Kechang Qian
YOU?
Author Swipe
View article: ProvADShield: A Multimodel Ensemble Defender Against Adversarial Attacks on Provenance Graph Host Intrusion Detector
ProvADShield: A Multimodel Ensemble Defender Against Adversarial Attacks on Provenance Graph Host Intrusion Detector Open
HID (host intrusion detection) is a security mechanism for detecting malicious activities performed in a host (e.g., a server, an edge device). Recent research has recast HID as a provenance graph learning problem thanks to the advancement…
View article: TACSan: Enhancing Vulnerability Detection with Graph Neural Network
TACSan: Enhancing Vulnerability Detection with Graph Neural Network Open
With the increasing scale and complexity of software, the advantages of using neural networks for static vulnerability detection are becoming increasingly prominent. Before inputting into a neural network, the source code needs to undergo …
View article: WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer
WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer Open
As the directed greybox fuzzing (DGF) technique advances, it is being extensively utilized in various fields such as defect reproduction, patch testing, and vulnerability identification. Nevertheless, current DGFs waste a significant amoun…
View article: A Comprehensive Survey of Distributed Denial of Service Detection and Mitigation Technologies in Software-Defined Network
A Comprehensive Survey of Distributed Denial of Service Detection and Mitigation Technologies in Software-Defined Network Open
The widespread adoption of software-defined networking (SDN) technology has brought revolutionary changes to network control and management. Compared to traditional networks, SDN enhances security by separating the control plane from the d…
View article: Strawberry Maturity Recognition Algorithm Combining Dark Channel Enhancement and YOLOv5
Strawberry Maturity Recognition Algorithm Combining Dark Channel Enhancement and YOLOv5 Open
Aiming at the problems of low accuracy of strawberry fruit picking and large rate of mispicking or missed picking, YOLOv5 combined with dark channel enhancement is proposed. In “Fengxiang” strawberry, the criterion of “bad fruit” is added …
View article: Image Processing for Laser Imaging Using Adaptive Homomorphic Filtering and Total Variation
Image Processing for Laser Imaging Using Adaptive Homomorphic Filtering and Total Variation Open
Laser active imaging technology has important practical value and broad application prospects in military fields such as target detection, radar reconnaissance, and precise guidance. However, factors such as uneven laser illuminance, atmos…
View article: A Segmentation-Cooperated Pansharpening Method Using Local Adaptive Spectral Modulation
A Segmentation-Cooperated Pansharpening Method Using Local Adaptive Spectral Modulation Open
In order to improve the spatial resolution of multispectral (MS) images and reduce spectral distortion, a segmentation-cooperated pansharpening method using local adaptive spectral modulation (LASM) is proposed in this paper. By using the …