期刊文献+
共找到792篇文章
< 1 2 40 >
每页显示 20 50 100
AI Chain-Driven Control Flow Graph Generation for Multiple Programming Language 被引量:1
1
作者 ZOU Zhou ZUO Zhengkang HUANG Qing 《Wuhan University Journal of Natural Sciences》 2025年第3期222-230,共9页
Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysi... Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysis and Abstract Syntax Trees(ASTs),often face challenges due to the complex syntax of programming languages like Java and Python.This paper introduces a novel approach that leverages Large Language Models(LLMs)to generate CFGs through a methodical Chain of Thought(CoT)process.By employing CoT,the proposed approach systematically interprets code semantics directly from natural language,enhancing the adaptability across various programming languages and simplifying the CFG construction process.By implementing a modular AI chain strategy that adheres to the single responsibility principle,our approach breaks down CFG generation into distinct,manageable steps handled by separate AI and non-AI units,which can significantly improve the precision and coverage of CFG nodes and edges.The experiments with 245 Java and 281 Python code snippets from Stack Overflow demonstrate that our method achieves efficient performance on different programming languages and exhibits strong robustness. 展开更多
关键词 control flow graph Large Language Model Chain of Thought AI chain
原文传递
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
2
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 SOFTWARE SECURITY SOFTWARE VULNERABILITY IMPROVED control flow graph VULNERABILITY detection algorithm
原文传递
Bipartite graph-based control flow checking for COTS-based small satellites 被引量:2
3
作者 Wang Honghao Wang Huiquan Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期883-893,共11页
Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced contr... Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites. 展开更多
关键词 Bipartite graph control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites
原文传递
Graph-tree-based software control flow checking for COTS processors on pico-satellites 被引量:1
4
作者 Yang Mu Wang Hao +1 位作者 Zheng Yangming Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期413-422,共10页
This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processo... This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processors. A graph tree data structure with a topology similar to common trees is introduced to transform the control flow graphs of target programs. This together with design of IDs and signatures of its vertices and edges allows for an easy check of legality of actual branching during target program execution. As a result, the algorithm not only is capable of detecting all single and multiple branching errors with low latency and time overheads along with a linear-complexity space overhead, but also remains generic among arbitrary instruction sets and independent of any specific hardware. Tests of the algorithm using a COTS-processor-based onboard computer (OBC) of in-service ZDPS-1A pico-satellite products show that GTCFC can detect over 90% of the randomly injected and all-pattern-covering branching errors for different types of target programs, with performance and overheads consistent with the theoretical analysis; and beats well-established preeminent control flow checking algorithms in these dimensions. Furthermore, it is validated that GTCGC not only can be accommodated in pico-satellites conveniently with still sufficient system margins left, but also has the ability to minimize the risk of control flow errors being undetected in their space missions. Therefore, due to its effectiveness, efficiency, and compatibility, the GTCFC solution is ready for applications on COTS processors on pico-satellites in their real space missions. 展开更多
关键词 Branching error Commercial-off-the-shelf (COTS) control flow checking Error injection graph tree On-board computer Pico-satellite
原文传递
Data Flow Fuzzy Control of Communication Network with Finite Terminal
5
作者 邓娜 邵世煌 苏庆新 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期171-174,共4页
We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the syste... We consider the problem of data flow fuzzy control of discrete queuing systems with three different service-rate servers. The objective is to dynamically assign customers to idle severs based on the state of the system so as to minimize the mean sojourn time of customers. Simulation shows the validity of the fuzzy controller. 展开更多
关键词 data flow fuzzy control average sojourn time
在线阅读 下载PDF
An Intelligent Quality Control Method for Manufacturing Processes Based on a Human–Cyber–Physical Knowledge Graph 被引量:3
6
作者 Shilong Wang Jinhan Yang +2 位作者 Bo Yang Dong Li Ling Kang 《Engineering》 SCIE EI CAS CSCD 2024年第10期242-260,共19页
Quality management is a constant and significant concern in enterprises.Effective determination of correct solutions for comprehensive problems helps avoid increased backtesting costs.This study proposes an intelligen... Quality management is a constant and significant concern in enterprises.Effective determination of correct solutions for comprehensive problems helps avoid increased backtesting costs.This study proposes an intelligent quality control method for manufacturing processes based on a human–cyber–physical(HCP)knowledge graph,which is a systematic method that encompasses the following elements:data management and classification based on HCP ternary data,HCP ontology construction,knowledge extraction for constructing an HCP knowledge graph,and comprehensive application of quality control based on HCP knowledge.The proposed method implements case retrieval,automatic analysis,and assisted decision making based on an HCP knowledge graph,enabling quality monitoring,inspection,diagnosis,and maintenance strategies for quality control.In practical applications,the proposed modular and hierarchical HCP ontology exhibits significant superiority in terms of shareability and reusability of the acquired knowledge.Moreover,the HCP knowledge graph deeply integrates the provided HCP data and effectively supports comprehensive decision making.The proposed method was implemented in cases involving an automotive production line and a gear manufacturing process,and the effectiveness of the method was verified by the application system deployed.Furthermore,the proposed method can be extended to other manufacturing process quality control tasks. 展开更多
关键词 Quality control Human-cyber-physical ternary data Knowledge graph
在线阅读 下载PDF
Sedimentary Microfacies and Porosity Modeling of Deep-Water Sandy Debris Flows by Combining Sedimentary Patterns with Seismic Data: An Example from Unit I of Gas Field A, South China Sea 被引量:2
7
作者 LI Shengli YU Xinghe JIN Jianli 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第1期182-194,共13页
Sandy debris flow deposits are present in Unit I during Miocene of Gas Field A in the Baiyun Depression of the South China Sea. The paucity of well data and the great variability of the sedimentary microfacies make it... Sandy debris flow deposits are present in Unit I during Miocene of Gas Field A in the Baiyun Depression of the South China Sea. The paucity of well data and the great variability of the sedimentary microfacies make it difficult to identify and predict the distribution patterns of the main gas reservoir, and have seriously hindered further exploration and development of the gas field. Therefore, making full use of the available seismic data is extremely important for predicting the spatial distribution of sedimentary microfacies when constructing three-dimensional reservoir models. A suitable reservoir modeling strategy or workflow controlled by sedimentary microfacies and seismic data has been developed. Five types of seismic attributes were selected to correlate with the sand percentage, and the root mean square (RMS) amplitude performed the best. The relation between the RMS amplitude and the sand percentage was used to construct a reservoir sand distribution map. Three types of main sedimentary microfacies were identified: debris channels, fan lobes, and natural levees. Using constraints from the sedimentary microfacies boundaries, a sedimentary microfacies model was constructed using the sequential indicator and assigned value simulation methods. Finally, reservoir models of physical properties for sandy debris flow deposits controlled by sedimentary microfacies and seismic inversion data were established. Property cutoff values were adopted because the sedimentary microfacies and the reservoir properties from well-logging interpretation are intrinsically different. Selection of appropriate reservoir property cutoffs is a key step in reservoir modeling when using simulation methods based on sedimentary microfacies control. When the abnormal data are truncated and the reservoir properties probability distribution fits a normal distribution, microfacies-controlled reservoir property models are more reliable than those obtained from the sequence Gauss simulation method. The cutoffs for effective porosity of the debris channel, fan lobe, and natural levee facies were 0.2, 0.09, and 0.12, respectively; the corresponding average effective porosities were 0.24, 0.13, and 0.15. The proposed modeling method makes full use of seismic attributes and seismic inversion data, and also makes the property data of single-well depositional microfacies more conformable to a normal distribution with geological significance. Thus, the method allows use of more reliable input data when we construct a model of a sandy debris flow. 展开更多
关键词 sandy debris flow deposit seismic attribute and inversion geological modeling controlled by micro-facies data truncated process
在线阅读 下载PDF
Detecting Data-flow Errors Based on Petri Nets With Data Operations 被引量:4
8
作者 Dongming Xiang Guanjun Liu +1 位作者 Chungang Yan Changjun Jiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期251-260,共10页
In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so o... In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so on. However, there are not too many methods for detecting data-flow errors. This paper defines Petri nets with data operations(PN-DO) that can model the operations on data such as read, write and delete. Based on PN-DO, we define some data-flow errors in this paper. We construct a reachability graph with data operations for each PN-DO, and then propose a method to reduce the reachability graph. Based on the reduced reachability graph, data-flow errors can be detected rapidly. A case study is given to illustrate the effectiveness of our methods. 展开更多
关键词 Business process modeling data-flow errors Petri nets reachability graph
在线阅读 下载PDF
Exploring the Approaches to Data Flow Computing
9
作者 Mohammad B.Khan Abdul R.Khan Hasan Alkahtani 《Computers, Materials & Continua》 SCIE EI 2022年第5期2333-2346,共14页
Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture... Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture employ fine-grain data-driven parallelism.These architectures have thepotential to exploit the inherent parallelism in compute intensive applicationslike signal processing,image and video processing and so on and can thusachieve faster throughputs and higher power efficiency.In this paper,severaldata flow computing architectures are explored,and their main architecturalfeatures are studied.Furthermore,a classification of the processors is presented based on whether they employ either the data flow execution modelexclusively or in combination with the control flow model and are accordinglygrouped as exclusive data flow or hybrid architectures.The hybrid categoryis further subdivided as conjoint or accelerator-style architectures dependingon how they deploy and separate the data flow and control flow executionmodel within their execution blocks.Lastly,a brief comparison and discussionof their advantages and drawbacks is also considered.From this study weconclude that although the data flow architectures are seen to have maturedsignificantly,issues like data-structure handling and lack of efficient placementand scheduling algorithms have prevented these from becoming commerciallyviable. 展开更多
关键词 Processor architecture data flow architectures Von-Neumann model control flow architectures
在线阅读 下载PDF
基于分段函数的不透明谓词
10
作者 陈沈杰 王智昊 吴彪 《电子科技》 2026年第2期45-53,共9页
作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号... 作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号执行技术以及混淆后程序控制流较简单问题,文中提出了一种基于分段函数的不透明谓词。攻击动态符号执行存在的缺陷,利用分段函数使引入的变量收敛于设定值,以此构造不透明谓词,隐藏程序真实控制流。基于LLVM(Low Level Virtual Machine)框架实现了所提混淆系统,并进行了实验检测。实验结果表明,所提混淆方法有效增加了程序控制流的复杂度,能够抵御动态符号执行技术。相较于现有混淆系统,所提方法使程序的可维护度平均下降23.8%,具有更高的混淆强度。 展开更多
关键词 代码混淆系统 不透明谓词 虚假控制流 符号执行 静态分析 LLVM 逆向工程 控制流图
在线阅读 下载PDF
基于数据建模和知识图谱的传染病监测预警系统设计
11
作者 东单锋 李民 顾朗 《医疗卫生装备》 2026年第1期42-49,共8页
目的:为了提高对传染病等突发公共卫生事件的预警和防控能力,设计传染病监测预警系统。方法:传染病监测预警系统基于数据建模和知识图谱设计,通过构建传染病预警模型实现传染病预测。该系统前端主要采用Web形式开发,部署在阿里云;后端采... 目的:为了提高对传染病等突发公共卫生事件的预警和防控能力,设计传染病监测预警系统。方法:传染病监测预警系统基于数据建模和知识图谱设计,通过构建传染病预警模型实现传染病预测。该系统前端主要采用Web形式开发,部署在阿里云;后端采用Java语言开发,部署在政务云。整个系统主要包括数据采集、知识图谱、传染病监测和传染病预警4个功能模块。结果:该系统可整合医疗机构、医保中心、气象服务中心等多部门的相关数据,实现早期传染病的预警和可视化展示,提高传染病预测的准确性。结论:该系统能够对传染病进行准确监测和预警,可为传染病防控提供数据支撑。 展开更多
关键词 知识图谱 数据建模 传染病 传染病监测 传染病预警 传染病防控
在线阅读 下载PDF
一种基于FlowDroid的Android隐私保护方法 被引量:2
12
作者 马绍菊 万良 +1 位作者 杨婷 马林进 《计算机应用与软件》 2017年第5期317-321,共5页
随着移动设备市场的扩大,Android智能系统占据了手机市场的很大份额,手机设备是承载用户隐私数据较多的移动设备。由于Android系统的开源特性,其存在很多安全隐患。提出一种基于FlowDroid的Android增强型隐私保护方法。对Android应用进... 随着移动设备市场的扩大,Android智能系统占据了手机市场的很大份额,手机设备是承载用户隐私数据较多的移动设备。由于Android系统的开源特性,其存在很多安全隐患。提出一种基于FlowDroid的Android增强型隐私保护方法。对Android应用进行静态污点分析,判断其是否存在隐私泄露,并基于FlowDroid静态污点分析工具实现与验证。通过验证表明提出的方法是有效的。 展开更多
关键词 静态污点 隐私泄露 程序间控制流图 ANDROID操作系统
在线阅读 下载PDF
Dynamical Self-Reconfigurable Mechanism for Data-Driven Cell Array 被引量:3
13
作者 SHAN Rui JIANG Lin +2 位作者 WU Haoyue HE Feilong LIU Xinchuang 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期511-521,共11页
The utilization of computation resources and reconfiguration time has a large impact on reconfiguration system performance. In order to promote the performance, a dynamical self-reconfigurable mechanism for data-drive... The utilization of computation resources and reconfiguration time has a large impact on reconfiguration system performance. In order to promote the performance, a dynamical self-reconfigurable mechanism for data-driven cell array is proposed. Cells can be fired only when the needed data arrives, and cell array can be worked on two modes: fixed execution and reconfiguration. On reconfiguration mode, cell function and data flow direction are changed automatically at run time according to contexts. Simultaneously using an H-tree interconnection network, through pre-storing multiple application mapping contexts in reconfiguration buffer, multiple applications can execute concurrently and context switching time is the minimal. For verifying system performance, some algorithms are selected for mapping onto the proposed structure, and the amount of configuration contexts and execution time are recorded for statistical analysis. The results show that the proposed self-reconfigurable mechanism can reduce the number of contexts efficiently, and has a low computing time. 展开更多
关键词 cell array configurable computing self-reconfigurable mechanism data-DRIVEN data flow graph
原文传递
Research of the Control Domain of Edges in Regression Testing 被引量:1
14
作者 高建华 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期57-61,共5页
Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the mo... Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the modifications. The goal of regression testing is to reduce the test suit by testing the new characters and the modified parts of a program with the original test suit. Regression testing is a high cost testing method. This paper presents a regression testing selection technique that can reduce the test suit on the basis of Control Flow Graph (CFG). It import the inherit strategy of object-oriented language to ensure an edge’s control domain to reduce the test suit size effectively. We implement the idea by coding the edge. An algorithm is also presented at last. 展开更多
关键词 regression testing control flow graph control domain of edges code value of edge inherit strategy
在线阅读 下载PDF
Federated Approach for Privacy-Preserving Traffic Prediction Using Graph Convolutional Network 被引量:1
15
作者 LONARE Savita BHRAMARAMBA Ravi 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第3期509-517,共9页
Existing traffic flow prediction frameworks have already achieved enormous success due to large traffic datasets and capability of deep learning models.However,data privacy and security are always a challenge in every... Existing traffic flow prediction frameworks have already achieved enormous success due to large traffic datasets and capability of deep learning models.However,data privacy and security are always a challenge in every field where data need to be uploaded to the cloud.Federated learning(FL)is an emerging trend for distributed training of data.The primary goal of FL is to train an efficient communication model without compromising data privacy.The traffic data have a robust spatio-temporal correlation,but various approaches proposed earlier have not considered spatial correlation of the traffic data.This paper presents FL-based traffic flow prediction with spatio-temporal correlation.This work uses a differential privacy(DP)scheme for privacy preservation of participant's data.To the best of our knowledge,this is the first time that FL is used for vehicular traffic prediction while considering the spatio-temporal correlation of traffic data with DP preservation.The proposed framework trains the data locally at the client-side with DP.It then uses the model aggregation mechanism federated graph convolutional network(FedGCN)at the server-side to find the average of locally trained models.The results of the proposed work show that the FedGCN model accurately predicts the traffic.DP scheme at client-side helps clients to set a budget for privacy loss. 展开更多
关键词 federated learning(FL) traffic flow prediction data privacy graph convolutional network(GCN) differential privacy(DP)
原文传递
Multi-faceted spatio-temporal network for weather-aware air traffic flow prediction in multi-airport system
16
作者 Kaiquan CAI Shuo TANG +2 位作者 Shengsheng QIAN Zhiqi SHEN Yang YANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2024年第7期301-316,共16页
As one of the core modules for air traffic flow management,Air Traffic Flow Prediction(ATFP)in the Multi-Airport System(MAS)is a prerequisite for demand and capacity balance in the complex meteorological environment.D... As one of the core modules for air traffic flow management,Air Traffic Flow Prediction(ATFP)in the Multi-Airport System(MAS)is a prerequisite for demand and capacity balance in the complex meteorological environment.Due to the challenge of implicit interaction mechanism among traffic flow,airspace capacity and weather impact,the Weather-aware ATFP(Wa-ATFP)is still a nontrivial issue.In this paper,a novel Multi-faceted Spatio-Temporal Graph Convolutional Network(MSTGCN)is proposed to address the Wa-ATFP within the complex operations of MAS.Firstly,a spatio-temporal graph is constructed with three different nodes,including airport,route,and fix to describe the topology structure of MAS.Secondly,a weather-aware multi-faceted fusion module is proposed to integrate the feature of air traffic flow and the auxiliary features of capacity and weather,which can effectively address the complex impact of severe weather,e.g.,thunderstorms.Thirdly,to capture the latent connections of nodes,an adaptive graph connection constructor is designed.The experimental results with the real-world operational dataset in Guangdong-Hong Kong-Macao Greater Bay Area,China,validate that the proposed approach outperforms the state-of-the-art machine-learning and deep-learning based baseline approaches in performance. 展开更多
关键词 Air traffic control graph neural network Multi-faceted information Air traffic flow prediction Multi-airport system
原文传递
拜占庭容错计算机的数据处理方法研究 被引量:1
17
作者 冯帅 张锦江 +6 位作者 徐建 王晶 徐春 桂庆华 程迎坤 于丹 蔡彪 《宇航学报》 北大核心 2025年第5期1015-1023,共9页
计算机数据分析和处理是计算机设计与应用的重要内容,但目前多模冗余计算机的研究主要集中在冗余硬件设计,对计算机应用中涉及的数据分析与处理研究不足。针对中国空间站制导、导航与控制(GNC)系统应用的拜占庭容错计算机的数据分析与... 计算机数据分析和处理是计算机设计与应用的重要内容,但目前多模冗余计算机的研究主要集中在冗余硬件设计,对计算机应用中涉及的数据分析与处理研究不足。针对中国空间站制导、导航与控制(GNC)系统应用的拜占庭容错计算机的数据分析与处理需求,描述了容错计算机的内外部接口设计,详细说明了采用的任务时序设计、数据交换比对设计、数据特性分类处理和故障机数据处理等技术要点,并介绍了典型的数据流设计情况,最后结合地面测试及在轨数据对计算机的测试验证情况进行了说明。验证结果证明了所提数据分析与处理方法的正确性。 展开更多
关键词 容错计算机 数据处理 数据流 中国空间站 导航、制导与控制
在线阅读 下载PDF
以太坊庞氏骗局智能合约的早期检测方法研究
18
作者 张艳梅 郭思颖 +1 位作者 贾恒越 姜茸 《通信学报》 北大核心 2025年第9期292-306,共15页
以太坊是区块链的典型应用代表,它允许开发者创建和执行智能合约。以太坊技术的迅猛发展在推动智能合约普及的同时,也引发链上安全风险剧增,其中算法驱动的智能庞氏骗局给区块链应用带来了新的安全挑战。为了实现对智能合约庞氏骗局的... 以太坊是区块链的典型应用代表,它允许开发者创建和执行智能合约。以太坊技术的迅猛发展在推动智能合约普及的同时,也引发链上安全风险剧增,其中算法驱动的智能庞氏骗局给区块链应用带来了新的安全挑战。为了实现对智能合约庞氏骗局的早期检测,提出了一种基于图卷积网络(GCN)的检测方法PonziGCN。该方法融合了智能合约的语义特征和控制流图特征,通过提取字节码相似度、操作码频率等语义特征,以及控制流图的基本特征和结构特征,构建了多特征融合的检测框架。实验结果表明,所提方法在精确率、召回率、F值和AUC值等关键性能指标上均表现优异,精确率达到0.982,召回率为0.987,F值为0.978,AUC值为0.983,显著优于现有的算法。特征重要性分析表明,图结构特征和代码中与交易功能相关的操作码频率特征在模型中具有最高的重要性。 展开更多
关键词 以太坊 智能合约 庞氏骗局 图卷积神经网络 控制流图
在线阅读 下载PDF
基于时空动态图的交通流量预测方法研究
19
作者 孟祥福 谢伟鹏 崔江燕 《智能系统学报》 北大核心 2025年第4期776-786,共11页
为改进现有交通流量预测方法在建模时空数据和捕捉动态空间相关性方面的不足,提出了一种时空动态图卷积网络(spatio-temporal dynamic graph network,STDGNet)。该模型采用带嵌入层的编码器–解码器架构,通过动态图生成模块从数据驱动... 为改进现有交通流量预测方法在建模时空数据和捕捉动态空间相关性方面的不足,提出了一种时空动态图卷积网络(spatio-temporal dynamic graph network,STDGNet)。该模型采用带嵌入层的编码器–解码器架构,通过动态图生成模块从数据驱动的角度挖掘潜在的时空关系,并重构每个时间步的节点动态关联图。嵌入层使用时空自适应嵌入方法建模交通数据的内在时空关系和时间信息;编码器部分利用时空记忆注意力机制,从全局视角对时空特征进行建模;解码器部分将图卷积模块注入循环神经网络中,以同时捕捉时间和空间依赖关系,并输出未来流量情况。实验结果表明,所提模型与最优基线模型解耦动态时空图神经网络(decoupled dynamic spatial-temporal graph neural network,D2STGNN)相比,平均绝对误差降低了1.63%,模型训练时间缩短了近2.5倍。本研究有效提升了交通流量预测的准确性与效率,为智能交通系统的建设提供了有力支撑。 展开更多
关键词 交通流量 时空数据 混合模型 注意力机制 时空动态图 图卷积神经网络 循环神经网络 深度学习
在线阅读 下载PDF
DeepCom-GCN:融入控制流结构信息的代码注释生成模型
20
作者 钟茂生 刘会珠 +1 位作者 匡江玲 严婷 《江西师范大学学报(自然科学版)》 北大核心 2025年第1期27-36,共10页
代码注释生成是指给定一个代码片段,通过模型自动生成一段关于代码片段功能的概括性自然语言描述.不同于自然语言,程序语言具有复杂语法和强结构性.部分研究工作只利用了源代码的序列信息或抽象语法树信息,未能充分利用源代码的逻辑结... 代码注释生成是指给定一个代码片段,通过模型自动生成一段关于代码片段功能的概括性自然语言描述.不同于自然语言,程序语言具有复杂语法和强结构性.部分研究工作只利用了源代码的序列信息或抽象语法树信息,未能充分利用源代码的逻辑结构信息.针对这一问题,该文提出一种融入程序控制流结构信息的代码注释生成方法,将源代码序列和结构信息作为单独的输入进行处理,允许模型学习代码的语义和结构.在2个公开数据集上进行验证,实验结果表明:和其他基线方法相比,DeepCom-GCN在BLEU-4、METEOR和ROUGE-L指标上的性能分别提升了2.79%、1.67%和1.21%,验证了该方法的有效性. 展开更多
关键词 代码注释生成 抽象语法树 控制流图 图卷积神经网络 软件工程 程序理解 自然语言处理
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部