Sort:
Open Access Issue
Automated and controlled patch generation for enhanced fixing of communication software vulnerabilities
Intelligent and Converged Networks 2024, 5(3): 222-236
Published: 30 September 2024
Abstract PDF (5 MB) Collect
Downloads:13

Software is a crucial component in the communication systems, and its security is of paramount importance. However, it is susceptible to different types of attacks due to potential vulnerabilities. Meanwhile, significant time and effort is required to fix such vulnerabilities. We propose an automated program repair method based on controlled text generation techniques. Specifically, we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process, selecting results that contribute most to vulnerability fixes. Additionally, we perform static syntax analysis to expedite the patch verification process. The effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets, demonstrating significant improvements in generating correct patches compared to other existing methods.

Open Access Issue
Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM
Tsinghua Science and Technology 2020, 25(6): 712-720
Published: 07 May 2020
Abstract PDF (1.1 MB) Collect
Downloads:78

In recent years, e-sports has rapidly developed, and the industry has produced large amounts of data with specifications, and these data are easily to be obtained. Due to the above characteristics, data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games. As one of the world’s most famous e-sports events, Dota2 has a large audience base and a good game system. A victory in a game is often associated with a hero’s match, and players are often unable to pick the best lineup to compete. To solve this problem, in this paper, we present an improved bidirectional Long Short-Term Memory (LSTM) neural network model for Dota2 lineup recommendations. The model uses the Continuous Bag Of Words (CBOW) model in the Word2vec model to generate hero vectors. The CBOW model can predict the context of a word in a sentence. Accordingly, a word is transformed into a hero, a sentence into a lineup, and a word vector into a hero vector, the model applied in this article recommends the last hero according to the first four heroes selected first, thereby solving a series of recommendation problems.

Open Access Issue
A Survey of Game Theory as Applied to Social Networks
Tsinghua Science and Technology 2020, 25(6): 734-742
Published: 07 May 2020
Abstract PDF (1.9 MB) Collect
Downloads:109

Social network services can not only help people form relationships and make new friends and partners, but also assist in processing personal information, sharing knowledge, and managing social relationships. Social networks achieve valuable communication and collaboration, bring additional business opportunities, and have great social value. Research on social network problems is effective by using assumption, definition, analysis, modeling, and optimization strategies. In this paper, we survey the existing problems of game theory applied to social networks and classify their application scenarios into four categories: information diffusion, behavior analysis, community detection, and information security. Readers can clearly master knowledge application in every category. Finally, we discuss certain limitations of game theory on the basis of research in recent years and propose future directions of social network research.

Total 3