Weihong Han
YOU?
Author Swipe
View article: Cyberattack event and arguments extraction based on feature interaction and few-shot learning
Cyberattack event and arguments extraction based on feature interaction and few-shot learning Open
Cyber Threat Intelligence (CTI) serves as a crucial indicator of cybersecurity events, providing critical evidence for analyzing cyberattacks and vulnerabilities. While existing deep learning approaches have shown value in processing urgen…
View article: DPP-CL: Orthogonal Subspace Continual Learning for Dialogue Policy Planning
DPP-CL: Orthogonal Subspace Continual Learning for Dialogue Policy Planning Open
Continual learning (CL) is critical for large language models (LLMs) to tackle multiple tasks in various downstream applications. However, LLMs struggle to maintain performance in multiple-task training due to catastrophic forgetting, whic…
View article: Research on the Mechanism of Agricultural Socialized Services in China under the Leadership of the Communist Party—A Case Study of Shanxi
Research on the Mechanism of Agricultural Socialized Services in China under the Leadership of the Communist Party—A Case Study of Shanxi Open
From the perspective of agricultural socialized services under the leadership of the Communist Party of China (CPC), this paper focuses on analyzing the mechanism by which the scale of socialized agricultural services impacts agricultural …
View article: AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction
AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction Open
Cyber Threat Intelligence (CTI) plays a crucial role in cybersecurity. However, traditional information extraction has low accuracy due to the specialization of CTI and the concealment of relations. To improve the performance of CTI relati…
View article: Mtdecipher: Robust Encrypted Malicious Traffic Detection Via Multi-Task Graph Neural Networks
Mtdecipher: Robust Encrypted Malicious Traffic Detection Via Multi-Task Graph Neural Networks Open
View article: AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction
AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction Open
Cyber Threat Intelligence (CTI) plays a crucial role in cybersecurity. However, traditional information extraction has low accuracy due to the specialization of CTIs and the concealment of relations. To improve the performance of CTI relat…
View article: Representing Network Frontiers based on Spatio-temporal Graph Transformations
Representing Network Frontiers based on Spatio-temporal Graph Transformations Open
Purpose-Spatio-temporal prediction in cyber elements can be enhanced by incorporating geographic features into the estimation process for cyber elements. It highlights a deficiency in existing studies that do not incorporate geographic cha…
View article: Exploring Advanced Methodologies in Security Evaluation for LLMs
Exploring Advanced Methodologies in Security Evaluation for LLMs Open
Large Language Models (LLMs) represent an advanced evolution of earlier, simpler language models. They boast enhanced abilities to handle complex language patterns and generate coherent text, images, audios, and videos. Furthermore, they c…
View article: Detecting Deepfake Videos using Spatiotemporal Trident Network
Detecting Deepfake Videos using Spatiotemporal Trident Network Open
The widespread dissemination of Deepfake in social networks has posed serious security risks, thus necessitating the development of an effective Deepfake detection technique. Currently, video-based detectors have not been explored as exten…
View article: MF2POSE: Multi-Task Feature Fusion Pseudo-Siamese Network for Intrusion Detection Using Category-Distance Promotion Loss
MF2POSE: Multi-Task Feature Fusion Pseudo-Siamese Network for Intrusion Detection Using Category-Distance Promotion Loss Open
View article: IR-Capsule: Two-Stream Network for Face Forgery Detection
IR-Capsule: Two-Stream Network for Face Forgery Detection Open
View article: Construction of the Social Network Information Dissemination Index System Based on CNNs
Construction of the Social Network Information Dissemination Index System Based on CNNs Open
The information dissemination index system is an effective way to measure the dissemination of public opinion events in social networks. Due to the complexity, variability, and asymmetry of information, the construction of traditional info…
View article: False Alert Detection Based on Deep Learning and Machine Learning
False Alert Detection Based on Deep Learning and Machine Learning Open
Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant alerts in real time and improve the qual…
View article: Proliferation of Cyber Situational Awareness: Today’s Truly Pervasive Drive of Cybersecurity
Proliferation of Cyber Situational Awareness: Today’s Truly Pervasive Drive of Cybersecurity Open
Situation awareness (SA) issues necessitate a comprehension of present activities, the ability to forecast, what will happen next, and strategies to assess the threat or impact of current internet activities and projections. These SA proce…
View article: Security Evaluation of Situational Awareness in Cyberspace Based on Artificial Neural Network‐Back Propagation
Security Evaluation of Situational Awareness in Cyberspace Based on Artificial Neural Network‐Back Propagation Open
Computer network security has become increasingly controversial among many businesses as a result of the rise in cyber threats. Artificial neural network (ANN) is mature research in this field, whereas the traditional algorithm is slower, …
View article: Message from the General Chairs: DSC 2021
Message from the General Chairs: DSC 2021 Open
DSC 2021 -in Shenzhen, P. R. China.IEEE DSC is a premier international conference dedicated to covering all aspects of data science in cyberspace, from both theoretical and system perspectives.Data Science aims to explore the theories, met…
View article: Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques Open
In recent years, the popularity of IoT (Internet of Things) applications and services has brought great convenience to people's lives, but ubiquitous IoT has also brought many security problems. Among them, advanced persistent threat (APT)…
View article: Imaging findings of primary pulmonary synovial sarcoma with secondary distant metastases: A case report
Imaging findings of primary pulmonary synovial sarcoma with secondary distant metastases: A case report Open
PPSS is a rare malignant lung tumor with strong invasiveness, early distant metastasis and poor prognosis. There are very few imaging reports. PPSS is often manifested as irregular tumor and calcification, and the metastases have extremely…
View article: Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks
Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks Open
Nowadays, deep learning models play an important role in a variety of scenarios, such as image classification, natural language processing, and speech recognition. However, deep learning models are shown to be vulnerable; a small change to…
View article: Transformation of Semantic Painting Image Style by Using Convolutional Neural Networks
Transformation of Semantic Painting Image Style by Using Convolutional Neural Networks Open
View article: SELECTION OF PERSISTENT SCATTERER INTERFEROMETRIC SYNTHETIC APERTURE RADAR MASTER IMAGE CONSIDERING TEMPORAL BASELINE, SPATIAL BASELINE AND DOPPLER CENTROID FREQUENCY DIFFERENCE
SELECTION OF PERSISTENT SCATTERER INTERFEROMETRIC SYNTHETIC APERTURE RADAR MASTER IMAGE CONSIDERING TEMPORAL BASELINE, SPATIAL BASELINE AND DOPPLER CENTROID FREQUENCY DIFFERENCE Open
This paper proposed a new algorithm master Image Temporal Spatial baseline, Doppler centroid frequency difference (MITSD) to select the PS-InSAR common master image (CMI), by using the sum of temporal baselines, spatial baselines, and Dopp…
View article: Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things Open
In recent years, the industrial use of the internet of things (IoT) has been constantly growing and is now widespread. Wireless sensor networks (WSNs) are a fundamental technology that has enabled such prevalent adoption of IoT in industry…
View article: CLASSIFICATION ACCURACY ASSESSMENT FOR REGIONAL VECTOR DATA PRODUCT BASED ON SPATIAL SAMPLING: A CASE STUDY OF JAPAN
CLASSIFICATION ACCURACY ASSESSMENT FOR REGIONAL VECTOR DATA PRODUCT BASED ON SPATIAL SAMPLING: A CASE STUDY OF JAPAN Open
Spatial vector data is a kind of data that represents real spatial information through points, lines and polygons. Spatial data quality is one of the basic theoretical research in geographic information science. Accurate and reliable data …
View article: Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation
Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation Open
The wirelessly connected intelligent robot swarms are more vulnerable to be attacked due to their unstable network connection and limited resources, and the consequences of being attacked are more serious than other systems. Therefore, the…
View article: A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning Open
Malware has become a major threat to cyberspace security, not only because of the increasing complexity of malware itself, but also because of the continuously created and produced malicious code. In this paper, we propose two novel method…
View article: Credibility Ranking Methods Analysis of Users in Social Network Based on Relation Graph
Credibility Ranking Methods Analysis of Users in Social Network Based on Relation Graph Open
The increasing proliferation of social media results in users are forced to ascertain the truthfulness of information that they encounter from unknown sources using a variety of indicators.In this paper, we propose a novel method to rank c…
View article: An Analysis of the Impact of the Reform of Business Tax to VAT in Transportation Industry a A Case of Inner Mongolia
An Analysis of the Impact of the Reform of Business Tax to VAT in Transportation Industry a A Case of Inner Mongolia Open
By analyzing the economic effect and its mechanism of the reform of business tax to VAT on transportation industry in Inner Mongolia, we built the VAT-CGE model, and analyzed the impact of different tax rates and different forms of value a…
View article: The Development and Application of an Educational Social Accounting Matrix
The Development and Application of an Educational Social Accounting Matrix Open
Although social accounting matrix (SAM) method has been widely applied to the national economic accounting and economic development, it still ignores important information such as interactions between economy and education.In order to expl…
View article: Large Scale Hierarchical Classification Framework for Network Big Data
Large Scale Hierarchical Classification Framework for Network Big Data Open
With the development of Internet technology, Internet data growth rapidly and become big data.According to the different properties of the network big data, network big data classification is the foundation of many network applications, in…
View article: Research and Implement of Real-time Automatic Web Page Classification System
Research and Implement of Real-time Automatic Web Page Classification System Open
With the development of Internet and communication technology, the Internet data growth rapidly, and the type of network services varied.According to the different properties of the network services, network services classification is the …