Security

Data of an attack example in Bit-Level DFA of SM4

30 views
  • Security
  • Last Updated On: 
    Tue, 01/21/2020 - 00:28

    This data was used for the paper: J. Wang, P. Aubry, and A. Yarovoy, " Three-Dimensional Short-Range Imaging With Irregular MIMO Arrays Using NUFFT-Based Range Migration Algorithm", IEEE Transactions on Geoscience and Remote Sensing. It includes two synthetic electromagnetic datasets and one experimental measured data with multiple-input-multiple-output (MIMO) arrays.

    21 views
  • Digital signal processing
  • Last Updated On: 
    Fri, 01/10/2020 - 11:56

    Authors’ multimedia video of VO2 patch with resistive heater electrically isolated by a thin SiO2 layer and increase in temperature (by Joule heating) inducing phase transition, observed by a change in color.

    47 views
  • Communications
  • Last Updated On: 
    Tue, 12/31/2019 - 08:42

    The users graph structure of Sina network.

    124 views
  • Security
  • Last Updated On: 
    Fri, 12/13/2019 - 07:36

     

    150 views
  • Machine Learning
  • Last Updated On: 
    Tue, 12/03/2019 - 22:24

    Information:

    This dataset was created for research on blockchain anomaly and fraud detection. And donated to IEEE data port online community. 

    https://github.com/epicprojects/blockchain-anomaly-detection

     

     

     

    139 views
  • Artificial Intelligence
  • Last Updated On: 
    Sun, 11/24/2019 - 08:27

    This is a dataset consisting of 8 features extracted from 70,000 monochromatic still images adapted from the Genome Project Standford's database, that are labeled in two classes: LSB steganography (1) and without LSB Steganography (0). These features are Kurtosis, Skewness, Standard Deviation, Range, Median, Geometric Mean, Hjorth Mobility, and Hjorth Complexity, all extracted from the histograms of the still images, including random spatial transformations. The steganographic function embeds five types of payloads, from 0.1 to 0.5.

    121 views
  • Artificial Intelligence
  • Last Updated On: 
    Thu, 11/21/2019 - 20:14

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Top-1000 imported functions extracted from the 'pe_imports' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    330 views
  • Machine Learning
  • Last Updated On: 
    Fri, 11/08/2019 - 05:43

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Raw PE byte stream rescaled to a 32 x 32 greyscale image using the Nearest Neighbor Interpolation algorithm and then flattened to a 1024 bytes vector. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    168 views
  • Machine Learning
  • Last Updated On: 
    Thu, 11/07/2019 - 11:45

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data (PE Section Headers of the .text, .code and CODE sections) extracted from the 'pe_sections' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    345 views
  • Machine Learning
  • Last Updated On: 
    Wed, 11/06/2019 - 06:10

    Pages