Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Threat intelligence entity relation extraction method integrating bootstrapping and semantic role labeling
Shunhang CHENG, Zhihua LI, Tao WEI
Journal of Computer Applications    2023, 43 (5): 1445-1453.   DOI: 10.11772/j.issn.1001-9081.2022040551
Abstract363)   HTML7)    PDF (1678KB)(181)       Save

To efficiently and automatically mine threat intelligence entities and their relations in open source heterogeneous big data, a Threat Intelligence Entity Relation Extraction (TIERE) method was proposed. Firstly, a data preprocessing method was studied and presented by analyzing the characteristics of the open source cyber security reports. Then, an Improved BootStrapping-based Named Entity Recognition (NER-IBS) algorithm and a Semantic Role Labeling-based Relation Extraction (RE-SRL) algorithm were developed for the problems of high text complexity and small standard dataset in cyber security field. Initial seeds were constructed by using a small number of samples and rules, the entities in the unstructured text were mined through iterative training, and the relations between entities were mined by the strategy of constructing semantic roles. Experimental results show that on the few-shot cyber security information extraction dataset, the F1 value of the NER-IBS algorithm is 84%, which is 2 percentage points higher than that of the RDF-CRF (Regular expression and Dictionary combined with Feature templates as well as Conditional Random Field) algorithm, and the F1 value of RE-SRL algorithm for uncategorized relation extraction is 94%, proving that TIERE method has efficient entity and relation extraction capability.

Table and Figures | Reference | Related Articles | Metrics
Sound source localization system based on microphone array
TAO Wei LIU Jian-ping ZHANG Yi-wen
Journal of Computer Applications    2012, 32 (05): 1457-1459.  
Abstract1529)      PDF (1574KB)(1218)       Save
The precise near field model of sound transmission was deduced. Generalized Cross Correlation (GCC) algorithm based on Phase Transform (PHAT) was adopted to estimate time-delay, and a time-delay selection algorithm based on data relation was also put forward. Then the time difference of arrival algorithm was used for sound source localization, by which the development platform was built based on the DSP auditory localization hardware system. The results show that the error of the angle estimate is less than 3° in near field model of sound transmission.
Reference | Related Articles | Metrics
Design and FPGA implementation of parallel high-efficiency BCH decoder
ZHANG Xiang-xian YANG Tao WEI Dong-mei XIANG Ling
Journal of Computer Applications    2012, 32 (03): 867-869.   DOI: 10.3724/SP.J.1087.2012.00867
Abstract1045)      PDF (510KB)(597)       Save
According to the characteristics of parallel BCH decoder, the multiplication of constant coefficient in finite field was realized by using XOR gates to reduce hardware complexity. The part of the error location polynomial was calculated, and then the remaining error location polynomial could be obtained using the theory of affine polynomial and Gray code. The proposed algorithm reduces the system resources occupied.Through timing simulation on Field Programmable Gate Array (FPGA)'s development software ISE10.1, the high-efficiency of the algorithm on time and space has got verified.
Reference | Related Articles | Metrics
Anonymous bidirectional RFID authentication protocol based on low-cost tags
HU Tao WEI Guo-heng
Journal of Computer Applications    2012, 32 (01): 111-114.   DOI: 10.3724/SP.J.1087.2012.00111
Abstract1273)      PDF (792KB)(621)       Save
To remove hidden risks and solve neglected Denial-of-Service (DoS) attacks in the back-end database in current low-cost Radio Frequency Identification (RFID) authentication protocols, a new anonymous bidirectional RFID authentication protocol based on low-cost tags was proposed, and the performance analysis was conducted. According to the simple operative logic and shielded operation of reader, this scheme was designed by utilizing two cascading 16 bit Cyclic Redundancy Check (CRC) messages as mutual authentication factor between the label and the reader. The analytical results show the proposed protocol possesses untraceability, authenticity and usability and resists replaying attack and synchronization attack. Overall, it is a RFID low-power security authentication scheme of security, efficiency and practicality.
Reference | Related Articles | Metrics