期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
An effector of Erysiphe necator translocates to chloroplasts and plasma membrane to suppress host immunity in grapevine
1
作者 Bo Mu Zhaolin Teng +4 位作者 Ruixin Tang Mengjiao Lu jinfu chen Xiangnan Xu Ying-Qiang Wen 《Horticulture Research》 SCIE CSCD 2023年第9期207-219,共13页
The powdery mildew(Erysiphe necator)is a prevalent pathogen hampering grapevine growth in the vineyard.An arsenal of candidate secreted effector proteins(CSEPs)was encoded in the E.necator genome,but it is largely unc... The powdery mildew(Erysiphe necator)is a prevalent pathogen hampering grapevine growth in the vineyard.An arsenal of candidate secreted effector proteins(CSEPs)was encoded in the E.necator genome,but it is largely unclear what role CSEPs plays during the E.necator infection.In the present study,we identified a secreted effector CSEP080 of E.necator,which was located in plant chloroplasts and plasma membrane.Transient expressing CSEP080 promotes plant photosynthesis and inhibits INF1-induced cell death in tobacco leaves.We found that CSEP080 was a necessary effector for the E.necator pathogenicity,which interacted with grapevine chloroplast protein VviB6f(cytochrome b6-f complex iron–sulfur subunit),affecting plant photosynthesis.Transient silencing VviB6f increased the plant hydrogen peroxide production,and the plant resistance to powdery mildew.In addition,CSEP080 manipulated the VviPE(pectinesterase)to promote pectin degradation.Our results demonstrated the molecular mechanisms that an effector of E.necator translocates to host chloroplasts and plasma membrane,which suppresses with the grapevine immunity system by targeting the chloroplast protein VviB6f to suppress hydrogen peroxide accumulation and manipulating VviPE to promote pectin degradation. 展开更多
关键词 immunity ERYSIPHE expressing
原文传递
An Effective Long String Searching Algorithm towards Component Security Testing 被引量:2
2
作者 jinfu chen Lili Zhu +4 位作者 Zhibin Xie Michael Omari Hilary Ackah-Arthur Saihua Cai Rubing Huang 《China Communications》 SCIE CSCD 2016年第11期153-169,共17页
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t... In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing. 展开更多
关键词 component testing security detection monitor log abnormal information string-searching
下载PDF
The heat and work of quantum thermodynamic processes with quantum coherence
3
作者 Shanhe Su jinfu chen +2 位作者 Yuhan Ma Jincan chen Changpu Sun 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第6期195-202,共8页
Energy is often partitioned into heat and work by two independent paths corresponding to the change in the eigenenergies or the probability distributions of a quantum system. The discrepancies of the heat and work for... Energy is often partitioned into heat and work by two independent paths corresponding to the change in the eigenenergies or the probability distributions of a quantum system. The discrepancies of the heat and work for various quantum thermodynamic processes have not been well characterized in literature. Here we show how the work in quantum machines is differentially related to the isochoric, isothermal, and adiabatic processes. We prove that the energy exchanges during the quantum isochoric and isothermal processes are simply depending on the change in the eigenenergies or the probability distributions. However, for a time-dependent system in a non-adiabatic quantum evolution, the transitions between the different quantum states representing the quantum coherence can affect the essential thermodynamic properties, and thus the general definitions of the heat and work should be clarified with respect to the microscopic generic time-dependent system. By integrating the coherence effects in the exactly-solvable dynamics of quantum-spin precession, the internal energy is rigorously transferred as the work in the thermodynamic adiabatic process. The present study demonstrates that the quantum adiabatic process is sufficient but not necessary for the thermodynamic adiabatic process. 展开更多
关键词 heat and work thermodynamic adiabatic process quantum coherence
原文传递
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
4
作者 Jin Li jinfu chen +5 位作者 Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie chen Zufa Zhang 《China Communications》 SCIE CSCD 2018年第2期190-208,共19页
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity. 展开更多
关键词 software vulnerability detection LOOPHOLES information security evaluationmethod testing framework
下载PDF
A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features 被引量:4
5
作者 Jinchang Hu jinfu chen +4 位作者 Lin Zhang Yisong Liu Qihao Bao Hilary Ackah-Arthur Chi Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期604-613,共10页
Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source... Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source code features of vulnerabilities to improve vulnerability detection.Notwithstanding the success achieved by these techniques,the existing studies mainly focus on the conceptual description without an accurate definition of vulnerability features.In this study,we introduce a novel and efficient Memory-Related Vulnerability Detection Approach using Vulnerability Features (MRVDAVF).Our framework uses three distinct strategies to improve vulnerability detection.In the first stage,we introduce an improved Control Flow Graph (CFG) and Pointer-related Control Flow Graph (PCFG) to describe the features of some common vulnerabilities,including memory leak,doublefree,and use-after-free.Afterward,two algorithms,namely Vulnerability Judging algorithm based on Vulnerability Feature (VJVF) and Feature Judging (FJ) algorithm,are employed to detect memory-related vulnerabilities.Finally,the proposed model is validated using three test cases obtained from Juliet Test Suite.The experimental results show that the proposed approach is feasible and effective. 展开更多
关键词 vulnerability feature Control Flow Graph(CFG) Memory Leak(ML) Double-Free(DF) Use-After-Free(UAF)
原文传递
Worst-Input Mutation Approach to Web Services Vulnerability Testing Based on SOAP Messages 被引量:2
6
作者 jinfu chen Huanhuan Wang +3 位作者 Dave Towey chengying Mao Rubing Huang Yongzhao Zhan 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期429-441,共13页
The growing popularity and application of Web services have led to increased attention regarding the vulnerability of software based on these services. Vulnerability testing examines the trustworthiness and reduces th... The growing popularity and application of Web services have led to increased attention regarding the vulnerability of software based on these services. Vulnerability testing examines the trustworthiness and reduces the security risks of software systems. This paper proposes a worst-input mutation approach for testing Web service vulnerability based on Simple Object Access Protocol (SOAP) messages. Based on characteristics of SOAP messages, the proposed approach uses the farthest neighbor concept to guide generation of the test suite. The corresponding automatic test case generation algorithm, namely, the Test Case generation based on the Farthest Neighbor (TCFN), is also presented. The method involves partitioning the input domain into sub-domains according to the number and type of SOAP message parameters in the TCFN, selecting the candidate test case whose distance is the farthest from all executed test cases, and applying it to test the Web service. We also implement and describe a prototype Web service vulnerability testing tool. The tool was applied to the testing of Web services on the Internet. The experimental results show that the proposed approach can find more vulnerability faults than other related approaches. 展开更多
关键词 security testing Web service vulnerability SOAP message test case generation mutation operator
原文传递
A software defect prediction method with metric compensation based on feature selection and transfer learning 被引量:2
7
作者 jinfu chen Xiaoli WANG +3 位作者 Saihua CAI Jiaping XU Jingyi chen Haibo chen 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第5期715-731,共17页
Cross-project software defect prediction solves the problem of insufficient training data for traditional defect prediction,and overcomes the challenge of applying models learned from multiple different source project... Cross-project software defect prediction solves the problem of insufficient training data for traditional defect prediction,and overcomes the challenge of applying models learned from multiple different source projects to target project.At the same time,two new problems emerge:(1)too many irrelevant and redundant features in the model training process will affect the training efficiency and thus decrease the prediction accuracy of the model;(2)the distribution of metric values will vary greatly from project to project due to the development environment and other factors,resulting in lower prediction accuracy when the model achieves cross-project prediction.In the proposed method,the Pearson feature selection method is introduced to address data redundancy,and the metric compensation based transfer learning technique is used to address the problem of large differences in data distribution between the source project and target project.In this paper,we propose a software defect prediction method with metric compensation based on feature selection and transfer learning.The experimental results show that the model constructed with this method achieves better results on area under the receiver operating characteristic curve(AUC)value and F1-measure metric. 展开更多
关键词 Defect prediction Feature selection Transfer learning Metric compensation
原文传递
An Improved String-Searching Algorithm and Its Application in Component Security Testing 被引量:1
8
作者 jinfu chen Saihua Cai +4 位作者 Lili Zhu Yuchi Guo Rubing Huang Xiaolei Zhao Yunqi Sheng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期281-294,共14页
Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keywor... Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is proposed. The main idea of this algorithm is to search for the first occurrence of a character in the main string. The character should be different and farther from the last character in the pattern string. With this algorithm, the backward moving distance of the pattern string will be increased and the matching time will be optimized. In the end, we conduct an experimental study based on our approach, the results of which show that the proposed algorithm finds strings in monitor logs 11.5% more efficiently than existing approaches. 展开更多
关键词 component testing security vulnerabilities detection monitor log abnormal information string-searching
原文传递
腹腔镜疝修补术治疗原发性耻骨上疝七例的临床体会
9
作者 陈金水 陈金福 +4 位作者 郑开福 祝晓路 王铁虎 谭俊 李正平 《中华疝和腹壁外科杂志(电子版)》 2024年第5期548-551,共4页
目的探讨腹腔镜下疝修补术治疗原发性耻骨上疝的可行性及安全性。方法回顾性分析2021年1月至2024年1月解放军第九九一医院普通外科在腹腔镜腹股沟疝修补术中发现的原发性耻骨上疝7例患者的临床资料。结果患者中男性6例,女性1例;平均年龄... 目的探讨腹腔镜下疝修补术治疗原发性耻骨上疝的可行性及安全性。方法回顾性分析2021年1月至2024年1月解放军第九九一医院普通外科在腹腔镜腹股沟疝修补术中发现的原发性耻骨上疝7例患者的临床资料。结果患者中男性6例,女性1例;平均年龄(71.57±9.33)岁;体重指数17.48~24.61 kg/m^(2),平均(21.75±2.23)kg/m^(2);所有病例术前均行彩色多普勒超声检查诊断为腹股沟疝,其中左侧疝1例,该例曾行右侧腹股沟疝修补术;右侧疝6例,其中1例曾行右侧腹股沟疝修补术,2例曾行左侧腹股沟疝修补术,1例曾行阑尾切除术,1例曾行右侧腹股沟疝修补术+阑尾切除术。7例患者手术均获成功,腹腔镜完全腹膜外疝修补术(TEP)5例,其中1例中转行腹腔镜经腹腹膜前疝修补术(TAPP),另外2例直接行TAPP手术;术中测量疝环缺损直径平均为(2.0±0.29)cm;术中无肠管、血管、精索、输精管损伤;手术时间平均为(127.14±24.30)min;术中出血量平均为(5.29±2.36)ml。术后无肠梗阻、创面感染、暂时性神经感觉异常、缺血性睾丸炎等并发症。术后住院天数2~4 d,中位住院天数3 d;术后血清肿1例,经穿刺抽液治愈;全组随访时间2~36个月,中位时间24个月,无复发,无慢性疼痛。结论腹腔镜下疝修补术是一种安全有效的治疗原发性耻骨上疝的方法。 展开更多
关键词 耻骨上疝 原发性 完全腹膜外疝修补术 经腹腹膜前疝修补术:腹腔镜
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部