Patents by Inventor Zhihong TIAN
Zhihong TIAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12068943Abstract: The present disclosure relates to the technical field of Internet, in particular to a method for measuring network international outlet interfaces of a designated area. The method includes the following steps: acquiring a designated collection of routing interface paths and area location information of IP addresses of routing interface nodes; dividing the collected routing interface paths into critical hop complete paths and critical hop missing paths; determining whether a routing interface path is a critical hop complete path; using a 2-tuple to identify network international outlet interfaces of the routing interface path; and counting the quantity of the network international outlet interfaces of the measured area.Type: GrantFiled: July 12, 2023Date of Patent: August 20, 2024Assignee: GUANGZHOU UNIVERSITYInventors: Yu Jiang, Binxing Fang, Yanbin Sun, Zhihong Tian, Mohan Li, Deshun Zeng
-
Patent number: 11960869Abstract: An Android penetration method and device for implementing silent installation based on accessibility services. The method includes: acquiring a second target application by adding a load program to a first target application and adding penetration permissions using an Android decompilation technology; and implementing silent installation of the second target application using an accessibility service technology.Type: GrantFiled: January 5, 2022Date of Patent: April 16, 2024Assignee: Guangzhou UniversityInventors: Hui Lu, Zhihong Tian, Chengjie Jin, Luxiaohan He, Man Zhang, Jiageng Yang, Xinguo Zhang, Dongqiu Huang, Qi Sun, Yanbin Sun, Shen Su
-
Publication number: 20240111956Abstract: Disclosed are a Nested Named Entity Recognition method based on part-of-speech awareness, system, device and storage medium therefor. The method uses a BiLSTM model to extract a feature of text word data in order to obtain a text word depth feature, and each text word of text to be recognized is initialized into a corresponding graph node, and a text heterogeneous graph of the text to be recognized is constructed according to a preset part-of-speech path, the text word data of the graph nodes is updated by an attention mechanism, and the features of all graph nodes of the text heterogeneous graph are extracted using the BiLSTM model, and a nested named entity recognition result is obtained after decoding and annotating. The present disclosure can recognize ordinary entities and nested entities accurately and effectively, and enhance the performance and advantages of the nested named entity recognition model.Type: ApplicationFiled: November 28, 2023Publication date: April 4, 2024Inventors: Jing Qiu, Ling Zhou, Chengliang Gao, Rongrong Chen, Ximing Chen, Zhihong Tian, Lihua Yin, Hui Lu, Yanbin Sun, Junjun Chen, Dongyang Zheng, Fei Tang, Jiaxu Xing
-
Publication number: 20240098011Abstract: The present disclosure relates to the technical field of Internet, in particular to a method for measuring network international outlet interfaces of a designated area. The method includes the following steps: acquiring a designated collection of routing interface paths and area location information of IP addresses of routing interface nodes; dividing the collected routing interface paths into critical hop complete paths and critical hop missing paths; determining whether a routing interface path is a critical hop complete path; using a 2-tuple to identify network international outlet interfaces of the routing interface path; and counting the quantity of the network international outlet interfaces of the measured area.Type: ApplicationFiled: July 12, 2023Publication date: March 21, 2024Inventors: Yu JIANG, Binxing FANG, Yanbin SUN, Zhihong TIAN, Mohan LI, Deshun ZENG
-
Publication number: 20240064107Abstract: Disclosed is a system for classifying encrypted traffic based on a data packet. The system includes a traffic capture module, a traffic analysis module, and a traffic classification module. The system collects data packets from a network flow to construct a machine learning model, so as to classify encrypted traffic and identify normal traffic and malicious traffic. In a process of constructing a feature matrix, basic spatial-temporal features, header features, load features, and statistical features are obtained. In addition, behavioral features of the data packets are obtained and used to demonstrate differences between the normal traffic and the malicious traffic. Moreover, the present disclosure focuses on a difference between different versions of an encryption protocol, especially a transport layer security (TLS) protocol, and introduces the difference into a model for analysis, so that the system classifies encrypted traffic in a more efficient manner.Type: ApplicationFiled: November 1, 2023Publication date: February 22, 2024Applicant: Guangzhou UniversityInventors: Jing Qiu, Jie Ding, Rongrong Chen, Chengliang Gao, Zhihong Tian, Lihua Yin, Guangxia Xu, Shen Su, Xiaoya Ni, Fei Tang, Minghao Hu, Jiaxu Xing, Qianlong Xiao
-
Patent number: 11825844Abstract: The present disclosure provides a method for controlling Fusarium oxysporum f. sp. cubense tropical race 4 (Foc TR4). The present disclosure mainly aims to solve the problem of effectively inhibiting the Foc TR4, but the existing fungicides cannot effectively inhibit the Foc TR4 without damage to banana plants. By treating with the fungicide disclosed by the present disclosure, the growth of the Foc TR4 can be limited, and there is no adverse effect on banana plants.Type: GrantFiled: June 1, 2022Date of Patent: November 28, 2023Assignee: GUANGXI UNIVERSITYInventors: Jianxiong Li, Zhihong Tian, Zhiyan Zhu
-
Publication number: 20230362175Abstract: The invention discloses a weighted heterogeneous graph-oriented malicious behavior identification method, system and storage medium. The method comprises the following steps: constructing an inductive graph neural network model. The inductive graph neural network model comprises a subgraph extraction module, a plurality of feature vector generation and fusion modules and a classification learning module; performing training and learning for the inductive graph neural network model, extracting subgraphs, learning the latent vector representation of nodes in the subgraphs, obtaining a plurality of subgraph feature vectors corresponding to the subgraphs, and fusing a plurality of subgraph feature vectors. The node feature vector obtained by fusion is used for classification learning in the classification learning module; using the trained inductive graph neural network model for malicious behavior identification.Type: ApplicationFiled: April 28, 2023Publication date: November 9, 2023Inventors: Shudong LI, Xiaobo WU, Weihong HAN, Binxing FANG, Zhihong TIAN, Lihua YIN, Zhaoquan GU
-
Publication number: 20230259621Abstract: An APT organization identification method, system and storage medium based on a stacking ensemble are provided, the method comprising: using a TF-IDF algorithm combined with an n-gram to extract and vectorize behavior features from malware samples to form a malicious behavior vector feature set; based on the malicious behavior vector feature set, calculating correlations between features and chi-square values between the features and categories, performing screening twice on the malicious behavior vector feature set to obtain an improved low-dimensional feature subset data; constructing a multi-model fusion stacking ensemble, learning an APT organization identification model, using the APT organization identification model to perform an identification on new ATP attacks.Type: ApplicationFiled: June 21, 2021Publication date: August 17, 2023Applicant: GUANGZHOU UNIVERSITYInventors: Shudong LI, Qianqing ZHANG, Xiaobo WU, Weihon HAN, Binxing FANG, Zhihong TIAN, Lihua YIN, Zhaoquan GU
-
Publication number: 20230057048Abstract: The present disclosure provides a method for controlling Fusarium oxysporum f. sp. cubense tropical race 4 (Foc TR4). The present disclosure mainly aims to solve the problem of effectively inhibiting the Foc TR4, but the existing fungicides cannot effectively inhibit the Foc TR4 without damage to banana plants. By treating with the fungicide disclosed by the present disclosure, the growth of the Foc TR4 can be limited, and there is no adverse effect on banana plants.Type: ApplicationFiled: June 1, 2022Publication date: February 23, 2023Applicant: South China Botanical Garden, Chinese Academy of SciencesInventors: Jianxiong LI, Zhihong TIAN, Zhiyan ZHU
-
Publication number: 20220129256Abstract: Embodiments of the present invention provides an Android penetration method and device for implementing silent installation based on accessibility services. The method includes: acquiring a second target application by adding a load program to a first target application and adding penetration permissions using an Android decompilation technology; and implementing silent installation of the second target application using an accessibility service technology. The embodiment of the present invention enables a terminal to perform silent penetration test without root and user interaction. The embodiments of the present invention can also improve the stability of the penetration session.Type: ApplicationFiled: January 5, 2022Publication date: April 28, 2022Inventors: Hui Lu, Zhihong Tian, Chengjie Jin, Luxiaohan He, Man Zhang, Jiageng Yang, Xinguo Zhang, Dongqiu Huang, Qi Sun, Yanbin Sun, Shen Su
-
Publication number: 20210334121Abstract: A method to create and run a program in a computer including includes: connecting a preset USB-HID device to a computer, wherein the USB-HID device is provided with a first storage area, stores working codes in the first storage area in binary form; the USB-HID device injects a control instruction to the computer, such that the computer creates a text document or opens a command line program according to the control instruction; if the computer creates a text document, the USB-HID device inputs the working codes in the form of keyboard sequence to generate an application corresponding to the working codes, and controls the computer to run the application; and if the computer opens a command line program, the USB-HID device inputs the working codes in the form of keyboard sequence, such that the computer directly runs the working codes through the command line program.Type: ApplicationFiled: March 30, 2021Publication date: October 28, 2021Inventors: Tianle ZHANG, Zhihong TIAN, Lihua YIN, Naqin ZHOU, Liwen ZHENG, Yi FENG, Dailing XIA
-
Patent number: 9512052Abstract: The present invention relates to an airflow particle sorter, comprising: a top-sealed sorter main body, a discharge port, an outtake tube and at least one directing-intake port; the inner space of the sorter main body, from the above to the bottom, includes, a straight tube zone and a cone zone, the conical bottom of the cone zone is connected to the straight tube zone; the discharge port is located at the bottom of the cone zone; the directing-intake port is installed in the upper part of the straight tube zone in a tangential direction of the straight tube zone, and is communicated with the inner space of the sorter main body; the outtake tube is hermetically inserted into the top of the sorter main body, and extends downwardly to the lower part of the straight tube zone, and the outtake tube has a sealed bottom end; the lower part of the outtake tube is installed with at least one directing-outtake port, which communicates the outtake tube with the inner space of the sorter main body, the directing-outtakeType: GrantFiled: October 29, 2013Date of Patent: December 6, 2016Assignees: CHINA PETROLEUM & CHEMICAL CORPORATION, RESEARCH INSTITUTE OF PETROLEUM PROCESSING, SINOPECInventors: Jun Long, Zhihong Tian, Shuandi Hou, Bingtian Zhu, Xuefeng Wu, Jiushun Zhang, Anguo Mao, Zhemin Zhang, Lufeng Lv, Jinlong He, Xuefeng Li, Yalin Liu
-
Publication number: 20140121438Abstract: The present invention relates to an airflow particle sorter, comprising: a top-sealed sorter main body, a discharge port, an outtake tube and at least one directing-intake port; the inner space of the sorter main body, from the above to the bottom, includes, a straight tube zone and a cone zone, the conical bottom of the cone zone is connected to the straight tube zone; the discharge port is located at the bottom of the cone zone; the directing-intake port is installed in the upper part of the straight tube zone in a tangential direction of the straight tube zone, and is communicated with the inner space of the sorter main body; the outtake tube is hermetically inserted into the top of the sorter main body, and extends downwardly to the lower part of the straight tube zone, and the outtake tube has a sealed bottom end; the lower part of the outtake tube is installed with at least one directing-outtake port, which communicates the outtake tube with the inner space of the sorter main body, the directing-outtakeType: ApplicationFiled: October 29, 2013Publication date: May 1, 2014Applicants: RESEARCH INSTITUTE OF PETROLEUM PROCESSING, SINOPEC, CHINA PETROLEUM & CHEMICAL CORPORATIONInventors: Jun LONG, Zhihong TIAN, Shuandi HOU, Bingtian ZHU, Xuefeng WU, Jiushun ZHANG, Anguo MAO, Zhemin ZHANG, Lufeng LV, Jinlong HE, Xuefeng LI, Yalin LIU