[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions

X Chen, X Zhang, M Elliot, X Wang, F Wang - Computers & Security, 2022 - Elsevier
Abstract The Internet of Things (IoT) connects all emerging devices and services while
creating interactions between people and things. Allowing users to match devices and …

An introduction to generalized estimating equations and an application to assess selectivity effects in a longitudinal study on very old individuals

P Ghisletta, D Spini - Journal of Educational and Behavioral …, 2004 - journals.sagepub.com
Correlated data are very common in the social sciences. Most common applications include
longitudinal and hierarchically organized (or clustered) data. Generalized estimating …

Transcription Factors Bind Thousands of Active and Inactive Regions in the Drosophila Blastoderm

X Li, S MacArthur, R Bourgon, D Nix, DA Pollard… - PLoS …, 2008 - journals.plos.org
Identifying the genomic regions bound by sequence-specific regulatory factors is central
both to deciphering the complex DNA cis-regulatory code that controls transcription in …

A clustering differential evolution algorithm with neighborhood-based dual mutation operator for multimodal multiobjective optimization

T Zhou, Z Hu, Q Su, W Xiong - Expert Systems with Applications, 2023 - Elsevier
Multimodal multiobjective optimization problems (MMOPs) possess multiple equivalent
Pareto optimal sets (PSs) corresponding to the same Pareto front (PF). Numerous …

Neural malware analysis with attention mechanism

H Yakura, S Shinozaki, R Nishimura, Y Oyama… - Computers & …, 2019 - Elsevier
Objectives: In order to confront diverse types of malware that evolve from moment to
moment, it is important to instantly acquire deep knowledge related to the characteristics of …

[HTML][HTML] Decentralized control and local information for robust and adaptive decentralized deep reinforcement learning

M Schilling, A Melnik, FW Ohl, HJ Ritter, B Hammer - Neural Networks, 2021 - Elsevier
Decentralization is a central characteristic of biological motor control that allows for fast
responses relying on local sensory information. In contrast, the current trend of Deep …

Towards differential access control and privacy-preserving for secure media data sharing in the cloud

T Zheng, Y Luo, T Zhou, Z Cai - Computers & Security, 2022 - Elsevier
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …

XSS adversarial example attacks based on deep reinforcement learning

L Chen, C Tang, J He, H Zhao, X Lan, T Li - Computers & Security, 2022 - Elsevier
Cross-site scripting (XSS) attack is one of the most serious security problems in web
applications. Although deep neural network (DNN) has been used in XSS attack detection …

2020 Chinese guidelines for the diagnosis and treatment of systemic lupus erythematosus

M Li, Y Zhao, Z Zhang, C Huang, Y Liu, J Gu… - Rheumatology and …, 2020 - degruyter.com
Systemic lupus erythematosus (SLE) is a heterogeneous autoimmune disease that
represents a prodigious challenge of diagnosis and treatment. In 2019, under the leadership …