期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于BERT与自编码器的概念漂移恶意软件分类优化 被引量:1
1
作者 赵浩钧 邹德清 +2 位作者 薛文杰 吴月明 金海 《软件学报》 北大核心 2025年第8期3709-3725,共17页
软件概念漂移指同类型软件的软件结构和组成成分会随着时间的推移而改变.在恶意软件分类领域,发生概念漂移意味着同一家族的恶意样本的结构和组成特征会随时间发生变化,这会导致固定模式的恶意软件分类算法的性能会随时间推移而发生下降... 软件概念漂移指同类型软件的软件结构和组成成分会随着时间的推移而改变.在恶意软件分类领域,发生概念漂移意味着同一家族的恶意样本的结构和组成特征会随时间发生变化,这会导致固定模式的恶意软件分类算法的性能会随时间推移而发生下降.现有的恶意软件静态分类研究方法在面临概念漂移场景时都会有显著的性能下降,因此难以满足实际应用的需求.针对这一问题,鉴于自然语言理解领域与二进制程序字节流分析领域的共性,基于BERT和自定义的自编码器架构提出一种高精度、鲁棒的恶意软件分类方法.该方法首先通过反汇编分析提取执行导向的恶意软件操作码序列,减少冗余信息;然后使用BERT理解序列的上下文语义并进行向量嵌入,有效地理解恶意软件的深层程序语义;再通过几何中位数子空间投影和瓶颈自编码器进行任务相关的有效特征筛选;最后通过全连接层构成的分类器输出分类结果.在普通场景和概念漂移场景中,通过与最先进的9种恶意软件分类方法进行对比实验验证所提方法的实际有效性.实验结果显示:所提方法在普通场景下的分类F1值达到99.49%,高于所有对比方法,且在概念漂移场景中的分类F1值比所有对比方法提高10.78%–43.71%. 展开更多
关键词 恶意软件静态分析 概念漂移 鲁棒性优化
在线阅读 下载PDF
DMHFR:Decoder with Multi-Head Feature Receptors for Tract Image Segmentation
2
作者 Jianuo Huang Bohan Lai +2 位作者 Weiye Qiu Caixu Xu Jie He 《Computers, Materials & Continua》 2025年第3期4841-4862,共22页
The self-attention mechanism of Transformers,which captures long-range contextual information,has demonstrated significant potential in image segmentation.However,their ability to learn local,contextual relationships ... The self-attention mechanism of Transformers,which captures long-range contextual information,has demonstrated significant potential in image segmentation.However,their ability to learn local,contextual relationships between pixels requires further improvement.Previous methods face challenges in efficiently managing multi-scale fea-tures of different granularities from the encoder backbone,leaving room for improvement in their global representation and feature extraction capabilities.To address these challenges,we propose a novel Decoder with Multi-Head Feature Receptors(DMHFR),which receives multi-scale features from the encoder backbone and organizes them into three feature groups with different granularities:coarse,fine-grained,and full set.These groups are subsequently processed by Multi-Head Feature Receptors(MHFRs)after feature capture and modeling operations.MHFRs include two Three-Head Feature Receptors(THFRs)and one Four-Head Feature Receptor(FHFR).Each group of features is passed through these MHFRs and then fed into axial transformers,which help the model capture long-range dependencies within the features.The three MHFRs produce three distinct feature outputs.The output from the FHFR serves as auxiliary auxiliary features in the prediction head,and the prediction output and their losses will eventually be aggregated.Experimental results show that the Transformer using DMHFR outperforms 15 state of the arts(SOTA)methods on five public datasets.Specifically,it achieved significant improvements in mean DICE scores over the classic Parallel Reverse Attention Network(PraNet)method,with gains of 4.1%,2.2%,1.4%,8.9%,and 16.3%on the CVC-ClinicDB,Kvasir-SEG,CVC-T,CVC-ColonDB,and ETIS-LaribPolypDB datasets,respectively. 展开更多
关键词 Medical image segmentation feature exploration feature aggregation deep learning multi-head feature receptor
在线阅读 下载PDF
Can large language models effectively process and execute financial trading instructions?
3
作者 Yu KANG Xin YANG +3 位作者 Ge WANG Yuda WANG Zhanyu WANG Mingwen LIU 《Frontiers of Information Technology & Electronic Engineering》 2025年第10期1832-1846,共15页
The development of large language models(LLMs)has created transformative opportunities for the financial industry,especially in the area of financial trading.However,how to integrate LLMs with trading systems has beco... The development of large language models(LLMs)has created transformative opportunities for the financial industry,especially in the area of financial trading.However,how to integrate LLMs with trading systems has become a challenge.To address this problem,we propose an intelligent trade order recognition pipeline that enables the conversion of trade orders into a standard format for trade execution.The system improves the ability of human traders to interact with trading platforms while addressing the problem of misinformation acquisition in trade execution.In addition,we create a trade order dataset of 500 pieces of data to simulate the real-world trading scenarios.Moreover,we design several metrics to provide a comprehensive assessment of dataset reliability and the generative power of big models in finance by using five state-of-the-art LLMs on our dataset.The results show that most models generate syntactically valid JavaScript object notation(JSON)at high rates(about 80%–99%)and initiate clarifying questions in nearly all incomplete cases(about 90%–100%).However,end-to-end accuracy remains low(about 6%–14%),and missing information is substantial(about 12%–66%).Models also tend to over-interrogate—roughly 70%–80%of follow-ups are unnecessary—raising interaction costs and potential information-exposure risk.The research also demonstrates the feasibility of integrating our pipeline with the real-world trading systems,paving the way for practical deployment of LLM-based trade automation solutions. 展开更多
关键词 Large language model Financial instruction Evaluation Dataset construction
原文传递
Pilot-reference-free continuous-variable quantum key distribution with efficient decoy-state analysis
4
作者 ANRAN JIN XINGJIAN ZHANG +2 位作者 LIANG JIANG RICHARD VPENTY PEI ZENG 《Photonics Research》 2025年第8期2013-2032,共20页
Continuous-variable quantum key distribution(CV QKD)using optical coherent detectors is practically favorable due to its low implementation cost,flexibility of wavelength division multiplexing,and compatibility with s... Continuous-variable quantum key distribution(CV QKD)using optical coherent detectors is practically favorable due to its low implementation cost,flexibility of wavelength division multiplexing,and compatibility with standard coherent communication technologies.However,the security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space.Also,the transmission of strong reference pulses undermines the security and complicates the experiments.In this work,we tackle these two problems by presenting a time-bin-encoding CV protocol with a simple phase-error-based security analysis valid under general coherent attacks.With the key encoded into the relative intensity between two optical modes,the need for global references is removed.Furthermore,phase randomization can be introduced to decouple the security analysis of different photon-number components.We can hence tag the photon number for each round,effectively estimate the associated privacy using a carefully designed coherent-detection method,and independently extract encryption keys from each component.Simulations manifest that the protocol using multi-photon components increases the key rate by two orders of magnitude compared to the one using only the single-photon component.Meanwhile,the protocol with four-intensity decoy analysis is sufficient to yield tight parameter estimation with a short-distance key-rate performance comparable to the best Bennett-Brassard-1984 implementation. 展开更多
关键词 security analysis continuous variable quantum key distribution cv qkd transmission strong reference pulses pilot reference free optical coherent detectors parameter estimation standard coherent communication technologieshoweverthe
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部