Computer Science ›› 2022, Vol. 49 ›› Issue (10): 310-318.doi: 10.11896/jsjkx.210700248
• Information Security • Previous Articles Next Articles
WANG Tian-yuan, WU Shu-hong, LI Zhao-ji, XIN Hao-guang, LI Xuan, CHEN Yong-le
CLC Number:
[1]KIM S K,KOPPEN M ,BASHIR A K,et al.Advanced ICT andIOT Technologies for the fourth Industrial Revolution [J].Intelligent Automation & Soft Computing,2020,26(1):83-85. [2]WAN M,LI J,LIU Y,et al.Characteristic insights on industrial cyber security and popular defense mechanisms [J].China Communications,2021,18(1):130-150. [3]MILLER B P,FREDRIKSEN L,SO B,et al.An empirical study of the reliability of UNIX utilities[J].Communications of the ACM,1990,33(12):32-44. [4]RAULI K,MARKO L,ARI T.Software security assessmentthrough specification mutations and fault injection [C]//Communications and Multimedia Security Issues of the New Century.New York:Springer,2001:173-183. [5]GREG B,MARCO C,VIKTORIA F.Snooze:toward a stateful network protocol fuzzer [C]//International Conference on Information Security.New York:ACM,2006:343-358. [6]DEVARAJAN G.Unraveling SCADA protocols:using sulleyfuzzer,presented at the DefCon 15 Hacking conference [EB/OL].http://www.defcon.org/html/defcon-15/de-15-speakers.html. [7]VOVIATZIS A G,KATSIGIANNIS K,KOUBIAS S.A Mod-bus/TCP Fuzzer for testing internetworked industrial systems[C]//2015 IEEE 20th Conference on Emerging Technologies & Factory Automation(ETFA).IEEE,2015. [8]HU Z C,SHI J Q,HUANG Y H,et al.GANFuzz:A Gan-basedindustrial network protocol fuzzing framework [C]//The 15th ACM International Conference,Computing.Frontiers.New York:ACM,2018:138-145. [9]LI Z H,ZHAO H,SHI J Q,et al.An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning [J].IEEE Access,2019,7:49327-49340. [10]ZHAO H,LI Z H,WEI H S,et al.SeqFuzzer:An IndustrialProtocol Fuzzing Framework from a Deep Learning Perspective [C]//2019 12th IEEE Conference on Software Testing,Validation and Verification.Xi'an,China:ICST,2019:59-67. [11]TU Z P,LU Z D,LIU Y,et al.Modeling coverage for neural machine translation [C]//Proceedings of the 54th Annual Mee-ting of the Association for Computational Linguistics.Berlin:ACL,2016:76-85. [12]GODEFROID P,PELEG H,SINGH R.Learn&fuzz:Machinelearning for input fuzzing [C]//Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering.Urbana:IEEE Press,2017:50-59. [13]RAJPAL M,BLUM W,SINGH R.Not all bytes are equal:Neural byte sieve for fuzzing [EB/OL].https://arxiv.org/abs/1711.04596. [14]NICHOLS N,RAUGAS M,JASPER R,et al.Faster fuzzing:Reinitialization with deep neural models [EB/OL].https://ar-xiv.org/abs/1711.02807. [15]FAN R,CHANG Y.Machine learning for black- box fuzzing of network protocols [C]//International Conference on Information and Communications Security.Beijing:ICICS,2017:621-632. [16]JUSTIN S,JUAN P B.Deep convolutional neural networks and data augmentation for environmental sound classification [J].IEEE Signal Process Letters,2017,44(3):279-283. [17]LEVY O,GOLDBERG Y.Neural word embedding as implicit matrix factorization [C]//Proceedings of the 28th International Conference on Neural Information Processing Systems.Mon-treal:NIPS,2014:2177-2185. [18]DZMITRY B,KYUNGHYUN C,YOSHUA B.Neural Machine Translation by Jointly Learning to Align and Translate [C]//3rd International Conference on Learning Representations.San Diego:ICLR,2017. [19]ORIOL V,MEIRE F,NAVDEEP J.Pointer networks [C]//Proceedings of the 29th International Conference on Neural Information Processing Systems.Montreal:NIPS,2015. [20]DAI A M,LE Q V.Semi-supervised sequence learning [C]//Proceedings of the 28th International Conference on Neural Information Processing Systems.Montreal:NIPS,2014:3079-3087. [21]KINGMA D,BA J.ADAM:A method for stochastic optimization [C]//the 3rd International Conference for Learning Representations.San Diego:ICLR,2015. [22]DODDINGTON G.Automatic evaluation of machine translation quality using n-gram co-occurrence statistics [C]//Proceedings of the Second International Conference on Human Language Technology Research.San Francisco:HLT,2002:138-145. [23]ROBERTS JR JD,IHNAT J,SMITH JR W.Microprogrammed control unit(MCU) programming reference manual [C]//ACM Sigmicro Newsletter.1972:18-57. [24]FENG Z L,YU J X.Design and implementation of rs485 bus communication protocol [J].Computer Engineering,2012,38(20):215-218. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[3] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
[6] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[9] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[10] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[11] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[12] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[13] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[14] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[15] | CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344. |
|