RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Defending Non-control-data Attacks using Influence Domain Monitoring

        ( Guimin Zhang ),( Qingbao Li ),( Zhifeng Chen ),( Ping Zhang ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.8

        As an increasing number of defense methods against control-data attacks are deployed in practice, control-data attacks have become challenging, and non-control-data attacks are on the rise. However, defense methods against non-control-data attacks are still deficient even though these attacks can produce damage as significant as that of control-data attacks. We present a method to defend against non-control-data attacks using influence domain monitoring (IDM). A definition of the data influence domain is first proposed to describe the characteristics of a variable during its life cycle. IDM extracts security-critical non-control data from the target program and then instruments the target for monitoring these variables’ influence domains to ensure that corrupted variables will not be used as the attackers intend. Therefore, attackers may be able to modify the value of one security-critical variable by exploiting certain memory corruption vulnerabilities, but they will be prevented from using the variable for nefarious purposes. We evaluate a prototype implementation of IDM and use the experimental results to show that this method can defend against most known non-control-data attacks while imposing a moderate amount of performance overhead.

      • KCI등재후보

        A Distributed Trust Model Based on Reputation Management of Peers for P2P VoD Services

        ( Guimin Huang ),( Min Hu ),( Ya Zhou ),( Pingshan Liu ),( Yanchun Zhang ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.9

        Peer-to-Peer (P2P) networks are becoming more and more popular in video content delivery services, such as Video on Demand (VoD). Scalability feature of P2P allows a higher number of simultaneous users at a given server load and bandwidth to use stream service. However, the quality of service (QoS) in these networks is difficult to be guaranteed because of the free-riding problem that nodes download the recourses while never uploading recourses, which degrades the performance of P2P VoD networks. In this paper, a distributed trust model is designed to reduce node`s free-riding phenomenon in P2P VoD networks. In this model, the P2P network is abstracted to be a super node hierarchical structure to monitor the reputation of nodes. In order to calculate the reputation of nodes, the Hidden Markov Model (HMM) is introduced in this paper. Besides, a distinction algorithm is proposed to distinguish the free-riders and malicious nodes. The free-riders are the nodes which have a low frequency to free-ride. And the malicious nodes have a high frequency to free-ride. The distinction algorithm takes different measures to response to the request of these two kinds of free-riders. The simulation results demonstrate that this proposed trust model can improve QoS effectively in P2P VoD networks.

      • KCI등재

        Interfacial adsorption of methyl orange in liquid phase of foam fractionation using dodecyl dimethyl betaine as the collector

        Zhe Zhang,Zhao Liang Wu,Guimin Liu 한국공업화학회 2015 Journal of Industrial and Engineering Chemistry Vol.28 No.-

        It is important to develop an environment-friendly collector for removing or recovering harmful nonsurface-active materials using foam fractionation. Dodecyl dimethyl betaine (BS12) was used as thecollector for studying the interfacial adsorption of methyl orange (MO) in the liquid phase. The maximaof the surface excess and the enrichment ratio of MO were 22.7% and 51.5%, respectively under pH of 5and the BS12 concentration of 0.40 g/L. The results indicated that BS12 was an effective andenvironmental collector and it can promote the development and application of foam fractionation forthe removal of harmful non-surface-active materials.

      • SCIESCOPUSKCI등재

        Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

        ( Xiaonan Li ),( Guimin Zhang ),( Qingbao Li ),( Ping Zhang ),( Zhifeng Chen ),( Jinjin Liu ),( Shudan Yue ) 한국인터넷정보학회 2023 KSII Transactions on Internet and Information Syst Vol.17 No.8

        Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

      • KCI등재

        The growth improvement of DvGS2-transgenic Arabidopsis thaliana arises from the higher efficiency of nitrogen and carbon assimilation

        Chenguang Zhu,Shilin Chen,Guimin Zhang,Wei Wang,Yuanping Tang,Bing Mei,Rentao Song 한국식물생명공학회 2015 Plant biotechnology reports Vol.9 No.4

        The overexpression of algal glutamine synthetase (GS) gene DvGS2 in Arabidopsis thaliana resulted in higher plant biomass and better growth phenotype. The purpose of this study was to understand the biological mechanism for the improvement of growth phenotype of DvGS2-transgenic Arabidopsis. A series of molecular and biochemical investigation related to nitrogen and carbon metabolism in DvGS2-transgenic line was, respectively, conducted. Analysis of nitrogen use efficiency (NUE)-related gene expression and enzymatic activity revealed that the transcriptional level and enzymatic activity of genes encoding glutamate synthase, glutamate dehydrogenase and alanine aminotransferase were significantly up-regulated especially under low nitrate condition. The DvGS2- transgenic line showed higher total nitrogen content and lower carbon: nitrogen ratio than the wild type. Significant reduced concentration of leaf free ammonium, higher concentrations of total amino acids, individual amino acid (glutamine, methionine, alanine, asparagine) together with increased concentrations of glucose, fructose and starch, confirmed the higher efficiency of nitrogen and carbon assimilation. These improved metabolisms of nitrogen and carbon conferred the DvGS2-transgenic Arabidopsis more biomass, better growth phenotype and higher NUE compared with the wild type plant.

      • KCI등재

        Tuning the physicochemical properties of axitinib by crystallization: Preparation, calculation and Structure-property relationship

        Haibin Qu,Zhonghua Li,Guimin Zhang,Zongyi Zhou,Songgu Wu 한국공업화학회 2023 Journal of Industrial and Engineering Chemistry Vol.124 No.-

        Crystal engineering is a radical method to modulate the physicochemical properties of the drugs to meetthe needs of the pharmaceutical industry. Examined herein are six axitinib solid-state forms, includinganhydrous forms (Ⅳand XLI), solvates (acetic acid, nitromethane and n-propanol), and cocrystal (nicotinamide). Comprehensive characterization containing morphology, hygroscopicity, solubility, fluorescenceand powder tabletability were performed. Calculations of lattice energy, packing coefficient andenergy framework rationalized the structure–property relationship of these six forms from the packinglandscape. This system illustrates that form IV and cocrystal improve the solubility of axitinib, but thehumidity stability is also decreased. Six crystal forms show polychromatic solid-state luminescence rangingfrom violet to indigo to green. Form IV and cocrystal with slip plane structures exhibited superior tensilestrength and compactibility than isotropic form XLI. Elusive form VI can be obtained by controllingthe humidity levels during desolvation of the solvate. This work not only realizes the regulation of betterphysicochemical properties of axtinnib for industrial manufacturing, but also provides a detailed understandingof the structure–property relationship of drugs in complex polymorphic systems.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼