Computer Science ›› 2021, Vol. 48 ›› Issue (10): 308-314.doi: 10.11896/jsjkx.210200166
• Information Security • Previous Articles Next Articles
LI Yi-meng, LI Cheng-hai, SONG Ya-fei, WANG Jian
CLC Number:
[1]CNNIC.The 46th China Statistical Report on Internet Development [EB/OL].(2020-09-29).http://www.gov.cn/xinwen/2020-09/29/content_5548175.htm. [2]CNCERT.Analysis Report of China's Internet Network Security Monitoring Data in the First Half of 2020[EB/OL].(2020-09-26).http://www.cac.gov.cn/2020-09/26/c_1602682854845452.htm. [3]ZHANG C,GUO Y,LI M.A review of development and application of artificial neural network models [J/OL].Computer Engineering and Applications.https://kns-cnki-net.webvpn.bjmu.edu.cn/kcms/detail/11.2127.TP.20210402.1348.004.html. [4]WANG G D,LU T L,YIN H R,et al.Malicious Code Family Detection Technology Based on CNN-BILSTM[J].Computer Engineering and Applications,2020,56(24):72-77. [5]LONG T Y,WAN L,DING H W.Research on the Application of Autocoding Network in Javascript Malicious Code Detection[J].Computer Science and Exploration,2019,13(12):2073-2084. [6]HAO J W,LUO S L,ZHANG H Q,et al.Android maliciousAPP multi-view family classification method [J/OL].Journal of Beijing University of Aeronautics and Astronautics.https://doi-org-443.webvpn.bjmu.edu.cn/10.13700/j.bh.1001-5965.2020.0658. [7]LI Y,LUO S L,HAO J W,et al.Malware family classification method based on abstract assembly instructions[J/OL].Journal of Beijing University of Aeronautics and Astronautics.https://doi-org-443.webvpn.bjmu.edu.cn/10.13700/j.bh.1001-5965.2020.0568. [8]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.ImageNet classification with deep convolutional neural networks[C]//the Proceedings of the 25th International Conference on Neural Information Processing Systems.2012:1097-1105. [9]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-BasedLearning Applied to Document Recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324. [10]SIMONYAN K,ZISSERMAN A.Very Deep Convolutional Networks for Large-Scale Image Recognition[J].Computer Scien-ce,2014(7):21-34. [11]SZEGEDY C,LIU W,JIA Y Q,et al.Going Deeper with Convolutions[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2015:1-9. [12]SZEGEDY C,VANHOUCKE V,IOFFE S,et al.Rethinking the Inception Architecture for Computer Vision[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:2818-2826. [13]HE K,ZHANG X Y,REN S Q,et al.Deep Residual Learning for Image Recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778. [14]LONG J,SHELHAMER E,DARRELL T,et al.Fully Convolutional Networks for Semantic Segmentation[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2015:3431-3440. [15]GREFF K,SRIVASTAVA R K,KOUTNÍK J,et al.LSTM:A Search Space Odyssey[C]//IEEE Transactions on Neural Networks and Learning Systems.2017:2222-2232. [16]CHO K,MERRIENBOER B V,GULCEHRE C,et al.Learning Phrase Representations Using RNN Encoder-Decoder for Statistical Machine Translation[C]//Proceedings of the 2014 Confe-rence on Empirical Methods in Natural Language Processing (EMNLP).Stroudsburg,PA:ACL,2014:1724-1734. [17]HUANG G,LIU Z,WEINBERGER K Q,et al.Densely Connected Convolutional Networks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:4700-4708. [18]HU J,SHEN L,ALBANIE S,et al.Squeeze-and-Excitation Networks[C]//IEEE Transactions on Pattern Analysis and Machine Intelligence.2019:2011-2023. [19]BHODIA N,PRAJAPATI P,TROIA F D,et al.TransferLearning for Image-Based Malware Classification[C]//International Conference on International Workshop on Formal Me-thods for Security Engineering.2019. |
[1] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[2] | DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145. |
[3] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[4] | XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182. |
[5] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[6] | WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[9] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[10] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[11] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[12] | JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186. |
[13] | XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219. |
[14] | PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247. |
[15] | ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105. |
|