Loading [MathJax]/extensions/MathMenu.js
Junwei Zhou - IEEE Xplore Author Profile

Showing 1-25 of 34 results

Filter Results

Show

Results

Log anomaly detection aims to discover abnormal events from massive log data to ensure the security and reliability of software systems. However, due to the heterogeneity of log formats and syntaxes across different systems, existing log anomaly detection methods often need to be designed and trained for specific systems, lacking generalization ability. To address this challenge, we propose LogDLR...Show More
System logs record the system’s status and application behavior, providing support for various system management and diagnostic tasks. However, existing methods for log anomaly detection face several challenges, including limitations in recognizing current types of anomalous logs and difficulties in performing online incremental updates to the anomaly detection models. To address these challenges,...Show More
The Plectropomus leopardus (P. leopardus), a species found in underwater environments, possesses substantial strategic importance due to its rich underwater resources. However, the natural habitat and industrial breeding environment of P. leopardus is generally dark and complex, which presents notable challenges to object detection and recognition. In this research, we propose Plectropomus leopard...Show More
Visual recognition algorithms based on deep neural network (DNN) have been widely used in the design of automatic driving to recognize traffic sign images. However, there exists adversarial patches which are essentially the anormal image block that can be locally observed but not noticed by humans. And these visual recognition algorithms often suffer from the effect of adversarial patches, due to ...Show More
Iris is a distinct and strong biometric feature that is being employed as a method of authentication all over the world. Irreversibility, Renewability, and Unlinkability are the most critical aspects required to ensure the privacy of biometrics. Keeping recognition performance at a high level while providing privacy is a critical challenge that many researchers try to overcome. Information distort...Show More
In recent years, dynamic multiobjective evolutionary algorithms (DMOEAs) using the prediction strategy have shown promising performance for solving dynamic multiobjective optimization problems (DMOPs), as they can predict environmental changing trends in advance. However, most of them follow a regular change pattern and thus their performance is compromised when solving DMOPs with irregular change...Show More
The competitive swarm optimizer (CSO) classifies swarm particles into loser and winner particles and then uses the winner particles to efficiently guide the search of the loser particles. This approach has very promising performance in solving large-scale multiobjective optimization problems (LMOPs). However, most studies of CSOs ignore the evolution of the winner particles, although their quality...Show More
Software aging refers to system performance degradation and failure due to Aging-Related Bugs (ARBs) in long-running software systems. ARB prediction helps identify ARBs to prevent software aging. However, early project stages often lack ARB data for model training. To address this, cross-project ARB prediction (CPAP) is proposed, where a model is trained using labeled source projects to predict t...Show More
Binary code similarity detection for cross-platform is widely used in plagiarism detection, malware detection and vulnerability search, aiming to detect whether two binary functions over different platforms are similar. Existing cross-architecture approaches mainly rely on the approximate matching calculation of complex high-dimensional features, such as graph, which are inevitably slow and unsuit...Show More
Detecting the gene sequence of virus strains from patients and classifying them into specific strains are very important to provide effective treatment. However, there are significant barriers to sharing the virus strains' gene data in plaintext to the privacy concerns of the patients. Homomorphic encryption is a form of encryption that allows users to calculate encrypted data without decrypting i...Show More
System logs are valuable resources for system main-tenance and troubleshooting since they record run-time status and significant events of computer systems. Detecting anomalies via system logs has been widely researched in recent years. However, current log-based anomaly detection approaches are susceptible to noise introduced by log processing and evolution. In this work, we proposed AugLog, a lo...Show More
Face template protection are increasingly applied in identity authentication systems in recent years since it can provide high matching performance. Face template protection aims to provide an effective solution to ensure the security of face features. In most of the end-to-end face template protection schemes, the main challenge of the problem is that the unavailability of the enrolled users’ dat...Show More
Anomaly events indicating the unhealthy status of the computer system are recorded in the system log (Syslog). Therefore, Syslog-based anomaly event detection is crucial for diagnosing system issues and problems. However, existing log-based anomaly detection approaches use raw and unstructured log entries independently and incompletely, i.e., without considering the context of each event and event...Show More
The ancient Chinese characters appear in various historical documents and poetry. People tend to use optical character recognition tools to understand these uncommon characters. The current Chinese text recognition interface is restricted to a limited character set, such as GB2312-80 and GB18010-2005 standard. However, the newest HanYu Dictionary contains over 55K characters, much more than the co...Show More
Existing distributed video coding (DVC) frameworks use manually designed and optimized modules when encoding and decoding video. Each module can set the appropriate parameters as much as possible to achieve its independent optimization. But there is no connection between the modules, and overall end-to-end optimization is not realized. Inspired by the application of neural networks to video coding...Show More
Effort-Aware Software Defect Prediction (EADP) ranks software modules according to the defect density of software modules, which allows testers to find more defects while reviewing a certain amount of code, and allocates testing resources more effectively. However, the recently proposed CBS+ and EASC methods tend to rank the software modules with more LOC (Lines of Code) first. Therefore, there ar...Show More
In long-running systems, the phenomenon of performance degradation and failure rate increase caused by Aging-Related Bugs (ARBs) is known as software aging. Because of the low presence and reproducing difficulty of ARBs, collecting enough training data to predict ARBs in a project is not easy. Thus, cross-project ARB prediction has been proposed. There are two main challenges in cross-project ARB ...Show More
Face anti-spoofing is becoming increasingly indispensable for face recognition systems, which are vulnerable to various spoofing attacks performed using fake photos and videos. In this paper, a novel “LDN-TOP representation followed by ProCRC classification” pipeline for face anti-spoofing is proposed. We use local directional number pattern (LDN) with the derivative-Gaussian mask to capture detai...Show More
Software aging, which is caused by Aging-Related Bugs (ARBs), refers to the phenomenon of performance degradation and eventual crash in long running systems. In order to discover and remove ARBs, ARB prediction is proposed. However, due to the low presence and reproducing difficulty of ARBs, it is usually difficult to collect sufficient ARB data within a project. Therefore, cross-project ARB predi...Show More
As an alternative implementation of Slepian-Wolf coding, distributed arithmetic coding is very competitive in short and medium block lengths. The existing distributed arithmetic coding decoder uses the maximum a posteriori metric and the M-algorithm to select the decoding sequence by considering the prior information. Since the prior probability distribution has been explored by the encoding proce...Show More
Person re-identification(re-ID) is becoming a hot research topic because of its value in both machine learning and video surveillance applications. In order to improve the robustness of Metric Learning by Accelerated Proximal Gradient(MLAPG), a person re-ID algorithm, called Asymmetric -MLAPG, is proposed on the basis of asymmetric metric. Unlike traditional metric learning which ignores the takin...Show More
Homomorphic encryption provides a way to perform deep learning over encrypted data and permits the user to encrypt the data before uploading, leaving the control of data on the user side. However, operations on encrypted data based on homomorphic encryption are time-consuming, especially in a deep convolutional neural network (CNN), which incorporates a large number of layers and operations. To sp...Show More
In cognitive radio ad hoc networks (CRAHNs), the secondary users' links are interrupted by the arrival of primary users, which leads to a significant increase of the number of transmissions per packet. Since network coding and opportunistic routing can reduce the number of transmissions over unreliable wireless links, they are more suitable for CRAHNs. Network coding-based opportunistic routing ha...Show More
As the primary transportation in the urban traffic, bus plays a significant role in road safety. It would cause severe casualties if an accident occurred. To improve the safety of bus driving, we classify the specific types of latent abnormal driving behavior, which include sudden braking, lane changing casually, quick turn, fast U-turn and long time parking, and propose a method to identify the a...Show More