期刊文献+
共找到788篇文章
< 1 2 40 >
每页显示 20 50 100
AI Chain-Driven Control Flow Graph Generation for Multiple Programming Language
1
作者 ZOU Zhou ZUO Zhengkang HUANG Qing 《Wuhan University Journal of Natural Sciences》 2025年第3期222-230,共9页
Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysi... Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysis and Abstract Syntax Trees(ASTs),often face challenges due to the complex syntax of programming languages like Java and Python.This paper introduces a novel approach that leverages Large Language Models(LLMs)to generate CFGs through a methodical Chain of Thought(CoT)process.By employing CoT,the proposed approach systematically interprets code semantics directly from natural language,enhancing the adaptability across various programming languages and simplifying the CFG construction process.By implementing a modular AI chain strategy that adheres to the single responsibility principle,our approach breaks down CFG generation into distinct,manageable steps handled by separate AI and non-AI units,which can significantly improve the precision and coverage of CFG nodes and edges.The experiments with 245 Java and 281 Python code snippets from Stack Overflow demonstrate that our method achieves efficient performance on different programming languages and exhibits strong robustness. 展开更多
关键词 control flow graph Large Language Model Chain of Thought AI chain
原文传递
An Intelligent Quality Control Method for Manufacturing Processes Based on a Human–Cyber–Physical Knowledge Graph 被引量:3
2
作者 Shilong Wang Jinhan Yang +2 位作者 Bo Yang Dong Li Ling Kang 《Engineering》 SCIE EI CAS CSCD 2024年第10期242-260,共19页
Quality management is a constant and significant concern in enterprises.Effective determination of correct solutions for comprehensive problems helps avoid increased backtesting costs.This study proposes an intelligen... Quality management is a constant and significant concern in enterprises.Effective determination of correct solutions for comprehensive problems helps avoid increased backtesting costs.This study proposes an intelligent quality control method for manufacturing processes based on a human–cyber–physical(HCP)knowledge graph,which is a systematic method that encompasses the following elements:data management and classification based on HCP ternary data,HCP ontology construction,knowledge extraction for constructing an HCP knowledge graph,and comprehensive application of quality control based on HCP knowledge.The proposed method implements case retrieval,automatic analysis,and assisted decision making based on an HCP knowledge graph,enabling quality monitoring,inspection,diagnosis,and maintenance strategies for quality control.In practical applications,the proposed modular and hierarchical HCP ontology exhibits significant superiority in terms of shareability and reusability of the acquired knowledge.Moreover,the HCP knowledge graph deeply integrates the provided HCP data and effectively supports comprehensive decision making.The proposed method was implemented in cases involving an automotive production line and a gear manufacturing process,and the effectiveness of the method was verified by the application system deployed.Furthermore,the proposed method can be extended to other manufacturing process quality control tasks. 展开更多
关键词 Quality control Human-cyber-physical ternary data Knowledge graph
在线阅读 下载PDF
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
3
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 SOFTWARE SECURITY SOFTWARE VULNERABILITY IMPROVED control flow graph VULNERABILITY detection algorithm
原文传递
Bipartite graph-based control flow checking for COTS-based small satellites 被引量:2
4
作者 Wang Honghao Wang Huiquan Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期883-893,共11页
Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced contr... Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites. 展开更多
关键词 Bipartite graph control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites
原文传递
Graph-tree-based software control flow checking for COTS processors on pico-satellites 被引量:1
5
作者 Yang Mu Wang Hao +1 位作者 Zheng Yangming Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期413-422,共10页
This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processo... This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processors. A graph tree data structure with a topology similar to common trees is introduced to transform the control flow graphs of target programs. This together with design of IDs and signatures of its vertices and edges allows for an easy check of legality of actual branching during target program execution. As a result, the algorithm not only is capable of detecting all single and multiple branching errors with low latency and time overheads along with a linear-complexity space overhead, but also remains generic among arbitrary instruction sets and independent of any specific hardware. Tests of the algorithm using a COTS-processor-based onboard computer (OBC) of in-service ZDPS-1A pico-satellite products show that GTCFC can detect over 90% of the randomly injected and all-pattern-covering branching errors for different types of target programs, with performance and overheads consistent with the theoretical analysis; and beats well-established preeminent control flow checking algorithms in these dimensions. Furthermore, it is validated that GTCGC not only can be accommodated in pico-satellites conveniently with still sufficient system margins left, but also has the ability to minimize the risk of control flow errors being undetected in their space missions. Therefore, due to its effectiveness, efficiency, and compatibility, the GTCFC solution is ready for applications on COTS processors on pico-satellites in their real space missions. 展开更多
关键词 Branching error Commercial-off-the-shelf (COTS) control flow checking Error injection graph tree On-board computer Pico-satellite
原文传递
Data Flow Fuzzy Control of Communication Network with Finite Terminal
6
作者 邓娜 邵世煌 苏庆新 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期171-174,共4页
We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the syste... We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the system so as to minimize the mean sojourn time of customers. Simulation shows the validity of the fuzzy controller. 展开更多
关键词 data flow fuzzy control average sojourn time
在线阅读 下载PDF
Sedimentary Microfacies and Porosity Modeling of Deep-Water Sandy Debris Flows by Combining Sedimentary Patterns with Seismic Data: An Example from Unit I of Gas Field A, South China Sea 被引量:2
7
作者 LI Shengli YU Xinghe JIN Jianli 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第1期182-194,共13页
Sandy debris flow deposits are present in Unit I during Miocene of Gas Field A in the Baiyun Depression of the South China Sea. The paucity of well data and the great variability of the sedimentary microfacies make it... Sandy debris flow deposits are present in Unit I during Miocene of Gas Field A in the Baiyun Depression of the South China Sea. The paucity of well data and the great variability of the sedimentary microfacies make it difficult to identify and predict the distribution patterns of the main gas reservoir, and have seriously hindered further exploration and development of the gas field. Therefore, making full use of the available seismic data is extremely important for predicting the spatial distribution of sedimentary microfacies when constructing three-dimensional reservoir models. A suitable reservoir modeling strategy or workflow controlled by sedimentary microfacies and seismic data has been developed. Five types of seismic attributes were selected to correlate with the sand percentage, and the root mean square (RMS) amplitude performed the best. The relation between the RMS amplitude and the sand percentage was used to construct a reservoir sand distribution map. Three types of main sedimentary microfacies were identified: debris channels, fan lobes, and natural levees. Using constraints from the sedimentary microfacies boundaries, a sedimentary microfacies model was constructed using the sequential indicator and assigned value simulation methods. Finally, reservoir models of physical properties for sandy debris flow deposits controlled by sedimentary microfacies and seismic inversion data were established. Property cutoff values were adopted because the sedimentary microfacies and the reservoir properties from well-logging interpretation are intrinsically different. Selection of appropriate reservoir property cutoffs is a key step in reservoir modeling when using simulation methods based on sedimentary microfacies control. When the abnormal data are truncated and the reservoir properties probability distribution fits a normal distribution, microfacies-controlled reservoir property models are more reliable than those obtained from the sequence Gauss simulation method. The cutoffs for effective porosity of the debris channel, fan lobe, and natural levee facies were 0.2, 0.09, and 0.12, respectively; the corresponding average effective porosities were 0.24, 0.13, and 0.15. The proposed modeling method makes full use of seismic attributes and seismic inversion data, and also makes the property data of single-well depositional microfacies more conformable to a normal distribution with geological significance. Thus, the method allows use of more reliable input data when we construct a model of a sandy debris flow. 展开更多
关键词 sandy debris flow deposit seismic attribute and inversion geological modeling controlled by micro-facies data truncated process
在线阅读 下载PDF
Detecting Data-flow Errors Based on Petri Nets With Data Operations 被引量:4
8
作者 Dongming Xiang Guanjun Liu +1 位作者 Chungang Yan Changjun Jiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期251-260,共10页
In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so o... In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so on. However, there are not too many methods for detecting data-flow errors. This paper defines Petri nets with data operations(PN-DO) that can model the operations on data such as read, write and delete. Based on PN-DO, we define some data-flow errors in this paper. We construct a reachability graph with data operations for each PN-DO, and then propose a method to reduce the reachability graph. Based on the reduced reachability graph, data-flow errors can be detected rapidly. A case study is given to illustrate the effectiveness of our methods. 展开更多
关键词 Business process modeling data-flow errors Petri nets reachability graph
在线阅读 下载PDF
Federated Approach for Privacy-Preserving Traffic Prediction Using Graph Convolutional Network 被引量:1
9
作者 LONARE Savita BHRAMARAMBA Ravi 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第3期509-517,共9页
Existing traffic flow prediction frameworks have already achieved enormous success due to large traffic datasets and capability of deep learning models.However,data privacy and security are always a challenge in every... Existing traffic flow prediction frameworks have already achieved enormous success due to large traffic datasets and capability of deep learning models.However,data privacy and security are always a challenge in every field where data need to be uploaded to the cloud.Federated learning(FL)is an emerging trend for distributed training of data.The primary goal of FL is to train an efficient communication model without compromising data privacy.The traffic data have a robust spatio-temporal correlation,but various approaches proposed earlier have not considered spatial correlation of the traffic data.This paper presents FL-based traffic flow prediction with spatio-temporal correlation.This work uses a differential privacy(DP)scheme for privacy preservation of participant's data.To the best of our knowledge,this is the first time that FL is used for vehicular traffic prediction while considering the spatio-temporal correlation of traffic data with DP preservation.The proposed framework trains the data locally at the client-side with DP.It then uses the model aggregation mechanism federated graph convolutional network(FedGCN)at the server-side to find the average of locally trained models.The results of the proposed work show that the FedGCN model accurately predicts the traffic.DP scheme at client-side helps clients to set a budget for privacy loss. 展开更多
关键词 federated learning(FL) traffic flow prediction data privacy graph convolutional network(GCN) differential privacy(DP)
原文传递
Exploring the Approaches to Data Flow Computing
10
作者 Mohammad B.Khan Abdul R.Khan Hasan Alkahtani 《Computers, Materials & Continua》 SCIE EI 2022年第5期2333-2346,共14页
Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture... Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture employ fine-grain data-driven parallelism.These architectures have thepotential to exploit the inherent parallelism in compute intensive applicationslike signal processing,image and video processing and so on and can thusachieve faster throughputs and higher power efficiency.In this paper,severaldata flow computing architectures are explored,and their main architecturalfeatures are studied.Furthermore,a classification of the processors is presented based on whether they employ either the data flow execution modelexclusively or in combination with the control flow model and are accordinglygrouped as exclusive data flow or hybrid architectures.The hybrid categoryis further subdivided as conjoint or accelerator-style architectures dependingon how they deploy and separate the data flow and control flow executionmodel within their execution blocks.Lastly,a brief comparison and discussionof their advantages and drawbacks is also considered.From this study weconclude that although the data flow architectures are seen to have maturedsignificantly,issues like data-structure handling and lack of efficient placementand scheduling algorithms have prevented these from becoming commerciallyviable. 展开更多
关键词 Processor architecture data flow architectures Von-Neumann model control flow architectures
在线阅读 下载PDF
Multi-faceted spatio-temporal network for weather-aware air traffic flow prediction in multi-airport system
11
作者 Kaiquan CAI Shuo TANG +2 位作者 Shengsheng QIAN Zhiqi SHEN Yang YANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2024年第7期301-316,共16页
As one of the core modules for air traffic flow management,Air Traffic Flow Prediction(ATFP)in the Multi-Airport System(MAS)is a prerequisite for demand and capacity balance in the complex meteorological environment.D... As one of the core modules for air traffic flow management,Air Traffic Flow Prediction(ATFP)in the Multi-Airport System(MAS)is a prerequisite for demand and capacity balance in the complex meteorological environment.Due to the challenge of implicit interaction mechanism among traffic flow,airspace capacity and weather impact,the Weather-aware ATFP(Wa-ATFP)is still a nontrivial issue.In this paper,a novel Multi-faceted Spatio-Temporal Graph Convolutional Network(MSTGCN)is proposed to address the Wa-ATFP within the complex operations of MAS.Firstly,a spatio-temporal graph is constructed with three different nodes,including airport,route,and fix to describe the topology structure of MAS.Secondly,a weather-aware multi-faceted fusion module is proposed to integrate the feature of air traffic flow and the auxiliary features of capacity and weather,which can effectively address the complex impact of severe weather,e.g.,thunderstorms.Thirdly,to capture the latent connections of nodes,an adaptive graph connection constructor is designed.The experimental results with the real-world operational dataset in Guangdong-Hong Kong-Macao Greater Bay Area,China,validate that the proposed approach outperforms the state-of-the-art machine-learning and deep-learning based baseline approaches in performance. 展开更多
关键词 Air traffic control graph neural network Multi-faceted information Air traffic flow prediction Multi-airport system
原文传递
以太坊庞氏骗局智能合约的早期检测方法研究
12
作者 张艳梅 郭思颖 +1 位作者 贾恒越 姜茸 《通信学报》 北大核心 2025年第9期292-306,共15页
以太坊是区块链的典型应用代表,它允许开发者创建和执行智能合约。以太坊技术的迅猛发展在推动智能合约普及的同时,也引发链上安全风险剧增,其中算法驱动的智能庞氏骗局给区块链应用带来了新的安全挑战。为了实现对智能合约庞氏骗局的... 以太坊是区块链的典型应用代表,它允许开发者创建和执行智能合约。以太坊技术的迅猛发展在推动智能合约普及的同时,也引发链上安全风险剧增,其中算法驱动的智能庞氏骗局给区块链应用带来了新的安全挑战。为了实现对智能合约庞氏骗局的早期检测,提出了一种基于图卷积网络(GCN)的检测方法PonziGCN。该方法融合了智能合约的语义特征和控制流图特征,通过提取字节码相似度、操作码频率等语义特征,以及控制流图的基本特征和结构特征,构建了多特征融合的检测框架。实验结果表明,所提方法在精确率、召回率、F值和AUC值等关键性能指标上均表现优异,精确率达到0.982,召回率为0.987,F值为0.978,AUC值为0.983,显著优于现有的算法。特征重要性分析表明,图结构特征和代码中与交易功能相关的操作码频率特征在模型中具有最高的重要性。 展开更多
关键词 以太坊 智能合约 庞氏骗局 图卷积神经网络 控制流图
在线阅读 下载PDF
基于时空动态图的交通流量预测方法研究
13
作者 孟祥福 谢伟鹏 崔江燕 《智能系统学报》 北大核心 2025年第4期776-786,共11页
为改进现有交通流量预测方法在建模时空数据和捕捉动态空间相关性方面的不足,提出了一种时空动态图卷积网络(spatio-temporal dynamic graph network,STDGNet)。该模型采用带嵌入层的编码器–解码器架构,通过动态图生成模块从数据驱动... 为改进现有交通流量预测方法在建模时空数据和捕捉动态空间相关性方面的不足,提出了一种时空动态图卷积网络(spatio-temporal dynamic graph network,STDGNet)。该模型采用带嵌入层的编码器–解码器架构,通过动态图生成模块从数据驱动的角度挖掘潜在的时空关系,并重构每个时间步的节点动态关联图。嵌入层使用时空自适应嵌入方法建模交通数据的内在时空关系和时间信息;编码器部分利用时空记忆注意力机制,从全局视角对时空特征进行建模;解码器部分将图卷积模块注入循环神经网络中,以同时捕捉时间和空间依赖关系,并输出未来流量情况。实验结果表明,所提模型与最优基线模型解耦动态时空图神经网络(decoupled dynamic spatial-temporal graph neural network,D2STGNN)相比,平均绝对误差降低了1.63%,模型训练时间缩短了近2.5倍。本研究有效提升了交通流量预测的准确性与效率,为智能交通系统的建设提供了有力支撑。 展开更多
关键词 交通流量 时空数据 混合模型 注意力机制 时空动态图 图卷积神经网络 循环神经网络 深度学习
在线阅读 下载PDF
DeepCom-GCN:融入控制流结构信息的代码注释生成模型
14
作者 钟茂生 刘会珠 +1 位作者 匡江玲 严婷 《江西师范大学学报(自然科学版)》 北大核心 2025年第1期27-36,共10页
代码注释生成是指给定一个代码片段,通过模型自动生成一段关于代码片段功能的概括性自然语言描述.不同于自然语言,程序语言具有复杂语法和强结构性.部分研究工作只利用了源代码的序列信息或抽象语法树信息,未能充分利用源代码的逻辑结... 代码注释生成是指给定一个代码片段,通过模型自动生成一段关于代码片段功能的概括性自然语言描述.不同于自然语言,程序语言具有复杂语法和强结构性.部分研究工作只利用了源代码的序列信息或抽象语法树信息,未能充分利用源代码的逻辑结构信息.针对这一问题,该文提出一种融入程序控制流结构信息的代码注释生成方法,将源代码序列和结构信息作为单独的输入进行处理,允许模型学习代码的语义和结构.在2个公开数据集上进行验证,实验结果表明:和其他基线方法相比,DeepCom-GCN在BLEU-4、METEOR和ROUGE-L指标上的性能分别提升了2.79%、1.67%和1.21%,验证了该方法的有效性. 展开更多
关键词 代码注释生成 抽象语法树 控制流图 图卷积神经网络 软件工程 程序理解 自然语言处理
在线阅读 下载PDF
面向YOLO神经网络的数据流架构优化研究 被引量:2
15
作者 穆宇栋 李文明 +5 位作者 范志华 吴萌 吴海彬 安学军 叶笑春 范东睿 《计算机学报》 北大核心 2025年第1期82-99,共18页
YOLO目标检测算法具有速度快、精度高、结构简单、性能稳定等优点,因此在多种对实时性要求较高的场景中得到广泛应用。传统的控制流架构在执行YOLO神经网络时面临计算部件利用率低、功耗高、能效较低等挑战。相较而言,数据流架构的执行... YOLO目标检测算法具有速度快、精度高、结构简单、性能稳定等优点,因此在多种对实时性要求较高的场景中得到广泛应用。传统的控制流架构在执行YOLO神经网络时面临计算部件利用率低、功耗高、能效较低等挑战。相较而言,数据流架构的执行模式与神经网络算法匹配度高,更能充分挖掘其中的数据并行性。然而,在数据流架构上部署YOLO神经网络时面临三个问题:(1)数据流架构的数据流图映射并不能结合YOLO神经网络中卷积层卷积核较小的特点,造成卷积运算数据复用率过低的问题,并进一步降低计算部件利用率;(2)数据流架构在算子调度时无法利用算子间结构高度耦合的特点,导致大量数据重复读取;(3)数据流架构上的数据存取与执行高度耦合、串序执行,导致数据存取延迟过高。为解决这些问题,本文设计了面向YOLO神经网络的数据流加速器DFU-Y。首先,结合卷积嵌套循环的执行模式,本文分析了小卷积核卷积运算的数据复用特征,并提出了更有利于执行单元内部数据复用的数据流图映射算法,从而整体提升卷积运行效率;然后,为充分利用结构耦合的算子间的数据复用,DFU-Y提出数据流图层次上的算子融合调度机制以减少数据存取次数、提升神经网络运行效率;最后,DFU-Y通过双缓存解耦合数据存取与执行,从而并行执行数据存取与运算,掩盖了程序间的数据传输延迟,提高了计算部件利用率。实验表明,相较数据流架构(DFU)和GPU(NVIDIA Xavier NX),DFU-Y分别获得2.527倍、1.334倍的性能提升和2.658倍、3.464倍的能效提升;同时,相较YOLO专用加速器(Arria-YOLO),DFU-Y在保持较好通用性的同时,达到了其性能的72.97%、能效的87.41%。 展开更多
关键词 YOLO算法 数据流架构 数据流图优化 卷积神经网络 神经网络加速
在线阅读 下载PDF
基于数据流图和混合网络模型的智能合约漏洞检测 被引量:1
16
作者 丁诗琪 陈正奎 黄海 《软件工程》 2025年第1期52-56,共5页
智能合约控制着区块链上巨额资产的流动,因此确保其安全性至关重要。基于此,提出一种基于数据流图和混合深度学习模型的方法,即DFG-HDP,用于检测智能合约的漏洞。该方法首先对智能合约源码进行清洗和变量规范;其次从源码中提取数据流特... 智能合约控制着区块链上巨额资产的流动,因此确保其安全性至关重要。基于此,提出一种基于数据流图和混合深度学习模型的方法,即DFG-HDP,用于检测智能合约的漏洞。该方法首先对智能合约源码进行清洗和变量规范;其次从源码中提取数据流特征,将其与源码结合作为输入;最后将不同的词嵌入模型与不同的深度学习模型结合,对输入进行学习检测。实验结果表明,该方法在智能合约漏洞检测中的F1值高达89.90%,优于之前的漏洞检测方法CBGRU。这一结果证明了该方法的有效性和优越性。 展开更多
关键词 智能合约 漏洞检测 数据流图 混合模型
在线阅读 下载PDF
基于时间敏感网络协议的嵌入式控制系统在机载航电系统中的应用研究 被引量:1
17
作者 曹潇男 刘艳明 +1 位作者 韩冰 陈丛 《无线互联科技》 2025年第11期51-54,共4页
时间敏感网络(Time Sensttive Networking, TSN)作为一种新兴的网络技术,能够提供高精度的时间同步和低延迟的数据传输,是解决军事通信中实时性问题的重要技术。嵌入式控制系统凭借其高效的处理能力和实时响应能力,已广泛应用于工业自... 时间敏感网络(Time Sensttive Networking, TSN)作为一种新兴的网络技术,能够提供高精度的时间同步和低延迟的数据传输,是解决军事通信中实时性问题的重要技术。嵌入式控制系统凭借其高效的处理能力和实时响应能力,已广泛应用于工业自动化。文章基于TSN协议,探讨其在嵌入式控制系统中的应用,分析了TSN协议的关键技术,如时间同步、流量调度与带宽管理,结合嵌入式系统的实现方法,提出了优化方案。研究结果表明,结合TSN协议的嵌入式控制系统可显著提升军事通信中的数据传输效率与系统稳定性,以期为TSN在军事通信中的进一步应用提供参考。 展开更多
关键词 时间敏感网络(TSN) 嵌入式控制系统 机载航电系统 数据流控制
在线阅读 下载PDF
基于源代码迁移的编译器优化方法研究
18
作者 周放 刘茂福 李珊枝 《计算机工程与科学》 北大核心 2025年第10期1890-1900,共11页
编译器优化旨在通过在中间代码IR语言上进行一系列变换,提高代码在目标平台上的运行效率。传统方法通常依赖机器学习来分析IR特征,并预测LLVM编译器优化通道的最佳组合。然而,这些方法因受限于编译器现有优化策略和对全局信息的有限利用... 编译器优化旨在通过在中间代码IR语言上进行一系列变换,提高代码在目标平台上的运行效率。传统方法通常依赖机器学习来分析IR特征,并预测LLVM编译器优化通道的最佳组合。然而,这些方法因受限于编译器现有优化策略和对全局信息的有限利用,其扩展性受限。采用深度学习自动将函数级IR从未优化状态转换至O2级别优化,并将此优化过程视为翻译任务。通过引入密集数据流图DDFG,能够提取IR代码的全局结构信息,从而引导模型更全面地学习代码语义。使用Transformer模型进行的实验表明,所提方法的模型能在O2级别有效训练IR,且86.15%的函数级优化代码能在保证语义完整性的同时,在编译器上正确执行。 展开更多
关键词 编译器优化 代码翻译 密集数据流图 数据流预测
在线阅读 下载PDF
基于路径融合的智能合约漏洞检测方法
19
作者 范亚生 谢春丽 +1 位作者 魏家劲 曾友 《计算机工程与应用》 北大核心 2025年第20期315-326,共12页
随着去中心化互联网的发展,智能合约因其不可修改性而需要在部署前确保安全性,以防范潜在的漏洞风险。尽管已有一些基于深度学习的方法用于智能合约的漏洞检测,但仍然存在以下两个问题:一是缺乏对合约结构和语义信息的充分理解;二是神... 随着去中心化互联网的发展,智能合约因其不可修改性而需要在部署前确保安全性,以防范潜在的漏洞风险。尽管已有一些基于深度学习的方法用于智能合约的漏洞检测,但仍然存在以下两个问题:一是缺乏对合约结构和语义信息的充分理解;二是神经网络模型受输入长度的制约,对长合约性能不佳。针对这两个问题,提出基于语法控制流图的合约分解和路径融合方法。基于抽象语法树构建智能合约的语法控制流图,并采用贪心策略将语法控制流图分解为多条结构简单的路径;使用预训练的代码模型学习路径的向量表示。融合不同路径的特征向量以实现漏洞检测。为验证模型的有效性,构建了一个包含7511个真实世界智能合约的数据集,实验结果表明,和主流方法相比该方法能够有效提高智能合约漏洞检测的精确率、召回率和F1值。 展开更多
关键词 智能合约 漏洞检测 控制流图 预训练模型
在线阅读 下载PDF
基于二进制重写的混合分析构建控制流图方案
20
作者 李自友 黄晓芳 殷明勇 《计算机应用研究》 北大核心 2025年第2期555-559,共5页
控制流图(CFG)是二进制程序分析的基础。传统静态分析方法构建控制流图速度快,代码覆盖率高,但不能解决间接跳转问题;动态分析方法能够分析间接跳转,但代码覆盖率低、性能开销大。为更加高效构建完备的控制流图,提出静态动态结合的混合... 控制流图(CFG)是二进制程序分析的基础。传统静态分析方法构建控制流图速度快,代码覆盖率高,但不能解决间接跳转问题;动态分析方法能够分析间接跳转,但代码覆盖率低、性能开销大。为更加高效构建完备的控制流图,提出静态动态结合的混合分析方案。首先使用静态分析获取程序的初始控制流图,采用模糊测试的方法获取目标程序不同执行流的输入数据,诱导重写后的目标程序执行获取间接跳转地址;融合静态分析和动态分析结果,从而高效构建完备的控制流图。通过实验验证,该混合分析方案相比于现有的混合分析方案,能够构建更加完整的控制流图,相比于基于动态二进制插桩的混合分析方案效率更高。 展开更多
关键词 控制流图 二进制程序 混合分析 二进制重写
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部