Malicious software (malware), in various forms and variants, continues to pose significant threats to user information security. Researchers have identified the effectiveness of utilizing API call ...sequences to identify malware. However, the evasion techniques employed by malware, such as obfuscation and complex API call sequences, challenge existing detection methods. This research addresses this issue by introducing CAFTrans, a novel transformer-based model for malware detection. We enhance the traditional transformer encoder with a one-dimensional channel attention module (1D-CAM) to improve the correlation between API call vector features, thereby enhancing feature embedding. A word frequency reinforcement module is also implemented to refine API features by preserving low-frequency API features. To capture subtle relationships between APIs and achieve more accurate identification of features for different types of malware, we leverage convolutional neural networks (CNNs) and long short-term memory (LSTM) networks. Experimental results demonstrate the effectiveness of CAFTrans, achieving state-of-the-art performance on the mal-api-2019 dataset with an F1 score of 0.65252 and an AUC of 0.8913. The findings suggest that CAFTrans improves accuracy in distinguishing between various types of malware and exhibits enhanced recognition capabilities for unknown samples and adversarial attacks.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
This paper studies mobile edge computing (MEC) networks where multiple wireless devices (WDs) offload their computation tasks to multiple edge servers and one cloud server. Considering different ...real-time computation tasks at different WDs, every task is decided to be processed locally at its WD or to be offloaded to and processed at one of the edge servers or the cloud server. In this paper, we investigate low-complexity computation offloading policies to guarantee quality of service of the MEC network and to minimize WDs' energy consumption. Specifically, both a linear programing relaxation-based (LR-based) algorithm and a distributed deep learning-based offloading (DDLO) algorithm are independently studied for MEC networks. We further propose a heterogeneous DDLO to achieve better convergence performance than DDLO. Extensive numerical results show that the DDLO algorithms guarantee better performance than the LR-based algorithm. Furthermore, the DDLO algorithm generates an offloading decision in less than 1 millisecond, which is several orders faster than the LR-based algorithm.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
The rapid growth of mobile internet services has yielded a variety of computation-intensive applications such as virtual/augmented reality. Mobile Edge Computing (MEC), which enables mobile terminals ...to offload computation tasks to servers located at the edge of the cellular networks, has been considered as an efficient approach to relieve the heavy computational burdens and realize an efficient computation offloading. Driven by the consequent requirement for proper resource allocations for computation offloading via MEC, in this paper, we propose a Deep-Q Network (DQN) based task offloading and resource allocation algorithm for the MEC. Specifically, we consider a MEC system in which every mobile terminal has multiple tasks offloaded to the edge server and design a joint task offloading decision and bandwidth allocation optimization to minimize the overall offloading cost in terms of energy cost, computation cost, and delay cost. Although the proposed optimization problem is a mixed integer nonlinear programming in nature, we exploit an emerging DQN technique to solve it. Extensive numerical results show that our proposed DQN-based approach can achieve the near-optimal performance. Keywords: Mobile edge computing, Joint computation offloading and resource allocation, Deep-Q network
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Introduction The outbreak of SARS-CoV-2, leading to COVID-19, poses a major global health threat. While specific treatments and vaccines are under development, Traditional Chinese Medicine (TCM) has ...historically been effective against pandemics, including viral pneumonias. Our study explores the efficacy and mechanisms of Jinhua Qinggan Granules (JHQG) in treating COVID-19. Methods We analyzed JHQG’s components using UHPLC-Q-Exactive-Orbitrap-MS, identifying 73 compounds. Network pharmacology and single-cell RNA sequencing (scRNA-seq) were used to assess JHQG’s effects on immune cells from peripheral blood mononuclear cells (PBMCs). Literature review supported the antiviral and anti-inflammatory effects of JHQG. Results JHQG targets were found to interact with immune cells, including neutrophils, monocytes, plasmablasts, and effector T cells, reducing their overactivation in severe COVID-19. JHQG’s modulation of these cells’ activity likely contributes to reduced inflammation and improved clinical outcomes. Discussion Our findings provide insights into JHQG's mechanism of action, highlighting its potential in controlling the inflammatory response in COVID-19 patients. The study supports the use of JHQG as a safe and effective treatment for COVID-19 and similar viral infections, leveraging its ability to modulate immune cell activity and reduce inflammation.
Internet of Things (IoT) is able to provide various physical objects to exchange their information through the 6G wireless communication network. However, with the large increasing number of the IoT ...devices (IoDs), the deployment of IoDs faces two basic challenges, i.e., spectrum scarcity and energy limitation. Cooperative spectrum sharing and simultaneous wireless information and power transfer (SWIPT) provide effective ways to improve the spectrum and energy efficiency. In this article, two SWIPT cooperative spectrum sharing methods are proposed to improve the energy and spectrum efficiency for 6G-enabled cognitive IoT network, in which IoDs access to the primary spectrum by serving as orthogonal frequency-division multiplexing (OFDM) relay with the energy harvested from the received radio-frequency (RF) signal. Specifically, in phase1, the IoDs transmitter (DT) in the cognitive IoT network performs information decoding and energy harvesting with the received RF signal. In phase2, DT transmits the signals of the primary system and itself to the corresponding receiver by utilizing orthogonal subcarriers with the harvested energy to avoid the interference. Achievable rates of the cognitive IoT system with amplify-and-forward (AF) and decode-and-forward (DF) relaying mode are maximized through joint power and subcarrier optimization, while ensuring the target rate of the primary system. Simulation results are performed to illustrate the improvement of the spectrum and energy efficiency.
The GTPase OPA1 and the AAA-protease OMA1 serve well-established roles in mitochondrial stress responses and mitochondria-initiated cell death. In addition to its role in mitochondrial membrane ...fusion, cristae structure, and bioenergetic function, OPA1 controls apoptosis by sequestering cytochrome c (cyt c) in mitochondrial cristae. Cleavage of functional long OPA1 (L-OPA1) isoforms by OMA1 inactivates mitochondrial fusion and primes apoptosis. OPA1 cleavage is regulated by the prohibitin (PHB) complex, a heteromeric, ring-shaped mitochondrial inner membrane scaffolding complex composed of PHB1 and PHB2. In neurons, PHB plays a protective role against various stresses, and PHB deletion destabilizes OPA1 causing neurodegeneration. While deletion of OMA1 prevents OPA1 destabilization and attenuates neurodegeneration in PHB2 KO mice, how PHB levels regulate OMA1 is still unknown. Here, we investigate the effects of modulating neuronal PHB levels on OMA1 stability and OPA1 cleavage. We demonstrate that PHB promotes OMA1 turnover, effectively decreasing the pool of OMA1. Further, we show that OMA1 binds to cardiolipin (CL), a major mitochondrial phospholipid. CL binding promotes OMA1 turnover, as we show that deleting the CL-binding domain of OMA1 decreases its turnover rate. Since PHB is known to stabilize CL, these data suggest that PHB modulates OMA1 through CL. Furthermore, we show that PHB decreases cyt c release induced by tBID and attenuates caspase 9 activation in response to hypoxic stress in neurons. Taken together, our results suggest that PHB-mediated CL stabilization regulates stress responses and cell death through OMA1 turnover and cyt c release.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Deep learning has recently been applied to automatically classify the modulation categories of received radio signals without manual experience. However, training deep learning models requires ...massive volume of data. An insufficient training data will cause serious overfitting problem and degrade the classification accuracy. To cope with small dataset, data augmentation has been widely used in image processing to expand the dataset and improve the robustness of deep learning models. However, in wireless communication areas, the effect of different data augmentation methods on radio modulation classification has not been studied yet. In this paper, we evaluate different data augmentation methods via a state-of-the-art deep learning-based modulation classifier. Based on the characteristics of modulated signals, three augmentation methods are considered, i.e., rotation, flip, and Gaussian noise, which can be applied in both training phase and inference phase of the deep learning-based classifier. Numerical results show that all three augmentation methods can improve the classification accuracy. Among which, the rotation augmentation method outperforms the flip method, both of which achieve higher classification accuracy than the Gaussian noise method. Given only 12.5% of training dataset, a joint rotation and flip augmentation policy can achieve even higher classification accuracy than the baseline with initial 100% training dataset without augmentation. Furthermore, with data augmentation, radio modulation categories can be successfully classified using shorter radio samples, leading to a simplified deep learning model and a shorter classification response time.
In this letter, we propose an energy efficient power control scheme for resource sharing between cellular and device-to-device (D2D) users in cellular network assisted D2D communication. We take into ...account the circuit power consumption of the device-to-device user (DU) and aim at maximizing the DU's energy efficiency while guaranteeing the required throughputs of both the DU and the cellular user. Specifically, we define three different regions for the circuit power consumption of the DU and derive the optimal power control scheme for each region. Moreover, a distributed algorithm is proposed for implementation of the optimal power control scheme.
During RNA virus infection, the adaptor protein MAVS recruits TRAF3 and TRAF6 to form a signalosome, which is critical to induce the production of type I interferons (IFNs) and proinflammatory ...cytokines. While activation of the MAVS/TRAF3/TRAF6 signalosome is well studied, the negative regulation of the signalosome remains largely unknown. Here we report that RNA viruses specifically promote the deubiquitinase OTUD1 expression by NF-κB-dependent mechanisms at the early stage of viral infection. Furthermore, OTUD1 upregulates protein levels of intracellular Smurf1 by removing Smurf1 ubiquitination. Importantly, RNA virus infection promotes the binding of Smurf1 to MAVS, TRAF3 and TRAF6, which leads to ubiquitination-dependent degradation of every component of the MAVS/TRAF3/TRAF6 signalosome and subsequent potent inhibition of IFNs production. Consistently, OTUD1-deficient mice produce more antiviral cytokines and are more resistant to RNA virus infection. Our findings reveal a novel immune evasion mechanism exploited by RNA viruses, and elucidate a negative feedback loop of MAVS/TRAF3/TRAF6 signaling mediated by the OTUD1-Smurf1 axis during RNA virus infection.
Full text
Available for:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Existing weakly supervised named entity recognition (NER) research only deals with flat entities and ignores nested entities. This paper proposes a multi-stage nested entity recognition method (MNR) ...that utilizes weakly labeled data to recognize nested entities. However, weak labels generated through external knowledge bases have two problems: incompleteness and labeling bias. To address this challenge, the MNR comprises two models. First, we propose a neural transition-based attention model (NTAM) to solve the problem of weak-label incompleteness by learning the correlation between words. Simultaneously, the NTAM obtains candidate entities, including nested entities. Second, we propose a multi-marker fusion attention judgment model (MAJM) for selecting candidate entities through context semantics, candidate entities’ meanings, and their boundary information, thereby solving the labeling bias problem. The boundary information of candidate entities is enhanced by fusing their type markers. To our knowledge, we are the first to recognize nested entities under weak supervision by alleviating the noise of weakly labeled data. Experiments on three public nested NER datasets prove the effectiveness of our proposed method under weak supervision and demonstrate that the method outperforms previous state-of-the-art models under supervision.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ