Blue discharge, referring to pixies, blue starters, and blue jets are one kind of Transient Luminous Events (TLEs) emerging from the top of the thunderstorm, characterized with their blue emission and terminal altitude at 20-50 km (e.g.,
Clinic Named Entity Recognition (CNER) aims to recognize named entities such as body part, disease and symptom from Electronic Health Records (EHRs), which can benefit many intelligent biomedical systems. In recent years, more and more attention has been paid to the end-to-end CNER with recurrent neural networks (RNNs), especially for long short-term memory networks (LSTMs). However, it remains a great challenge for RNNs to capture long range dependencies. Moreover, Chinese presents additional challenges, since it uses logograms instead of alphabets, the ambiguities of Chinese word and has no word boundaries. In this work, we present a BiLSTM-CRF with self-attention mechanism (Att-BiLSTM-CRF) model for Chinese CNER task, which aims to address these problems. Self-attention mechanism can learn long range dependencies by establishing a direct connection between each character. In order to learn more semantic information about Chinese characters, we propose a novel fine-grained character-level representation method. We also introduce part-of-speech (POS) labeling information about our model to capture the semantic information in input sentence. We conduct the experiment by using CCKS-2017 Shared Task 2 dataset to evaluate performance, and the experimental results indicated that our model outperforms other state-of-the-art methods. INDEX TERMS Natural language processing, named entity recognition, neural networks, self-attention.
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, the topic of Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from both industry and academia. Utilizing automated system to detect, exploit and patch software vulnerabilities seems so attractive because of its scalability and cost-efficiency compared with the human expert based solution. In this paper, we give an extensive survey of former representative works related to the underlying technologies of a CRS, including vulnerability detection, exploitation and patching. As an important supplement, we then review several pioneer studies that explore the potential of machine learning technologies in this field, and point out that the future development of Autonomous CRS is inseparable from machine learning.
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.