Search scope:
排序: Display mode:
A review on cyber security named entity recognition Review Article
Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9, Pages 1153-1168 doi: 10.1631/FITEE.2000286
Keywords: 命名实体识别(NER);信息抽取;网络空间安全;机器学习;深度学习
Learning to select pseudo labels: a semi-supervised method for named entity recognition Research Articles
Zhen-zhen Li, Da-wei Feng, Dong-sheng Li, Xi-cheng Lu,lizhenzhen14@nudt.edu.cn,davyfeng.c@gmail.com,dsli@nudt.edu.cn,xclu@nudt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1800743
Keywords: 命名实体识别;无标注数据;深度学习;半监督学习方法
Disambiguating named entitieswith deep supervised learning via crowd labels Article
Le-kui ZHOU,Si-liang TANG,Jun XIAO,Fei WU,Yue-ting ZHUANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 1, Pages 97-106 doi: 10.1631/FITEE.1601835
Keywords: Named entity disambiguation Crowdsourcing Deep learning
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1117-1142 doi: 10.1631/FITEE.2200314
Keywords: Artificial intelligence (AI) Machine learning (ML) Deep learning (DL) Optimization algorithm Hybrid algorithm Cyberspace security
Study on the Development of China’s Cyberspace Security Industry
An Da, Liang Zhihao, Xu Shouren
Strategic Study of CAE 2016, Volume 18, Issue 4, Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006
The paper summarizes the development situation and experiences of the Chinese cyberspace security industry during the 12th Five-Year Plan, analyzes its new development trends, and proposes policy suggestions for the industry development to provide a reference for cyberspace security industry during the 13th Five-Year Plan.
Keywords: cyberspace security cyberspace security industry independent and controllable standards
Research on the International Strategy for National Cyberspace Security
Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003
Cyberspace security has been a crucial part in national security and is more and more important in the development of economy and society. Based on the current situation of international cyberspace security, this article analyzes the opportunities and challenges that China is confronted with, and study China's international cyberspace security strategy suitable for its own value and national interest. We then propose the objectives, principles and tasks of the strategy.
Keywords: cyberspace security cyberspace governance cyberspace strategy
一种易用的实体识别消歧系统评测框架 Article
辉 陈,宝刚 魏,一鸣 李,Yong-huai LIU,文浩 朱
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 2, Pages 195-205 doi: 10.1631/FITEE.1500473
Keywords: 实体识别消歧;评测框架;信息抽取
Cyberspace Endogenous Safety and Security Article
Jiangxing Wu
Engineering 2022, Volume 15, Issue 8, Pages 179-185 doi: 10.1016/j.eng.2021.05.015
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace. This paper analyzes the philosophical and technical causes of the existence of so-called “dark functions” such as system vulnerabilities and backdoors, and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels; rather, it is necessary to develop or utilize the endogenous security functions of the system architecture itself. In addition, this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace, introduces endogenous security mechanisms and characteristics based on dynamic heterogeneous redundancy (DHR) architecture, and describes the theoretical implications of a coding channel based on DHR.
Keywords: Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
Adversarial Attacks and Defenses in Deep Learning Feature Article
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Engineering 2020, Volume 6, Issue 3, Pages 346-360 doi: 10.1016/j.eng.2019.12.012
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical
to ensure the security and robustness of the deployed algorithms. Recently, the security vulnerability of
DL algorithms to adversarial samples has been widely recognized. The fabricated samples can lead to various
misbehaviors of the DL models while being perceived as benign by humans. Successful implementations
of adversarial attacks in real physical-world scenarios further demonstrate their practicality.
Hence, adversarial attack and defense techniques have attracted increasing attention from both machine
learning and security communities and have become a hot research topic in recent years. In this paper,
we first introduce the theoretical foundations, algorithms, and applications of adversarial attack techniques.
We then describe a few research efforts on the defense techniques, which cover the broad frontier
in the field. Several open problems and challenges are subsequently discussed, which we hope will provoke
further research efforts in this critical area.
Keywords: Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation strategy
A deep Q-learning network based active object detection model with a novel training algorithm for service robots Research Article
Shaopeng LIU, Guohui TIAN, Yongcheng CUI, Xuyang SHAO
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 11, Pages 1673-1683 doi: 10.1631/FITEE.2200109
This paper focuses on the problem of (AOD). AOD is important for to complete tasks in the family environment, and leads robots to approach the target object by taking appropriate moving actions. Most of the current AOD methods are based on reinforcement learning with low training efficiency and testing accuracy. Therefore, an AOD model based on a (DQN) with a novel training algorithm is proposed in this paper. The DQN model is designed to fit the Q-values of various actions, and includes state space, feature extraction, and a multilayer perceptron. In contrast to existing research, a novel training algorithm based on memory is designed for the proposed DQN model to improve training efficiency and testing accuracy. In addition, a method of generating the end state is presented to judge when to stop the AOD task during the training process. Sufficient comparison experiments and ablation studies are performed based on an AOD dataset, proving that the presented method has better performance than the comparable methods and that the proposed training algorithm is more effective than the raw training algorithm.
Keywords: Active object detection Deep Q-learning network Training method Service robots
Diffractive Deep Neural Networks at Visible Wavelengths Article
Hang Chen, Jianan Feng, Minwei Jiang, Yiqun Wang, Jie Lin, Jiubin Tan, Peng Jin
Engineering 2021, Volume 7, Issue 10, Pages 1485-1493 doi: 10.1016/j.eng.2020.07.032
Optical deep learning based on diffractive optical elements offers unique advantages for parallel processing, computational speed, and power efficiency. One landmark method is the diffractive deep neural network (D2NN) based on three-dimensional printing technology operated in the terahertz spectral range. Since the terahertz bandwidth involves limited interparticle coupling and material losses, this paper
extends D2NN to visible wavelengths. A general theory including a revised formula is proposed to solve any contradictions between wavelength, neuron size, and fabrication limitations. A novel visible light D2NN classifier is used to recognize unchanged targets (handwritten digits ranging from 0 to 9) and targets that have been changed (i.e., targets that have been covered or altered) at a visible wavelength of 632.8 nm. The obtained experimental classification accuracy (84%) and numerical classification accuracy (91.57%) quantify the match between the theoretical design and fabricated system performance. The presented framework can be used to apply a D2NN to various practical applications and design other new applications.
Keywords: Optical computation Optical neural networks Deep learning Optical machine learning Diffractive deep neural networks
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 872-884 doi: 10.1631/FITEE.1800520
By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template (FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods.
Keywords: Network security entity Security knowledge graph (SKG) Entity recognition Feature template Neural network
Tandem hiddenMarkovmodels using deep belief networks for offline handwriting recognition Article
Partha Pratim ROY, Guoqiang ZHONG, Mohamed CHERIET
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 978-988 doi: 10.1631/FITEE.1600996
Keywords: Handwriting recognition Hidden Markov models Deep learning Deep belief networks Tandem approach
Research on Cyberspace Sovereignty
Fang Binxing,Zou Peng and Zhu Shibing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001
Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.
Keywords: cyberspace cyberspace sovereignty stakeholder
Title Author Date Type Operation
A review on cyber security named entity recognition
Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn
Journal Article
Learning to select pseudo labels: a semi-supervised method for named entity recognition
Zhen-zhen Li, Da-wei Feng, Dong-sheng Li, Xi-cheng Lu,lizhenzhen14@nudt.edu.cn,davyfeng.c@gmail.com,dsli@nudt.edu.cn,xclu@nudt.edu.cn
Journal Article
Disambiguating named entitieswith deep supervised learning via crowd labels
Le-kui ZHOU,Si-liang TANG,Jun XIAO,Fei WU,Yue-ting ZHUANG
Journal Article
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Journal Article
Study on the Development of China’s Cyberspace Security Industry
An Da, Liang Zhihao, Xu Shouren
Journal Article
Research on the International Strategy for National Cyberspace Security
Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru
Journal Article
Adversarial Attacks and Defenses in Deep Learning
Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
Journal Article
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article
A deep Q-learning network based active object detection model with a novel training algorithm for service robots
Shaopeng LIU, Guohui TIAN, Yongcheng CUI, Xuyang SHAO
Journal Article
Diffractive Deep Neural Networks at Visible Wavelengths
Hang Chen, Jianan Feng, Minwei Jiang, Yiqun Wang, Jie Lin, Jiubin Tan, Peng Jin
Journal Article
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Journal Article
Tandem hiddenMarkovmodels using deep belief networks for offline handwriting recognition
Partha Pratim ROY, Guoqiang ZHONG, Mohamed CHERIET
Journal Article