CN102142068A - Method for detecting unknown malicious code - Google Patents
Method for detecting unknown malicious code Download PDFInfo
- Publication number
- CN102142068A CN102142068A CN201110076525XA CN201110076525A CN102142068A CN 102142068 A CN102142068 A CN 102142068A CN 201110076525X A CN201110076525X A CN 201110076525XA CN 201110076525 A CN201110076525 A CN 201110076525A CN 102142068 A CN102142068 A CN 102142068A
- Authority
- CN
- China
- Prior art keywords
- file
- malicious code
- sample point
- proper vector
- dimensionality reduction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method for detecting an unknown malicious code in the technical field of information safety, which can detect the malicious code in a file in advance under the situation that a malicious code library is not updated. The method comprises the following steps: extracting the feature vector of a file in a training set by utilizing a Byte n-grams method; carrying out the dimension reduction to the extracted feature vector of the file in the training set by adopting a local linear embedding algorithm; taking the feature vector after being subjected to dimension reduction as input, training a kernel cover classifier by utilizing a kernel cover learning algorithm; extracting the feature vector of the file in a test set by utilizing the Byte n-grams method again; carrying out the dimension reduction to the extracted feature vector of the file in the test set by adopting the local linear embedding algorithm; inputting a result after being subjected to dimension reduction into the kernel cover classifier for classification; and calculating the classification result and determining whether the file in the test set contains the malicious code. With the adoption of the method, the detection speed of the file is improved, and the advanced accuracy detection of the malicious code is realized.
Description
Technical field
The invention belongs to field of information security technology, relate in particular to a kind of detection method of unknown malicious code.
Background technology
At present, malicious code is ubiquitous on the internet, and it is propagated, harmfulness, hide property etc. and also improving constantly, thereby makes the computer malevolence code testing be faced with great challenge.Existing computer malevolence code detection technique mainly contains two kinds, a kind of mode-matching technique that is based on condition code, and another kind is based on the detection technique of malicious code rule of conduct.
Mode-matching technique based on condition code is by the analyst it to be carried out manual analysis after the malicious code file occurs, extract the condition code of this malicious code file of energy unique identification, and condition code upgraded to malicious code condition code storehouse, then the condition code storehouse is offered the user, be used for malicious code in the killing computer program.Based on the detection technique of malicious code rule of conduct, be to come the detection of malicious code according to the more predefined malicious code rule of conduct of expert.The shortcoming of above-mentioned two kinds of detection methods is to bring in constant renewal in the malicious code data storehouse, otherwise the malicious code of newtype just can be walked around detection.In addition, these two kinds of technology are a kind of detection techniques afterwards, can not detect it before emerging malicious code is carried out, and have only after malicious code occurs, it is carried out feature extraction and its condition code is upgraded to property data base by the analyst, just can detect.Yet during this period, malicious code can obtain operation and damage.
Summary of the invention
The objective of the invention is to, deficiency at present malicious code detection technique existence, a kind of detection method of unknown malicious code is proposed, with the sample set that comprises malice file and non-malice file simultaneously as training set, utilize the classification algorithm training sorter, utilize the sorter that trains that unknown file is classified then, to determine whether it is the malicious code file.
In order to realize purpose of the present invention, the technical scheme that provides of the present invention is that a kind of detection method of unknown malicious code is characterized in that described method comprises the following steps:
Step 1: utilize Byte n-grams method to extract the proper vector of the file in the training set;
Step 2: adopt the local linear algorithm that embeds that the proper vector of the file in the training set that extracts is carried out dimensionality reduction;
Step 3: as input, utilize nuclear to cover learning algorithm training nuclear cover classification device the proper vector behind the dimensionality reduction;
Step 4: utilize Byte n-grams method to extract the proper vector of the file in the test set;
Step 5: adopt the local linear algorithm that embeds that the proper vector of the file in the test set that extracts is carried out dimensionality reduction;
Step 6: the cover classification of the input nucleus as a result device behind the dimensionality reduction is classified, after classification results is added up, determine whether the file in the test set contains malicious code.
The local linear embedding algorithm of described employing carries out dimensionality reduction to proper vector and specifically comprises:
Step 21: as sample point, utilize the k nearest neighbor method to seek K neighbour's point of each sample point proper vector, wherein K is a setting value;
Step 22: utilize formula
Construct the partial reconstruction weight matrix of each sample point xi, wherein
N is the number of sample point;
Step 23: by each sample point x
iPartial reconstruction weight matrix and neighbour thereof put and calculate its low-dimensional output valve.
In the described step 23, sample point x
iLow-dimensional output y
iSatisfy following mapping condition:
And
Wherein I is the unit matrix of m * m, and m is the dimension behind the dimensionality reduction.
Described step 3 specifically comprises:
Step 31: in the sample space that sample point constitutes, structure covering field system;
Step 32: the covering field is merged, will belong to the sphere that similar covering field is fused into feature space;
Step 33: construct blend surface f (x), to each sample point x
iCalculate f (x
i) value, if f (x
i) value greater than zero, this sample point x then
iRepresentative does not contain the file of malicious code; If f is (x
i) value less than zero, this sample point x then
iRepresentative contains the file of malicious code.
The present invention introduces manifold learning arithmetic file is carried out feature selecting, can find significant low dimensional structures from high dimensional data and carry out dimensionality reduction, has improved the detection speed of file; In addition, introducing nuclear covering learning algorithm can construct once and just can accurately divide the kernel function of sample set in the classification learning algorithm, thereby has realized the target of the emerging malicious code of accurate detection.
Description of drawings
Fig. 1 is the process synoptic diagram of the detection method of unknown malicious code;
Fig. 2 adopts local linear algorithm carries out dimensionality reduction to the proper vector of extracting the process flow diagram that embeds;
Fig. 3 utilizes nuclear to cover the process flow diagram of learning algorithm training nuclear cover classification device.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.Should be emphasized that following explanation only is exemplary, rather than in order to limit the scope of the invention and to use.
The thinking that the present invention deals with problems is: with file that contains malicious code simultaneously and the file set that does not contain malicious code is training sample, adopt manifold learning arithmetic that the training set file is carried out feature selecting, thereby the corresponding proper vector of each file, proper vector is trained nuclear cover classification device as the input of nuclear cover classification algorithm.At last unknown file being carried out feature selecting and produce the characteristic of correspondence vector, as the input of sorter it is classified, is malice file or non-malice file thereby tell it.
Below in conjunction with the description of drawings specific implementation of the present invention.Fig. 1 is the testing process synoptic diagram of the intelligent detecting method of unknown malicious code provided by the present invention.This method comprises following step:
Step 1: utilize Byte n-grams method to extract the proper vector of the file in the training set.
Training set can be constructed by the standard data set of online download., can download to the standard data set that is used for carrying out the malicious code detection specially on the net, data centralization can comprise malicious code file and normal file, can concentrate select File construct training set from normal data according to ad hoc rules.
Byte n-grams method is to adopt the moving window of a n byte-sized to get speech to binary word throttling or text, and each speech all is a n byte-sized.Content such as a text is " abcdef ", and its 2-grams sequence is so: ab bc cd de ef, the 3-grams sequence is: abc bcd cde def.
Content with a file is that " abcd " is example, this document is extracted the 2-grams sequence be: ab bccd, so just say that this file has three attributes, and the vector that can utilize these three attributes to form is represented this file, vector is: { ab, bc, cd}.
Each attribute is quantized, can obtain the proper vector of this document.Be changed to 1 such as a at the alphabet meta, b is 2 ..., so we can with the position and rule quantize, quantized result be 3,5,7}.{ 3,5,7} is the proper vector of this document to vector.
Step 2: adopt the local linear algorithm that embeds that the proper vector of the file in the training set that extracts is carried out dimensionality reduction.Fig. 2 adopts the local linear algorithm that embeds that the proper vector of extracting is carried out the process flow diagram of dimensionality reduction, among Fig. 2, adopts the local linear algorithm that embeds the proper vector of the file in the training set that extracts is carried out dimensionality reduction to comprise:
Step 21: as sample point, utilize the k nearest neighbor method to seek K neighbour's point of each sample point proper vector, wherein K is a setting value.
K the sample point nearest with respect to asking sample point is defined as K neighbour's point of the sample point of asking, and wherein K is a value given in advance, and the calculating of distance can be adopted the Euclidean distance computing method.The Euclidean distance algorithm is as follows: establish x, y ∈ R
N, x then, the Euclidean distance of y can be tried to achieve by following formula:
Step 22: utilize formula
Construct each sample point x
iThe partial reconstruction weight matrix
Wherein
N is the number of sample point.
W=(w
Ij) ∈ M
N, nBe such weight matrix, if x
iWith x
jNon-conterminous, w then
Ij=0, establish x
iWith x
j(j=1,2 ..., be adjacent K), constraint is then arranged
Use XW approximate representation X, can have certain error, the Frobenius norm that defines matrix here is as follows: A=(a
I, j) ∈ M
M, m, be a m rank matrix, then
Seek W by the following formula constraint:
Promptly
This is equivalent to ask separating of a series of least square problems.As to x
i, can obtain by following system of equations
Step 23: by each sample point x
iPartial reconstruction weight matrix and neighbour thereof put and calculate its low-dimensional output valve.
By weight matrix W, we can find suitable y in lower dimensional space
i, can finish by following constraint:
Y wherein
iBe x
iOutput vector, y
Jk, i(k=1,2 ..., K) be y
iNeighbour's point, and to satisfy two conditions:
With
Wherein I is the unit matrix of m * m.Thus, loss function can be rewritten as:
Wherein M is the symmetric matrix of n * n: M=(I-W)
T(I-W).
Make the loss function value reach minimum, then getting Y is minimum m the pairing proper vector of nonzero eigenvalue of M.In processing procedure, the eigenwert of M to be arranged from small to large, first eigenwert almost approaches zero, casts out first eigenwert so.Usually get the pairing proper vector of eigenwert from the 2nd to m+1 as the output result.
Step 3: as input, utilize nuclear to cover learning algorithm training nuclear cover classification device the proper vector behind the dimensionality reduction.
It is to introduce kernel function in covering algorithm that nuclear covers learning algorithm.At first, get a kernel function K (x, y)=<T (x), T (y)>do, x ∈ D with down conversion T:D → Z; Wherein D is the bounded set of n-dimensional space for the field of definition of input, total p sample, and this conversion is exactly that the point on the D is mapped on the P dimension nuclear space.The input set of note nuclear space is P
t, t=1,2 ..., p.In nuclear space, preceding k value might as well establishing output collection Y is all inequality.Make all be output as Y
j(set of the specimen number of j≤k) is I
j, the input set of its correspondence is designated as P
j(j=0,1 ..., k-1).Through after top a series of initialization, can begin to ask for the covering in a collection of nuclear space.Fig. 3 utilizes nuclear to cover the process flow diagram of learning algorithm training nuclear cover classification device, among Fig. 3, utilizes nuclear to cover learning algorithm training nuclear cover classification device and comprises the steps:
Step 31: in the sample space that sample point constitutes, structure covering field system.
(1) in sample set, appoints and get a some x who is not capped as yet
j∈ P
t, by formula
Calculate, according to x
iAnd d
jConstruct a covering
The center of this covering is x
i, covering radius is d
j, the class interval is d
jWherein, I
jBe a following target set, x
mRepresent a sample point, in first formula, x
mThe value of expression m does not belong to I
j
(2)
After obtaining, with P
tIn all by
The point that covers is from P
tMiddle deletion is again from P
tX of middle selection
j(j ∈ I
j), repeat the operation of (1) step, up to all x
j∈ I
jTill all deleted.So just, construct all covering fields of a class.
Step 32: the covering field is merged, will belong to the sphere that similar covering field is fused into feature space.
To all covering fields of being obtained, order
D wherein
iExpression is with x
iBe the radius in the field at center, ask quadratic programming problem:
Obtain optimum solution α
*={ α
1α
2α
m.
Step 33: construct blend surface f (x), to each sample point x
iCalculate f (x
i) value, if f (x
i) value greater than zero, this sample point x then
iDo not contain the malice file; If f is (x
i) value less than zero, this sample point x then
iContain the malice file.
With the α that obtains in the step 32
*The structure lineoid:
Its discriminant function is: F (x)=Sign (f (x)+b
0), b wherein
0Be decision-making value.
Sample is carried out the branch time-like, to each sample, calculate the value of f (x), if f (x)>0, then x belongs to positive class (promptly not containing the malice file), if f (x)<0, then x belongs to negative class (promptly containing the malice file), if f (x)=0 claims that then x is refused to know.Can set a threshold epsilon, when | f (x) | think during<ε that x is refused to know, can reduce error like this.
Step 4: utilize Byte n-grams method to extract the proper vector of the file in the test set.
As step 1, utilize Byte n-grams method to extract the proper vector of the file in the test set.Test set can be chosen from the data centralization that network provides.
Step 5: adopt the local linear algorithm that embeds that the proper vector of the file in the test set that extracts is carried out dimensionality reduction.
As step 1, adopt the local linear algorithm that embeds that the proper vector of step 4 extraction is carried out dimensionality reduction.
Step 6: the cover classification of the input nucleus as a result device behind the dimensionality reduction is classified, after classification results is added up, determine whether the file in the test set contains the malice file.
With the dimensionality reduction result of step 5 as input, the nuclear cover classification device that use step 3 obtains is classified to the dimensionality reduction result of step 5, classification results is added up, and then, the result determines whether the file in the test set contains the malice file according to nuclear cover classification device statistic of classification.
The present invention as training set, utilizes the classification algorithm training sorter with the sample set that comprises malice file and non-malice file simultaneously, utilizes the sorter that trains that unknown file is classified then, to determine whether it is the malice file.In the process of file being carried out feature selecting, introduce manifold learning arithmetic, a large amount of file characteristic attributes is carried out analyzing and processing, be hidden in significant low dimensional structures in the high dimensional data with discovery, thereby reach the purpose that higher-dimension file characteristic attribute is carried out dimension-reduction treatment, improved processing speed.In the classification learning algorithm, introduce nuclear and cover learning algorithm, this algorithm is a notion of introducing the kernel function in the support vector machine in covering algorithm, compare with algorithm of support vector machine, this algorithm is to any given sample set, can construct the kernel function that once just can accurately divide sample set, thereby guaranteed that system still has classification accuracy rate and less operand preferably under priori deficiency and small sampling condition.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.
Claims (3)
1. the detection method of a unknown malicious code is characterized in that described method comprises the following steps:
Step 1: utilize Byte n-grams method to extract the proper vector of the file in the training set;
Step 2: adopt the local linear algorithm that embeds that the proper vector of the file in the training set that extracts is carried out dimensionality reduction;
Step 3: as input, utilize nuclear to cover learning algorithm training nuclear cover classification device the proper vector behind the dimensionality reduction;
Step 4: utilize Byte n-grams method to extract the proper vector of the file in the test set;
Step 5: adopt the local linear algorithm that embeds that the proper vector of the file in the test set that extracts is carried out dimensionality reduction;
Step 6: the cover classification of the input nucleus as a result device behind the dimensionality reduction is classified, after classification results is added up, determine whether the file in the test set contains malicious code.
2. the detection method of a kind of unknown malicious code according to claim 1 is characterized in that the local linear algorithm that embeds of described employing carries out dimensionality reduction to proper vector and specifically comprises:
Step 21: as sample point, utilize the k nearest neighbor method to seek K neighbour's point of each sample point proper vector, wherein K is a setting value;
Step 22: utilize formula
Construct each sample point x
iThe partial reconstruction weight matrix, wherein
N is the number of sample point;
Step 23: by each sample point x
iPartial reconstruction weight matrix and neighbour thereof put and calculate its low-dimensional output valve.
In the described step 23, sample point x
iLow-dimensional output y
iSatisfy following mapping condition:
3. the detection method of a kind of unknown malicious code according to claim 1 is characterized in that described step 3 specifically comprises:
Step 31: in the sample space that sample point constitutes, structure covering field system;
Step 32: the covering field is merged, will belong to the sphere that similar covering field is fused into feature space;
Step 33: construct blend surface f (x), to each sample point x
iCalculate f (x
i) value, if f (x
i) value greater than zero, this sample point x then
iRepresentative does not contain the file of malicious code; If f is (x
i) value less than zero, this sample point x then
iRepresentative contains the file of malicious code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110076525XA CN102142068A (en) | 2011-03-29 | 2011-03-29 | Method for detecting unknown malicious code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110076525XA CN102142068A (en) | 2011-03-29 | 2011-03-29 | Method for detecting unknown malicious code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102142068A true CN102142068A (en) | 2011-08-03 |
Family
ID=44409571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110076525XA Pending CN102142068A (en) | 2011-03-29 | 2011-03-29 | Method for detecting unknown malicious code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102142068A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102346830A (en) * | 2011-09-23 | 2012-02-08 | 重庆大学 | Gradient histogram-based virus detection method |
CN102411687A (en) * | 2011-11-22 | 2012-04-11 | 华北电力大学 | Deep learning detection method of unknown malicious codes |
CN102651088A (en) * | 2012-04-09 | 2012-08-29 | 南京邮电大学 | Classification method for malicious code based on A_Kohonen neural network |
CN102779249A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Malicious program detection method and scan engine |
CN104077524A (en) * | 2013-03-25 | 2014-10-01 | 腾讯科技(深圳)有限公司 | Training method used for virus identification and virus identification method and device |
CN104504334A (en) * | 2013-12-05 | 2015-04-08 | 卡巴斯基实验室封闭式股份公司 | System and method used for evaluating selectivity of classification rules |
CN104778407A (en) * | 2015-04-14 | 2015-07-15 | 电子科技大学 | Multi-dimensional feature-code-free rogue program detecting method |
CN106446221A (en) * | 2016-09-30 | 2017-02-22 | 北京奇虎科技有限公司 | Data analyzing method and device |
CN106447066A (en) * | 2016-06-01 | 2017-02-22 | 上海坤士合生信息科技有限公司 | Big data feature extraction method and device |
US20180144131A1 (en) * | 2016-11-21 | 2018-05-24 | Michael Wojnowicz | Anomaly based malware detection |
WO2018184102A1 (en) * | 2017-04-03 | 2018-10-11 | Royal Bank Of Canada | Systems and methods for malicious code detection |
CN108985361A (en) * | 2018-07-02 | 2018-12-11 | 北京金睛云华科技有限公司 | A kind of malicious traffic stream detection implementation method and device based on deep learning |
CN109934004A (en) * | 2019-03-14 | 2019-06-25 | 中国科学技术大学 | The method of privacy is protected in a kind of machine learning service system |
US12131294B2 (en) | 2022-07-13 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090300765A1 (en) * | 2008-05-27 | 2009-12-03 | Deutsche Telekom Ag | Unknown malcode detection using classifiers with optimal training sets |
CN101944167A (en) * | 2010-09-29 | 2011-01-12 | 中国科学院计算技术研究所 | Method and system for identifying malicious program |
CN101984450A (en) * | 2010-12-15 | 2011-03-09 | 北京安天电子设备有限公司 | Malicious code detection method and system |
-
2011
- 2011-03-29 CN CN201110076525XA patent/CN102142068A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090300765A1 (en) * | 2008-05-27 | 2009-12-03 | Deutsche Telekom Ag | Unknown malcode detection using classifiers with optimal training sets |
CN101944167A (en) * | 2010-09-29 | 2011-01-12 | 中国科学院计算技术研究所 | Method and system for identifying malicious program |
CN101984450A (en) * | 2010-12-15 | 2011-03-09 | 北京安天电子设备有限公司 | Malicious code detection method and system |
Non-Patent Citations (2)
Title |
---|
《2010 International Conference on Information,Networking and Automation(ICINA)》 20101019 Li Yuancheng等 An intrusion detection method based on LLE and BVM , * |
《电子学报》 20070531 周鸣争等 基于构造性核覆盖算法的异常入侵检测 第35卷, 第5期 * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102346830A (en) * | 2011-09-23 | 2012-02-08 | 重庆大学 | Gradient histogram-based virus detection method |
CN102411687A (en) * | 2011-11-22 | 2012-04-11 | 华北电力大学 | Deep learning detection method of unknown malicious codes |
CN102411687B (en) * | 2011-11-22 | 2014-04-23 | 华北电力大学 | Deep learning detection method of unknown malicious codes |
CN102651088A (en) * | 2012-04-09 | 2012-08-29 | 南京邮电大学 | Classification method for malicious code based on A_Kohonen neural network |
CN102651088B (en) * | 2012-04-09 | 2014-03-26 | 南京邮电大学 | Classification method for malicious code based on A_Kohonen neural network |
CN102779249A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Malicious program detection method and scan engine |
CN102779249B (en) * | 2012-06-28 | 2015-07-29 | 北京奇虎科技有限公司 | Malware detection methods and scanning engine |
CN104077524A (en) * | 2013-03-25 | 2014-10-01 | 腾讯科技(深圳)有限公司 | Training method used for virus identification and virus identification method and device |
CN104077524B (en) * | 2013-03-25 | 2018-01-09 | 腾讯科技(深圳)有限公司 | Training method and viruses indentification method and device for viruses indentification |
CN104504334A (en) * | 2013-12-05 | 2015-04-08 | 卡巴斯基实验室封闭式股份公司 | System and method used for evaluating selectivity of classification rules |
CN104504334B (en) * | 2013-12-05 | 2018-08-10 | 卡巴斯基实验室封闭式股份公司 | System and method for assessing classifying rules selectivity |
CN104778407B (en) * | 2015-04-14 | 2017-08-08 | 电子科技大学 | A kind of multidimensional is without condition code malware detection methods |
CN104778407A (en) * | 2015-04-14 | 2015-07-15 | 电子科技大学 | Multi-dimensional feature-code-free rogue program detecting method |
CN106447066A (en) * | 2016-06-01 | 2017-02-22 | 上海坤士合生信息科技有限公司 | Big data feature extraction method and device |
CN106446221B (en) * | 2016-09-30 | 2019-09-17 | 北京奇虎科技有限公司 | Data analysis method and device |
CN106446221A (en) * | 2016-09-30 | 2017-02-22 | 北京奇虎科技有限公司 | Data analyzing method and device |
US20180144131A1 (en) * | 2016-11-21 | 2018-05-24 | Michael Wojnowicz | Anomaly based malware detection |
US11210394B2 (en) | 2016-11-21 | 2021-12-28 | Cylance Inc. | Anomaly based malware detection |
US10489589B2 (en) * | 2016-11-21 | 2019-11-26 | Cylance Inc. | Anomaly based malware detection |
US10685284B2 (en) | 2017-04-03 | 2020-06-16 | Royal Bank Of Canada | Systems and methods for malicious code detection |
WO2018184102A1 (en) * | 2017-04-03 | 2018-10-11 | Royal Bank Of Canada | Systems and methods for malicious code detection |
CN108985361A (en) * | 2018-07-02 | 2018-12-11 | 北京金睛云华科技有限公司 | A kind of malicious traffic stream detection implementation method and device based on deep learning |
CN108985361B (en) * | 2018-07-02 | 2021-06-18 | 北京金睛云华科技有限公司 | Malicious traffic detection implementation method and device based on deep learning |
CN109934004A (en) * | 2019-03-14 | 2019-06-25 | 中国科学技术大学 | The method of privacy is protected in a kind of machine learning service system |
US12131294B2 (en) | 2022-07-13 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102142068A (en) | Method for detecting unknown malicious code | |
CN104572958B (en) | A kind of sensitive information monitoring method based on event extraction | |
CN104598535B (en) | A kind of event extraction method based on maximum entropy | |
Nguyen et al. | Learning graph representation via frequent subgraphs | |
CN110134757A (en) | A kind of event argument roles abstracting method based on bull attention mechanism | |
CN105095863B (en) | The Human bodys' response method of semi-supervised dictionary learning based on similitude weights | |
CN112905739B (en) | False comment detection model training method, detection method and electronic equipment | |
CN104966105A (en) | Robust machine error retrieving method and system | |
CN104750875B (en) | A kind of machine error data classification method and system | |
CN103838744A (en) | Method and device for analyzing query requirement | |
CN111597328B (en) | New event theme extraction method | |
CN106777957A (en) | The new method of biomedical many ginseng event extractions on unbalanced dataset | |
CN112784601B (en) | Key information extraction method, device, electronic equipment and storage medium | |
CN108681532B (en) | Sentiment analysis method for Chinese microblog | |
CN108877947A (en) | Depth sample learning method based on iteration mean cluster | |
CN104281694A (en) | Analysis system of emotional tendency of text | |
CN116204831A (en) | Road-to-ground analysis method based on neural network | |
CN104978569A (en) | Sparse representation based incremental face recognition method | |
Shao et al. | Land use classification using high-resolution remote sensing images based on structural topic model | |
CN108280357A (en) | Data leakage prevention method, system based on semantic feature extraction | |
CN102902984B (en) | Remote-sensing image semi-supervised projection dimension reducing method based on local consistency | |
CN115146062A (en) | Intelligent event analysis method and system fusing expert recommendation and text clustering | |
CN108108184A (en) | A kind of source code writer identification method based on depth belief network | |
CN106844596A (en) | One kind is based on improved SVM Chinese Text Categorizations | |
Dotan et al. | Effect of tokenization on transformers for biological sequences |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110803 |