-
161
Unknown attack detection model based on network behavior analysis
Published 2016-06-01“…As for the intranet security threats of the increasing number of unknown attacks,an unknown attack detection model based on network behavior analysis was proposed.With the help of the information resources within the intranet,firstly,the information resources of the intranet were collected,then the risk factors of abnormal behav-ior of the internet information node were analyzed,finally,the information node and the information resources ac-quisition path as the key element were used to construct the detection model of the directed graph.By verifying,the model can achieve the desired detection results.…”
Get full text
Article -
162
Static-analysis-based event input generation approach for Android application
Published 2017-06-01“…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
Get full text
Article -
163
Wireless secure enhancement with cooperative jamming
Published 2017-02-01“…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
Get full text
Article -
164
A Machine Learning Approach for the Prediction of Thermostable β-Glucosidases
Published 2025-04-01“…In this study, I used graph-based structural signatures to represent three-dimensional structures of β-glucosidase enzymes extracted from thermophilic organisms. …”
Get full text
Article -
165
A GNN-Based False Data Detection Scheme for Smart Grids
Published 2025-03-01“…Based on spatial temporal graph neural networks (STGNNs), anomaly detection technology has been presented to detect anomaly data in smart grids with good performance. …”
Get full text
Article -
166
A Knowledge-Driven Approach to Automate Job Hazard Analysis Process
Published 2024-12-01“…The data were imported to the JHAKG from an incident database using rule-based natural language processing (NLP) which helped to extract implicit information not evident in the traditional JHA document. …”
Get full text
Article -
167
Recursive GNNs for Learning Precoding Policies With Size-Generalizability
Published 2024-01-01“…Graph neural networks (GNNs) have been shown promising in optimizing power allocation and link scheduling with good size generalizability and low training complexity. …”
Get full text
Article -
168
Study of the Efficacy of Neural Mobilizations to Improve Sensory and Functional Responses of Lower Extremities in Older Adults with Diabetic Peripheral Neuropathy Using Plithogenic...
Published 2024-12-01“…It is due to such complexity that we selected the Plithogenic n- SuperHyperGraph as a tool to represent the collected data, which were processed with the help of the multi-way log-linear model for contingency tables. …”
Get full text
Article -
169
Survival Prediction of Esophageal Cancer Using 3D CT Imaging: A Context-Aware Approach With Non-Local Feature Aggregation and Graph-Based Spatial Interaction
Published 2025-01-01“…In the current study, we aimed to develop an effective EC survival risk prediction using only 3D computed tomography (CT) images.The proposed model consists of two essential components: 1) non-local feature aggregation module(NFAM) that integrates visual features from tumor and lymph nodes at both local and global scales, 2) graph-based spatial interaction module(GSIM) that explores the latent contextual interactions between tumors and lymph nodes.The experimental results demonstrate that our model achieves superior performance compared to state-of-the-art survival prediction methods, emphasizing its robust predictive capability. …”
Get full text
Article -
170
Spatial Proximity Relations-Driven Semantic Representation for Geospatial Entity Categories
Published 2025-06-01“…Unsupervised representation learning can train deep learning models to formally express the semantic connotations of objects in the case of unlabeled data, which can effectively realize the expression of the semantics of geospatial entity categories in application scenarios lacking expert knowledge and help achieve the deep fusion of geospatial data. …”
Get full text
Article -
171
Sentimentally enhanced conversation recommender system
Published 2025-01-01“…First, we construct a comprehensive and highly optimized knowledge graph, termed MAKG, which provides a rich and complete set of entities to help the model capture user preferences more holistically. …”
Get full text
Article -
172
Robust multi-view locality preserving regression embedding
Published 2024-12-01“…Feature extraction research has witnessed significant advancements in recent decades, particularly with single-view graph embedding (GE) methods that demonstrate clear advantages by incorporating structural information. …”
Get full text
Article -
173
Investigating Similarities Across Decentralized Finance (DeFi) Services
Published 2025-03-01“… We explore the adoption of graph representation learning (GRL) algorithms to investigate similarities across services offered by Decentralized Finance (DeFi) protocols. …”
Get full text
Article -
174
NEOntometrics - A Public Endpoint for Calculating Ontology Metrics
Published 2024-12-01“…Ontologies are the cornerstone of the semantic web and knowledge graphs. They are available from various sources, come in many shapes and sizes, and differ widely in attributes like expressivity, degree of interconnection, or the number of individuals. …”
Get full text
Article -
175
Fast Decision Making of Point Cloud Video Geometry CU Partition Based on Occupied Pixels
Published 2025-01-01“…The video-based point cloud compression Standard (V-PCC) uses file-based projection technology to map point cloud data in three-dimensional space to two-dimensional space, creating geometric graphs and attribute graphs, then, with the help of the currently very mature two-dimensional video image coding technologies, such as high-efficiency video coding (HEVC), Versatile Video Coding (VVC), etc., these generated images are encoded and processed. …”
Get full text
Article -
176
3D molecular structural modeling and characterization of indium phosphide via irregularity topological indices
Published 2024-05-01“…The topological characterization of 3D molecular structures can be performed via graph theory. In graph theory, the connections between atoms are represented as edges and the atoms themselves are represented as nodes. …”
Get full text
Article -
177
Unlocking insights: integrated text mining and interpretive structural modeling for enhanced user review analysis
Published 2024-12-01“…The fusion of text mining and systematic analysis helps users to locate products quickly and precisely from the huge review information. …”
Get full text
Article -
178
TAD-Net: An approach for real-time action detection based on temporal convolution network and graph convolution network in digital twin shop-floor [version 1; peer review: 2 approv...
Published 2021-12-01“…Background: Intelligent monitoring of human action in production is an important step to help standardize production processes and construct a digital twin shop-floor rapidly. …”
Get full text
Article -
179
A community partitioning algorithm based on network enhancement
Published 2021-01-01“…However, the existing community discovery algorithms are not effective in dealing with complex network which always contains fuzzy community structure. With the help of graph convolution, the proposed algorithm defines the connectivity between any nodes in a network and constructs the symmetric doubly stochastic matrix. …”
Get full text
Article -
180
Network Visualization of Cooperative Games
Published 2025-03-01“…By representing interactions through a graph, this study deepens the understanding of player relationships and synergies. …”
Get full text
Article