RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Identifying SDC-Causing Instructions Based on Random Forests Algorithm

        ( Liping Liu ),( Linlin Ci ),( Wei Liu ),( Hui Yang ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.3

        Silent Data Corruptions (SDCs) is a serious reliability issue in many domains of computer system. The identification and protection of the program instructions that cause SDCs is one of the research hotspots in computer reliability field at present. A lot of solutions have already been proposed to solve this problem. However, many of them are hard to be applied widely due to time-consuming and expensive costs. This paper proposes an intelligent approach named SDCPredictor to identify the instructions that cause SDCs. SDCPredictor identifies SDC-causing Instructions depending on analyzing the static and dynamic features of instructions rather than fault injections. The experimental results demonstrate that SDCPredictor is highly accurate in predicting the SDCs proneness. It can achieve higher fault coverage than previous similar techniques in a moderate time cost.

      • KCI등재

        Control Flow Checking at Virtual Edges

        ( Liping Liu ),( Linlin Ci ),( Wei Liu ),( Hui Yang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.1

        Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

      • KCI등재

        A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults

        ( Wei Liu ),( Linlin Ci ),( Liping Liu ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.5

        Transient faults occur in computation units of a processor, which can cause control flow errors (CFEs) and compromise system reliability. The software-based methods perform illegal control flow detection by inserting redundant instructions and monitoring signature. However, the existing methods not only have drawbacks in terms of performance overhead, but also lack of configurability. We propose a configurable approach CCFCA for detecting CFEs. The configurability of CCFCA is implemented by analyzing the criticality of each region and tuning the detecting granularity. For critical regions, program blocks are divided according to space-time overhead and reliability constraints, so that protection intensity can be configured flexibly. For other regions, signature detection algorithms are only used in the first basic block and last basic block. This helps to improve the fault-tolerant efficiency of the CCFCA. At the same time, CCFCA also has the function of solving confusion and instruction self-detection. Our experimental results show that CCFCA incurs only 10.61% performance overhead on average for several C benchmark program and the average undetected error rate is only 9.29%. CCFCA has high error coverage and low overhead compared with similar algorithms. This helps to meet different cost requirements and reliability requirements.

      • Power Quality Disturbance Classification Based on A Novel Fourier Neural Network and Hyperbolic S-transform

        Lin Lin,Xiaohuan Wu,Jiajin Qi,Hongxin Ci 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.1

        Power quality (PQ) disturbances recognition is the foundation of power quality analysis and improvement. In order to improve the classification accuracy and efficiency, a new classification approach based on modified Fourier neural networks (FNN) and Hyperbolic S-transform (HST) was designed for PQ disturbances classification. HST has better a time-frequency resolution than S-transform. The features extracted from HST results compose the input vectors of classifier. The DFP emendatory Quasi-Newton method is used to improve the learning ability of FNN and avoid local minimum problem. Three modified FNNs were used to construct a classifier with the structure of decision tree. Six types of disturbances with different noise ratio were simulated to test the classification ability of the new approach. Simulation results show that the new classifier has better classification accuracy than other classifiers based on BP neural networks and Fourier neural networks. The new approach is effective.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼