期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Image Recognition Model of Fraudulent Websites Based on Image Leader Decision and Inception-V3 Transfer Learning
1
作者 shengli zhou Cheng Xu +3 位作者 Rui Xu Weijie Ding Chao Chen Xiaoyang Xu 《China Communications》 SCIE CSCD 2024年第1期215-227,共13页
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re... The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models. 展开更多
关键词 fraudulent website image leaders telecom fraud transfer learning
下载PDF
Multimodal Fraudulent Website Identification Method Based on Heterogeneous Model Ensemble
2
作者 shengli zhou Linqi Ruan +1 位作者 Qingyang Xu Mincheng Chen 《China Communications》 SCIE CSCD 2023年第5期263-274,共12页
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi... The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods. 展开更多
关键词 telecom fraud crime fraudulent website data fusion deep learning
下载PDF
Monitoring and Early Warning of New Cyber-Telecom Crime Platform Based on BERT Migration Learning 被引量:6
3
作者 shengli zhou Xin Wang Zerui Yang 《China Communications》 SCIE CSCD 2020年第3期140-148,共9页
The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation... The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation for the establishment of prevention and control systems to protect citizens’property.However,the deep-learning methods applied in the monitoring and early warning of new cyber-telecom crime platforms have some apparent drawbacks.For instance,the methods suffer from data-distribution differences and tremendous manual efforts spent on data labeling.Therefore,a monitoring and early warning method for new cyber-telecom crime platforms based on the BERT migration learning model is proposed.This method first identifies the text data and their tags,and then performs migration training based on a pre-training model.Finally,the method uses the fine-tuned model to predict and classify new cyber-telecom crimes.Experimental analysis on the crime data collected by public security organizations shows that higher classification accuracy can be achieved using the proposed method,compared with the deep-learning method. 展开更多
关键词 NEW cyber-telecom CRIME BERT model deep LEARNING monitoring and WARNING text analysis
下载PDF
A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing 被引量:4
4
作者 shengli zhou Lifa Wu Canghong Jin 《China Communications》 SCIE CSCD 2017年第9期155-165,共11页
A Service Level Agreement(SLA) is a legal contract between any two parties to ensure an adequate Quality of Service(Qo S). Most research on SLAs has concentrated on protecting the user data through encryption. However... A Service Level Agreement(SLA) is a legal contract between any two parties to ensure an adequate Quality of Service(Qo S). Most research on SLAs has concentrated on protecting the user data through encryption. However, these methods can not supervise a cloud service provider(CSP) directly. In order to address this problem, we propose a privacy-based SLA violation detection model for cloud computing based on Markov decision process theory. This model can recognize and regulate CSP's actions based on specific requirements of various users. Additionally, the model could make effective evaluation to the credibility of CSP, and can monitor events that user privacy is violated. Experiments and analysis indicate that the violation detection model can achieve good results in both the algorithm's convergence and prediction effect. 展开更多
关键词 SECURITY and PRIVACY markovchain cloud computing REPUTATION manage-ment SLA
下载PDF
Research on Multi-Authority CP-ABE Access Control Model in Multicloud 被引量:3
5
作者 shengli zhou Guangxuan Chen +2 位作者 Guangjie Huang Jin Shi Ting Kong 《China Communications》 SCIE CSCD 2020年第8期220-233,共14页
In order to solve the problems of data sharing security and policy conflict in multicloud storage systems(MCSS), this work designs an attribute mapping mechanism that extends ciphertext policy attribute-based encrypti... In order to solve the problems of data sharing security and policy conflict in multicloud storage systems(MCSS), this work designs an attribute mapping mechanism that extends ciphertext policy attribute-based encryption(CP-ABE), and proposes a multi-authority CP-ABE access control model that satisfies the need for multicloud storage access control. The mapping mechanism mainly involves the tree structure of CP-ABE and provides support for the types of attribute values. The framework and workflow of the model are described in detail. The effectiveness of the model is verified by building a simple prototype system, and the performance of the prototype system is analyzed. The results suggest that the proposed model is of theoretical and practical significance for access control research in MCSS. The CP-ABE has better performance in terms of computation time overhead than other models. 展开更多
关键词 CP-ABE access control multicloud multi-authority TRUST
下载PDF
HASN:A Hierarchical Attack Surface Network for System Security Analysis 被引量:1
6
作者 Kangyu Huang Lin Yang +2 位作者 Renfang Fu shengli zhou Zheng Hong 《China Communications》 SCIE CSCD 2019年第5期137-157,共21页
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har... Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective. 展开更多
关键词 ATTACK SURFACE SECURITY ANALYSIS SECURITY model RISK assessment
下载PDF
Textual Content Prediction via Fuzzy Attention Neural Network Model without Predefined Knowledge
7
作者 Canghong Jin Guangjie Zhang +2 位作者 Minghui Wu shengli zhou Taotao Fu 《China Communications》 SCIE CSCD 2020年第6期211-222,共12页
Text analysis is a popular technique for finding the most significant information from texts including semantic,emotional,and other hidden features,which became a research hotspot in the last few years.Specially,there... Text analysis is a popular technique for finding the most significant information from texts including semantic,emotional,and other hidden features,which became a research hotspot in the last few years.Specially,there are some text analysis tasks with judgment reports,such as analyzing the criminal process and predicting prison terms.Traditional researches on text analysis are generally based on special feature selection and ontology model generation or require legal experts to provide external knowledge.All these methods require a lot of time and labor costs.Therefore,in this paper,we use textual data such as judgment reports creatively to perform prison term prediction without external legal knowledge.We propose a framework that combines value-based rules and a fuzzy text to predict the target prison term.The procedure in our framework includes information extraction,term fuzzification,and document vector regression.We carry out experiments with real-world judgment reports and compare our model’s performance with those of ten traditional classification and regression models and two deep learning models.The results show that our model achieves competitive results compared with other models as evaluated by the RMSE and R-squared metrics.Finally,we implement a prototype system with a user-friendly GUI that can be used to predict prison terms according to the legal text inputted by the user. 展开更多
关键词 judgment content understanding pre-trained model FUZZIFICATION content representation vectors
下载PDF
Resonant Beam Communications:A New Design Paradigm and Challenges
8
作者 Yuanming Tian Dongxu Li +2 位作者 Chuan Huang Qingwen Liu shengli zhou 《Journal of Communications and Information Networks》 EI CSCD 2024年第1期80-87,共8页
Resonant beam communications (RBCom), which adopts oscillating photons between two separate retroreflectors for information transmission, exhibits potential advantages over other types of wireless optical communicatio... Resonant beam communications (RBCom), which adopts oscillating photons between two separate retroreflectors for information transmission, exhibits potential advantages over other types of wireless optical communications (WOC). However, echo interference generated by the modulated beam reflected from the receiver affects the transmission of the desired information. To tackle this challenge, a synchronization-based point-to-point RBCom system is proposed to eliminate the echo interference, and the design for the transmitter and receiver is discussed. Subsequently,the performance of the proposed RBCom is evaluated and compared with that of visible light communications(VLC)and free space optical communications (FOC). Finally, future research directions are outlined and several implementation challenges of RBCom systems are highlighted. 展开更多
关键词 resonant beam communications(RBCom) wireless optical communications(WOC) echo interference elimination MOBILITY multiple access
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部