geographical targets may suffer from occlusions and geometric distortions due to variations in the capturing platform,view,and timing.The existing methods predominantly extract features by segmenting feature maps,which overlook the holistic semantic distribution and structural information of objects,resulting in loss of image information.To address these challenges,dilated neighborhood attention Transformer is employed as the feature extraction backbone,and Multi-feature representations based on Multi-scale Hierarchical Contextual Aggregation(MMHCA)is proposed.In the proposed MMHCA method,the multiscale hierarchical contextual aggregation method is utilized to extract contextual information from local to global across various granularity levels,establishing feature associations of contextual information with global and local information in the image.Subsequently,the multi-feature representations method is utilized to obtain rich discriminative feature information,bolstering the robustness of model in scenarios characterized by positional shifts,varying distances,and scale ambiguities.Comprehensive experiments conducted on the extensively utilized University-1652 and SUES-200 benchmarks indicate that the MMHCA method surpasses the existing techniques.showing outstanding results in UAV localization and navigation.展开更多
Establishing and maintaining protected areas is a pivotal strategy for attaining the post-2020 biodiversity target. The conservation objectives of protected areas have shifted from a narrow emphasis on biodiversity to...Establishing and maintaining protected areas is a pivotal strategy for attaining the post-2020 biodiversity target. The conservation objectives of protected areas have shifted from a narrow emphasis on biodiversity to encompass broader considerations such as ecosystem stability, community resilience to climate change, and enhancement of human well-being. Given these multifaceted objectives, it is imperative to judiciously allocate resources to effectively conserve biodiversity by identifying strategically significant areas for conservation, particularly for mountainous areas. In this study, we evaluated the representativeness of the protected area network in the Qin ling Mountains concerning species diversity, ecosystem services, climate stability and ecological stability. The results indicate that some of the ecological indicators are spatially correlated with topographic gradient effects. The conservation priority areas predominantly lie in the northern foothills, the southeastern, and southwestern parts of the Qinling Mountain with areas concentrated at altitudes between 1,500-2,000 m and slopes between 40°-50° as hotspots. The conservation priority areas identified through the framework of inclusive conservation optimization account for 22.9 % of the Qinling Mountain. Existing protected areas comprise only 6.1 % of the Qinling Mountain and 13.18 % of the conservation priority areas. This will play an important role in achiev ing sustainable development in the region and in meeting the post-2020 biodiversity target. The framework can advance the different objectives of achieving a quadruple win and can also be extended to other regions.展开更多
Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extrac...Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.展开更多
The event-based vision sensor(EVS),which can generate efficient spiking data streams by exclusively detecting motion,exemplifies neuromorphic vision methodologies.Generally,its inherent lack of texture features limits...The event-based vision sensor(EVS),which can generate efficient spiking data streams by exclusively detecting motion,exemplifies neuromorphic vision methodologies.Generally,its inherent lack of texture features limits effectiveness in complex vision processing tasks,necessitating supplementary visual information.However,to date,no event-based hybrid vision solution has been developed that preserves the characteristics of complete spike data streams to support synchronous computation architectures based on spiking neural network(SNN).In this paper,we present a novel spike-based sensor with digitized pixels,which integrates the event detection structure with the pulse frequency modulation(PFM)circuit.This design enables the simultaneous output of spiking data that encodes both temporal changes and texture information.Fabricated in 180 nm process,the proposed sensor achieves a resolution of 128×128,a maximum event rate of 960 Meps,a grayscale frame rate of 117.1 kfps,and a measured power consumption of 60.1 mW,which is suited for high-speed,low-latency,edge SNNbased vision computing systems.展开更多
Coupled thermo-hydro-mechanical(THM)processes in fractured rock are playing a crucial role in geoscience and geoengineering applications.Diverse and conceptually distinct approaches have emerged over the past decades ...Coupled thermo-hydro-mechanical(THM)processes in fractured rock are playing a crucial role in geoscience and geoengineering applications.Diverse and conceptually distinct approaches have emerged over the past decades in both continuum and discontinuum perspectives leading to significant progress in their comprehending and modeling.This review paper offers an integrated perspective on existing modeling methodologies providing guidance for model selection based on the initial and boundary conditions.By comparing various models,one can better assess the uncertainties in predictions,particularly those related to the conceptual models.The review explores how these methodologies have significantlyenhanced the fundamental understanding of how fractures respond to fluid injection and production,and improved predictive capabilities pertaining to coupled processes within fractured systems.It emphasizes the importance of utilizing advanced computational technologies and thoroughly considering fundamental theories and principles established through past experimental evidence and practical experience.The selection and calibration of model parameters should be based on typical ranges and applied to the specificconditions of applications.The challenges arising from inherent heterogeneity and uncertainties,nonlinear THM coupled processes,scale dependence,and computational limitations in representing fieldscale fractures are discussed.Realizing potential advances on computational capacity calls for methodical conceptualization,mathematical modeling,selection of numerical solution strategies,implementation,and calibration to foster simulation outcomes that intricately reflectthe nuanced complexities of geological phenomena.Future research efforts should focus on innovative approaches to tackle the hurdles and advance the state-of-the-art in this critical fieldof study.展开更多
Optical singularities are topological defects of electromagnetic fields;they include phase singularity in scalar fields,polarization singularity in vector fields,and three-dimensional(3D)singularities such as optical ...Optical singularities are topological defects of electromagnetic fields;they include phase singularity in scalar fields,polarization singularity in vector fields,and three-dimensional(3D)singularities such as optical skyrmions.The exploitation of photonic microstructures to generate and manipulate optical singularities has attracted wide research interest in recent years,with many photonic microstructures having been devised to this end.Accompanying these designs,scattered phenomenological theories have been proposed to expound the working mechanisms behind individual designs.In this work,instead of focusing on a specific type of microstructure,we concentrate on the most common geometric features of these microstructures—namely,symmetries—and revisit the process of generating optical singularities in microstructures from a symmetry viewpoint.By systematically employing the projection operator technique in group theory,we develop a widely applicable theoretical scheme to explore optical singularities in microstructures with rosette(i.e.,rotational and reflection)symmetries.Our scheme agrees well with previously reported works and further reveals that the eigenmodes of a symmetric microstructure can support multiplexed phase singularities in different components,such as out-of-plane,radial,azimuthal,and left-and right-handed circular components.Based on these phase singularities,more complicated optical singularities may be synthesized,including C points,V points,L lines,Néel-and bubble-type optical skyrmions,and optical lattices,to name a few.We demonstrate that the topological invariants associated with optical singularities are protected by the symmetries of the microstructure.Lastly,based on symmetry arguments,we formulate a so-called symmetry matching condition to clarify the excitation of a specific type of optical singularity.Our work establishes a unified theoretical framework to explore optical singularities in photonic microstructures with symmetries,shedding light on the symmetry origin of multidimensional and multiplexed optical singularities and providing a symmetry perspective for exploring many singularity-related effects in optics and photonics.展开更多
Society is increasingly relying on artificially intelligent(Al)systems to facilitate,and sometimes even automate,critical systems that have huge impacts on the people these systems are designed to serve.But the unique...Society is increasingly relying on artificially intelligent(Al)systems to facilitate,and sometimes even automate,critical systems that have huge impacts on the people these systems are designed to serve.But the unique nature of Al systems opens up new challenges regarding their ethical use.For example,①unrepresentative training data can introduce sampling bias,leading to unfair outcomes;and lack of data equity can introduce systemic bias into the system.At the university level,how to provide ethics training within the limits of typical computer science(CS)programs is non-trivial,as current CS education programs already face heavy burdens from unprecedented demand.In particular,the University of Michigan is exploring ways of introducing ethics training within the CS curricula,including both stand-alone courses and integrated modules.展开更多
Computed Tomography(CT)reconstruction is essential inmedical imaging and other engineering fields.However,blurring of the projection during CT imaging can lead to artifacts in the reconstructed images.Projection blur ...Computed Tomography(CT)reconstruction is essential inmedical imaging and other engineering fields.However,blurring of the projection during CT imaging can lead to artifacts in the reconstructed images.Projection blur combines factors such as larger ray sources,scattering and imaging system vibration.To address the problem,we propose DeblurTomo,a novel self-supervised learning-based deblurring and reconstruction algorithm that efficiently reconstructs sharp CT images from blurry input without needing external data and blur measurement.Specifically,we constructed a coordinate-based implicit neural representation reconstruction network,which can map the coordinates to the attenuation coefficient in the reconstructed space formore convenient ray representation.Then,wemodel the blur as aweighted sumof offset rays and design the RayCorrectionNetwork(RCN)andWeight ProposalNetwork(WPN)to fit these rays and their weights bymulti-view consistency and geometric information,thereby extending 2D deblurring to 3D space.In the training phase,we use the blurry input as the supervision signal to optimize the reconstruction network,the RCN,and the WPN simultaneously.Extensive experiments on the widely used synthetic dataset show that DeblurTomo performs superiorly on the limited-angle and sparse-view in the simulated blurred scenarios.Further experiments on real datasets demonstrate the superiority of our method in practical scenarios.展开更多
Clustering is a pivotal data analysis method for deciphering the charge transport properties of single molecules in break junction experiments.However,given the high dimensionality and variability of the data,feature ...Clustering is a pivotal data analysis method for deciphering the charge transport properties of single molecules in break junction experiments.However,given the high dimensionality and variability of the data,feature extraction remains a bottleneck in the development of efficient clustering methods.In this regard,extensive research over the past two decades has focused on feature engineering and dimensionality reduction in break junction conductance.However,extracting highly relevant features without expert knowledge remains an unresolved challenge.To address this issue,we propose a deep clustering method driven by task-oriented representation learning(CTRL)in which the clustering module serves as a guide for the representation learning(RepL)module.First,we determine an optimal autoencoder(AE)structure through a neural architecture search(NAS)to ensure efficient RepL;second,the RepL process is guided by a joint training strategy that combines AE reconstruction loss with the clustering objective.The results demonstrate that CTRL achieves excellent performance on both the generated and experimental data.Further inspection of the RepL step reveals that joint training robustly learns more compact features than the unconstrained AE or traditional dimensionality reduction methods,significantly reducing misclustering possibilities.Our method provides a general end-to-end automatic clustering solution for analyzing single-molecule break junction data.展开更多
There are all kinds of unknown and known signals in the actual electromagnetic environment,which hinders the development of practical cognitive radio applications.However,most existing signal recognition models are di...There are all kinds of unknown and known signals in the actual electromagnetic environment,which hinders the development of practical cognitive radio applications.However,most existing signal recognition models are difficult to discover unknown signals while recognizing known ones.In this paper,a compact manifold mixup feature-based open-set recognition approach(OR-CMMF)is proposed to address the above problem.First,the proposed approach utilizes the center loss to constrain decision boundaries so that it obtains the compact latent signal feature representations and extends the low-confidence feature space.Second,the latent signal feature representations are used to construct synthetic representations as substitutes for unknown categories of signals.Then,these constructed representations can occupy the extended low-confidence space.Finally,the proposed approach applies the distillation loss to adjust the decision boundaries between the known categories signals and the constructed unknown categories substitutes so that it accurately discovers unknown signals.The OR-CMMF approach outperformed other state-of-the-art open-set recognition methods in comprehensive recognition performance and running time,as demonstrated by simulation experiments on two public datasets RML2016.10a and ORACLE.展开更多
Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation technologies.Current methods for extracting features from mesh edges or ...Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation technologies.Current methods for extracting features from mesh edges or faces struggle with complex 3D models because edge-based approaches miss global contexts and face-based methods overlook variations in adjacent areas,which affects the overall precision.To address these issues,we propose the Feature Discrimination and Context Propagation Network(FDCPNet),which is a novel approach that synergistically integrates local and global features in mesh datasets.Methods FDCPNet is composed of two modules:(1)the Feature Discrimination Module,which employs an attention mechanism to enhance the identification of key local features,and(2)the Context Propagation Module,which enriches key local features by integrating global contextual information,thereby facilitating a more detailed and comprehensive representation of crucial areas within the mesh model.Results Experiments on popular datasets validated the effectiveness of FDCPNet,showing an improvement in the classification accuracy over the baseline MeshNet.Furthermore,even with reduced mesh face numbers and limited training data,FDCPNet achieved promising results,demonstrating its robustness in scenarios of variable complexity.展开更多
基金supported by the Shenzhen Key Laboratory of Intelligent Bioinformatics(No.ZDSYS20220422103800001)the Shenzhen Science and Technology Program(No.JCYJ20230807140709020)+2 种基金National Natural Science Foundation of China(Nos.62402489,U22A2041,and 62373172)the China Postdoctoral Science Foundation(No.2023M743688)Guangdong Basic and Applied Basic Research Foundation(Nos.2024A1515011960 and 2023A1515110570)。
文摘Artificial intelligence(AI)researchers and cheminformatics specialists strive to identify effective drug precursors while optimizing costs and accelerating development processes.Digital molecular representation plays a crucial role in achieving this objective by making molecules machine-readable,thereby enhancing the accuracy of molecular prediction tasks and facilitating evidence-based decision making.This study presents a comprehensive review of small molecular representations and AI-driven drug discovery downstream tasks utilizing these representations.The research methodology begins with the compilation of small molecule databases,followed by an analysis of fundamental molecular representations and the models that learn these representations from initial forms,capturing patterns and salient features across extensive chemical spaces.The study then examines various drug discovery downstream tasks,including drug-target interaction(DTI)prediction,drug-target affinity(DTA)prediction,drug property(DP)prediction,and drug generation,all based on learned representations.The analysis concludes by highlighting challenges and opportunities associated with machine learning(ML)methods for molecular representation and improving downstream task performance.Additionally,the representation of small molecules and AI-based downstream tasks demonstrates significant potential in identifying traditional Chinese medicine(TCM)medicinal substances and facilitating TCM target discovery.
文摘Let F_(1)be the virtual field consisting of one element and(Q,I)a string pair.In this paper,we study the representations of string pairs over the virtual field F_(1).It is proved that an indecomposable F_(1)-representation is either a string representation or a band representation by using the coefficient quivers.It is worth noting that for a given band and a positive integer,there exists a unique band representation up to isomorphism.
基金National Natural Science Foundation of China(12161013)Research Projects of Guizhou University of Commerce in 2024。
文摘The modifiedλ-differential Lie-Yamaguti algebras are considered,in which a modifiedλ-differential Lie-Yamaguti algebra consisting of a Lie-Yamaguti algebra and a modifiedλ-differential operator.First we introduce the representation of modifiedλ-differential Lie-Yamaguti algebras.Furthermore,we establish the cohomology of a modifiedλ-differential Lie-Yamaguti algebra with coefficients in a representation.Finally,we investigate the one-parameter formal deformations and Abelian extensions of modifiedλ-differential Lie-Yamaguti algebras using the second cohomology group.
文摘Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications.
文摘When the G20 was created in 1999 in the wake of the Asian financial crisis,few imagined it would one day become the nerve centre of global governance.Twenty-six years later,the G20 members,which represent 85 percent of the global GDP and two-thirds of the world population,are once again navigating a turbulent era marked by geopolitical rivalry,economic fragmentation and widening inequality.
文摘This article revisits the concept of epistemological rupture by questioning the stark division between scientific and non-scientific thought. Drawing on the theory of representation, it contends that both forms of knowledge are socially constructed, moulded by communication, norms and group dynamics. Rather than labelling non-scientific thought as flawed or regressive, the discussion shows how decontextualization and recontextualization processes apply equally to everyday ‘natural' knowledge and formal science,exposing the social and historical contingencies shaping concepts. Consequently, rupture appears less a sudden break than a gradual threshold reached through dialectical transformations in cognition and society. Rather than conferring total superiority on science, ruptures highlight how certain discourses gain legitimacy while others become ‘non-knowledge'. The article concludes that science's dominance reflects broader power relationships and evolving modes of production and validation. By situating epistemological rupture within these processes, it illuminates how different knowledge forms coexist, evolve and sometimes conflict in stratified social fields—ultimately challenging a simplistic binary between scientific progress and supposedly primitive or natural thought. This viewpoint opens new possibilities for examining the shifting boundaries between rational explanations and the shared beliefs shaping collective reality and daily life.
文摘十二生肖在中国流传千年,那这些生肖是怎么选出来的呢?People in China have 12 zodiac animals.Each animal represents one year in the Chinese calendar.These animals are Rat,Ox,Tiger,Rabbit,Dragon,Snake,Horse,Goat,Monkey,Rooster,Dog and Pig.
基金supported by the MSIT(Ministry of Science and ICT),Republic of Korea,under the Convergence Security Core Talent Training Business Support Program(IITP-2025-RS-2023-00266605,50%)in part by the Institute of Information&Communications Technology Planning&Evaluation(lITP)grant funded by the Korea government(MSIT)(RS-2025-02305436,Development of Digital Innovative Element Technologies for Rapid Prediction of Potential Complex Disasters and Continuous Disaster Prevention,30%)supported by the Chung-Ang University Graduate Research Scholar-ship in 2023(20%).
文摘The escalating complexity and heterogeneity of modern energy systems—particularly in smart grid and distributed energy infrastructures—has intensified the need for intelligent and scalable security vulnerability classification.To address this challenge,we propose Vulnerability2Vec,a graph-embedding-based framework designed to enhance the automated classification of security vulnerabilities that threaten energy system resilience.Vulnerability2Vec converts Common Vulnerabilities and Exposures(CVE)text explanations to semantic graphs,where nodes represent CVE IDs and key terms(nouns,verbs,and adjectives),and edges capture co-occurrence relationships.Then,it embeds the semantic graphs to a low-dimensional vector space with random-walk sampling and skip-gram with negative sampling.It is possible to identify the latent relationships and structural patterns that traditional sparse vector methods fail to capture.Experimental results demonstrate a classification accuracy of up to 80%,significantly outperforming baseline methods.This approach offers a theoretical basis for classifying vulnerability types as structured semantic patterns in complex software systems.The proposed method models the semantic structure of vulnerabilities,providing a theoretical foundation for their classification.
文摘This paper considers the notions of common sense and interobjectivity to articulate an understanding of how different cultural realities give rise to different construals of scientific phenomena across distinct cultures. Our main focus in this paper is on the social sciences. We propose a quadrant of different cultural–scientific stances from which the study of social phenomena is possible, based on the emic–etic dimension pertaining to the study of culture from contrasting perspectives. Although the emic–etic distinction is normal y applied in fields within the science of culture, it is proposed here that the distinction is in some ways germane to scientific practice in general, making it amenable for use in a culture of science(CoS) programme. The four perspectives that emerge from the quadrant are illustrated using exemplars. Different aspects of CoS—that is, scientific practice, scientific conventions and representations of science—are then discussed in further detail, including in two tables illustrating points of convergence and divergence between the East and West when it comes to different aspects of CoS.
基金supported by the National Natural Science Foundation of China(Nos.12072027,62103052,61603346 and 62103379)the Henan Key Laboratory of General Aviation Technology,China(No.ZHKF-230201)+3 种基金the Funding for the Open Research Project of the Rotor Aerodynamics Key Laboratory,China(No.RAL20200101)the Key Research and Development Program of Henan Province,China(Nos.241111222000 and 241111222900)the Key Science and Technology Program of Henan Province,China(No.232102220067)the Scholarship Funding from the China Scholarship Council(No.202206030079).
文摘In global navigation satellite system denial environment,cross-view geo-localization based on image retrieval presents an exceedingly critical visual localization solution for Unmanned Aerial Vehicle(UAV)systems.The essence of cross-view geo-localization resides in matching images containing the same geographical targets from disparate platforms,such as UAV-view and satellite-view images.However,images of the same geographical targets may suffer from occlusions and geometric distortions due to variations in the capturing platform,view,and timing.The existing methods predominantly extract features by segmenting feature maps,which overlook the holistic semantic distribution and structural information of objects,resulting in loss of image information.To address these challenges,dilated neighborhood attention Transformer is employed as the feature extraction backbone,and Multi-feature representations based on Multi-scale Hierarchical Contextual Aggregation(MMHCA)is proposed.In the proposed MMHCA method,the multiscale hierarchical contextual aggregation method is utilized to extract contextual information from local to global across various granularity levels,establishing feature associations of contextual information with global and local information in the image.Subsequently,the multi-feature representations method is utilized to obtain rich discriminative feature information,bolstering the robustness of model in scenarios characterized by positional shifts,varying distances,and scale ambiguities.Comprehensive experiments conducted on the extensively utilized University-1652 and SUES-200 benchmarks indicate that the MMHCA method surpasses the existing techniques.showing outstanding results in UAV localization and navigation.
基金supported by the National Natural Science Foun-dation of China(Grant No.72349002).
文摘Establishing and maintaining protected areas is a pivotal strategy for attaining the post-2020 biodiversity target. The conservation objectives of protected areas have shifted from a narrow emphasis on biodiversity to encompass broader considerations such as ecosystem stability, community resilience to climate change, and enhancement of human well-being. Given these multifaceted objectives, it is imperative to judiciously allocate resources to effectively conserve biodiversity by identifying strategically significant areas for conservation, particularly for mountainous areas. In this study, we evaluated the representativeness of the protected area network in the Qin ling Mountains concerning species diversity, ecosystem services, climate stability and ecological stability. The results indicate that some of the ecological indicators are spatially correlated with topographic gradient effects. The conservation priority areas predominantly lie in the northern foothills, the southeastern, and southwestern parts of the Qinling Mountain with areas concentrated at altitudes between 1,500-2,000 m and slopes between 40°-50° as hotspots. The conservation priority areas identified through the framework of inclusive conservation optimization account for 22.9 % of the Qinling Mountain. Existing protected areas comprise only 6.1 % of the Qinling Mountain and 13.18 % of the conservation priority areas. This will play an important role in achiev ing sustainable development in the region and in meeting the post-2020 biodiversity target. The framework can advance the different objectives of achieving a quadruple win and can also be extended to other regions.
基金the financial support from Natural Science Foundation of Gansu Province(Nos.22JR5RA217,22JR5RA216)Lanzhou Science and Technology Program(No.2022-2-111)+1 种基金Lanzhou University of Arts and Sciences School Innovation Fund Project(No.XJ2022000103)Lanzhou College of Arts and Sciences 2023 Talent Cultivation Quality Improvement Project(No.2023-ZL-jxzz-03)。
文摘Considering that the algorithm accuracy of the traditional sparse representation models is not high under the influence of multiple complex environmental factors,this study focuses on the improvement of feature extraction and model construction.Firstly,the convolutional neural network(CNN)features of the face are extracted by the trained deep learning network.Next,the steady-state and dynamic classifiers for face recognition are constructed based on the CNN features and Haar features respectively,with two-stage sparse representation introduced in the process of constructing the steady-state classifier and the feature templates with high reliability are dynamically selected as alternative templates from the sparse representation template dictionary constructed using the CNN features.Finally,the results of face recognition are given based on the classification results of the steady-state classifier and the dynamic classifier together.Based on this,the feature weights of the steady-state classifier template are adjusted in real time and the dictionary set is dynamically updated to reduce the probability of irrelevant features entering the dictionary set.The average recognition accuracy of this method is 94.45%on the CMU PIE face database and 96.58%on the AR face database,which is significantly improved compared with that of the traditional face recognition methods.
基金supported in part by the National Key Research and Development Program of China(Grant No.2022YFB2804401)the National Natural Science Foundation of China(Grant Nos.62334008,62134004,62404218)+1 种基金the Beijing Natural Science Foundation(Grant No.Z220005)Chinese Academy of Sciences(Grant No.ZDBS-LY-JSC008).
文摘The event-based vision sensor(EVS),which can generate efficient spiking data streams by exclusively detecting motion,exemplifies neuromorphic vision methodologies.Generally,its inherent lack of texture features limits effectiveness in complex vision processing tasks,necessitating supplementary visual information.However,to date,no event-based hybrid vision solution has been developed that preserves the characteristics of complete spike data streams to support synchronous computation architectures based on spiking neural network(SNN).In this paper,we present a novel spike-based sensor with digitized pixels,which integrates the event detection structure with the pulse frequency modulation(PFM)circuit.This design enables the simultaneous output of spiking data that encodes both temporal changes and texture information.Fabricated in 180 nm process,the proposed sensor achieves a resolution of 128×128,a maximum event rate of 960 Meps,a grayscale frame rate of 117.1 kfps,and a measured power consumption of 60.1 mW,which is suited for high-speed,low-latency,edge SNNbased vision computing systems.
基金funding from the European Research Council(ERC)under the European Union’s Horizon 2020 Research and Innovation Program through the Starting Grant GEoREST(grant agreement No.801809)support by MICIU/AEI/10.13039/501100011033 and by"European Union Next Generation EU/PRTR"through the‘Ramón y Cajal’fellowship(reference RYC2021-032780-I)+9 种基金funding by MICIU/AEI/10.13039/501100011033 and by“ERDF,EU”through the‘HydroPoreII’project(reference PID2022-137652NBC44)support by the Institute for Korea Spent Nuclear Fuel(iKSNF)National Research Foundation of Korea(NRF)grant funded by the Korea government(Ministry of Science and ICT,MSIT)(2021M2E1A1085196)support by the Swedish Radiation Safety(SSM),Swedish Transport Administration(Trafikverket),Swedish Rock Engineering Foundation(BeFo),and Nordic Energy Research(Grant 187658)supported by the US Department of Energy(DOE),the Officeof Nuclear Energy,Spent Fuel and Waste Science and Technology Campaign,and by the US Department of Energy(DOE),the Office of Basic Energy Sciences,Chemical Sciences,Geosciences,and Biosciences Division both under Contract Number DE-AC02-05CH11231 with Lawrence Berkeley National Laboratorysupport from the US National Science Foundation(grant CMMI-2239630)funding from the European Research Council(ERC)under the European Union’s Horizon 2020 research and innovation programme(grant agreement No.101002507)the UK Natural Environment Research Council(NERC)for funding SeisGreen Project(Grant No.NE/W009293/1)which supported this workthe Royal Society UK for supporting this research through fellowship UF160443IMEDEA is an accredited"Maria de Maeztu Excellence Unit"(Grant CEX2021-001198,funded by MICIU/AEI/10.13039/501100011033).
文摘Coupled thermo-hydro-mechanical(THM)processes in fractured rock are playing a crucial role in geoscience and geoengineering applications.Diverse and conceptually distinct approaches have emerged over the past decades in both continuum and discontinuum perspectives leading to significant progress in their comprehending and modeling.This review paper offers an integrated perspective on existing modeling methodologies providing guidance for model selection based on the initial and boundary conditions.By comparing various models,one can better assess the uncertainties in predictions,particularly those related to the conceptual models.The review explores how these methodologies have significantlyenhanced the fundamental understanding of how fractures respond to fluid injection and production,and improved predictive capabilities pertaining to coupled processes within fractured systems.It emphasizes the importance of utilizing advanced computational technologies and thoroughly considering fundamental theories and principles established through past experimental evidence and practical experience.The selection and calibration of model parameters should be based on typical ranges and applied to the specificconditions of applications.The challenges arising from inherent heterogeneity and uncertainties,nonlinear THM coupled processes,scale dependence,and computational limitations in representing fieldscale fractures are discussed.Realizing potential advances on computational capacity calls for methodical conceptualization,mathematical modeling,selection of numerical solution strategies,implementation,and calibration to foster simulation outcomes that intricately reflectthe nuanced complexities of geological phenomena.Future research efforts should focus on innovative approaches to tackle the hurdles and advance the state-of-the-art in this critical fieldof study.
基金supported by the National Natural Science Foun-dation of China(62301596 and 62288101)Shaanxi Provincial Science and Technology Innovation Team(23-CX-TD-48)+4 种基金the KU Leuven internal funds:the C1 Project(C14/19/083)the Interdisciplinary Network Project(IDN/20/014)the Small Infrastructure Grant(KA/20/019)the Research Foundation of Flanders(FWO)Project(G090017N,G088822N,and V408823N)the Danish National Research Foundation(DNRF165).
文摘Optical singularities are topological defects of electromagnetic fields;they include phase singularity in scalar fields,polarization singularity in vector fields,and three-dimensional(3D)singularities such as optical skyrmions.The exploitation of photonic microstructures to generate and manipulate optical singularities has attracted wide research interest in recent years,with many photonic microstructures having been devised to this end.Accompanying these designs,scattered phenomenological theories have been proposed to expound the working mechanisms behind individual designs.In this work,instead of focusing on a specific type of microstructure,we concentrate on the most common geometric features of these microstructures—namely,symmetries—and revisit the process of generating optical singularities in microstructures from a symmetry viewpoint.By systematically employing the projection operator technique in group theory,we develop a widely applicable theoretical scheme to explore optical singularities in microstructures with rosette(i.e.,rotational and reflection)symmetries.Our scheme agrees well with previously reported works and further reveals that the eigenmodes of a symmetric microstructure can support multiplexed phase singularities in different components,such as out-of-plane,radial,azimuthal,and left-and right-handed circular components.Based on these phase singularities,more complicated optical singularities may be synthesized,including C points,V points,L lines,Néel-and bubble-type optical skyrmions,and optical lattices,to name a few.We demonstrate that the topological invariants associated with optical singularities are protected by the symmetries of the microstructure.Lastly,based on symmetry arguments,we formulate a so-called symmetry matching condition to clarify the excitation of a specific type of optical singularity.Our work establishes a unified theoretical framework to explore optical singularities in photonic microstructures with symmetries,shedding light on the symmetry origin of multidimensional and multiplexed optical singularities and providing a symmetry perspective for exploring many singularity-related effects in optics and photonics.
文摘Society is increasingly relying on artificially intelligent(Al)systems to facilitate,and sometimes even automate,critical systems that have huge impacts on the people these systems are designed to serve.But the unique nature of Al systems opens up new challenges regarding their ethical use.For example,①unrepresentative training data can introduce sampling bias,leading to unfair outcomes;and lack of data equity can introduce systemic bias into the system.At the university level,how to provide ethics training within the limits of typical computer science(CS)programs is non-trivial,as current CS education programs already face heavy burdens from unprecedented demand.In particular,the University of Michigan is exploring ways of introducing ethics training within the CS curricula,including both stand-alone courses and integrated modules.
基金supported in part by the National Natural Science Foundation of China under Grants 62472434 and 62402171in part by the National Key Research and Development Program of China under Grant 2022YFF1203001+1 种基金in part by the Science and Technology Innovation Program of Hunan Province under Grant 2022RC3061in part by the Sci-Tech Innovation 2030 Agenda under Grant 2023ZD0508600.
文摘Computed Tomography(CT)reconstruction is essential inmedical imaging and other engineering fields.However,blurring of the projection during CT imaging can lead to artifacts in the reconstructed images.Projection blur combines factors such as larger ray sources,scattering and imaging system vibration.To address the problem,we propose DeblurTomo,a novel self-supervised learning-based deblurring and reconstruction algorithm that efficiently reconstructs sharp CT images from blurry input without needing external data and blur measurement.Specifically,we constructed a coordinate-based implicit neural representation reconstruction network,which can map the coordinates to the attenuation coefficient in the reconstructed space formore convenient ray representation.Then,wemodel the blur as aweighted sumof offset rays and design the RayCorrectionNetwork(RCN)andWeight ProposalNetwork(WPN)to fit these rays and their weights bymulti-view consistency and geometric information,thereby extending 2D deblurring to 3D space.In the training phase,we use the blurry input as the supervision signal to optimize the reconstruction network,the RCN,and the WPN simultaneously.Extensive experiments on the widely used synthetic dataset show that DeblurTomo performs superiorly on the limited-angle and sparse-view in the simulated blurred scenarios.Further experiments on real datasets demonstrate the superiority of our method in practical scenarios.
基金supported by Guangxi Science and Technology Program(No.GuiKeAD23026291)Guangxi Science and Technology Major Project(No.AA22068057).
文摘Clustering is a pivotal data analysis method for deciphering the charge transport properties of single molecules in break junction experiments.However,given the high dimensionality and variability of the data,feature extraction remains a bottleneck in the development of efficient clustering methods.In this regard,extensive research over the past two decades has focused on feature engineering and dimensionality reduction in break junction conductance.However,extracting highly relevant features without expert knowledge remains an unresolved challenge.To address this issue,we propose a deep clustering method driven by task-oriented representation learning(CTRL)in which the clustering module serves as a guide for the representation learning(RepL)module.First,we determine an optimal autoencoder(AE)structure through a neural architecture search(NAS)to ensure efficient RepL;second,the RepL process is guided by a joint training strategy that combines AE reconstruction loss with the clustering objective.The results demonstrate that CTRL achieves excellent performance on both the generated and experimental data.Further inspection of the RepL step reveals that joint training robustly learns more compact features than the unconstrained AE or traditional dimensionality reduction methods,significantly reducing misclustering possibilities.Our method provides a general end-to-end automatic clustering solution for analyzing single-molecule break junction data.
基金fully supported by National Natural Science Foundation of China(61871422)Natural Science Foundation of Sichuan Province(2023NSFSC1422)Central Universities of South west Minzu University(ZYN2022032)。
文摘There are all kinds of unknown and known signals in the actual electromagnetic environment,which hinders the development of practical cognitive radio applications.However,most existing signal recognition models are difficult to discover unknown signals while recognizing known ones.In this paper,a compact manifold mixup feature-based open-set recognition approach(OR-CMMF)is proposed to address the above problem.First,the proposed approach utilizes the center loss to constrain decision boundaries so that it obtains the compact latent signal feature representations and extends the low-confidence feature space.Second,the latent signal feature representations are used to construct synthetic representations as substitutes for unknown categories of signals.Then,these constructed representations can occupy the extended low-confidence space.Finally,the proposed approach applies the distillation loss to adjust the decision boundaries between the known categories signals and the constructed unknown categories substitutes so that it accurately discovers unknown signals.The OR-CMMF approach outperformed other state-of-the-art open-set recognition methods in comprehensive recognition performance and running time,as demonstrated by simulation experiments on two public datasets RML2016.10a and ORACLE.
基金Supported by the National Key R&D Program of China(2022YFC3803600).
文摘Background Three-dimensional(3D)shape representation using mesh data is essential in various applications,such as virtual reality and simulation technologies.Current methods for extracting features from mesh edges or faces struggle with complex 3D models because edge-based approaches miss global contexts and face-based methods overlook variations in adjacent areas,which affects the overall precision.To address these issues,we propose the Feature Discrimination and Context Propagation Network(FDCPNet),which is a novel approach that synergistically integrates local and global features in mesh datasets.Methods FDCPNet is composed of two modules:(1)the Feature Discrimination Module,which employs an attention mechanism to enhance the identification of key local features,and(2)the Context Propagation Module,which enriches key local features by integrating global contextual information,thereby facilitating a more detailed and comprehensive representation of crucial areas within the mesh model.Results Experiments on popular datasets validated the effectiveness of FDCPNet,showing an improvement in the classification accuracy over the baseline MeshNet.Furthermore,even with reduced mesh face numbers and limited training data,FDCPNet achieved promising results,demonstrating its robustness in scenarios of variable complexity.