DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction

  • Abstract
  • Literature Map
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Watermarking is a technique to help identify the source of data points, which can be used to help prevent the misuse of protected datasets. Existing methods on code watermarking, leveraging the idea from the backdoor research, embed stealthy triggers as watermarks. Despite their high resilience against dilution attacks and backdoor detections, the robustness has not been fully evaluated. To fill this gap, we propose DeCoMa , a dual-channel approach to De tect and purify Co de dataset water Ma rks. To overcome the high barrier created by the stealthy and hidden nature of code watermarks, DeCoMa leverages dual-channel constraints on code to generalize and map code samples into standardized templates. Subsequently, DeCoMa extracts hidden watermarks by identifying outlier associations between paired elements within the standardized templates. Finally, DeCoMa purifies the watermarked dataset by removing all samples containing the detected watermark, enabling the silent appropriation of protected code. We conduct extensive experiments to evaluate the effectiveness and efficiency of DeCoMa, covering 14 types of code watermarks and 3 representative intelligent code tasks (a total of 14 scenarios). Experimental results demonstrate that DeCoMa achieves a stable recall of 100% in 14 code watermark detection scenarios, significantly outperforming the baselines. Additionally, DeCoMa effectively attacks code watermarks with embedding rates as low as 0.1%, while maintaining comparable model performance after training on the purified dataset. Furthermore, as DeCoMa requires no model training for detection, it achieves substantially higher efficiency than all baselines, with a speedup ranging from 31.5 to 130.9×. The results call for more advanced watermarking techniques for code models, while DeCoMa can serve as a baseline for future evaluation.

ReferencesShowing 10 of 32 papers
  • Cite Count Icon 40
  • 10.1016/j.jss.2022.111304
Data Augmentation by Program Transformation
  • Mar 26, 2022
  • Journal of Systems and Software
  • Shiwen Yu + 2 more

  • Cite Count Icon 6
  • 10.1007/978-3-319-64861-3_81
Software Watermarking for Java Program Based on Method Name Encoding
  • Aug 31, 2017
  • Jianping Chen + 4 more

  • Cite Count Icon 338
  • 10.1145/292540.292569
Software watermarking
  • Jan 1, 1999
  • Christian Collberg + 1 more

  • Cite Count Icon 76
  • 10.1007/11427995_42
A Survey of Software Watermarking
  • Jan 1, 2005
  • William Zhu + 2 more

  • Cite Count Icon 34
  • 10.4324/9781315009421
The Psycho-Biology Of Language
  • Nov 5, 2013
  • George Kingsley Zipf

  • Cite Count Icon 339
  • 10.48550/arxiv.2307.09288
Llama 2: Open Foundation and Fine-Tuned Chat Models
  • Jul 18, 2023
  • Thibaut Lavril + 67 more

  • Cite Count Icon 3123
  • 10.1080/00401706.1969.10490657
Procedures for Detecting Outlying Observations in Samples
  • Feb 1, 1969
  • Technometrics
  • Frank E Grubbs

  • Open Access Icon
  • Cite Count Icon 574
  • 10.3758/s13423-014-0585-6
Zipf’s word frequency law in natural language: A critical review and future directions
  • Mar 25, 2014
  • Psychonomic Bulletin & Review
  • Steven T Piantadosi

  • Cite Count Icon 3
  • 10.1145/3674399.3674447
CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation
  • Jul 5, 2024
  • Benlong Wu + 5 more

  • Cite Count Icon 1560
  • 10.1080/01621459.1993.10476408
Alternatives to the Median Absolute Deviation
  • Dec 1, 1993
  • Journal of the American Statistical Association
  • Peter J Rousseeuw + 1 more

Similar Papers
  • Research Article
  • 10.3760/cma.j.issn.1009-9158.2013.01.016
Dual channel real-time PCR melting curve analysis-based assay for detecting of anti-tuberculosis drugresistant mutations in Mycobacterium tuberculosis
  • Jan 11, 2013
  • Chinese Journal of Laboratory Medicine
  • Qingyun Liu + 3 more

Objective Based on dual channel melting curve analysis-based assay,we developed a method to rapidly detect the drug-resistant mutations in Mycobacterium tuberculosis through real-time PCR. Methods According to the common first-line drug-resistant mutations of Mycobacterium tuberculosis,we designed six dual-labeled fluorescence probes to rapidly detect the drug-resistant mutations through real-time PCR melting curve after amplifications of drug-resistant related gene region of DNA.The targets include rpoB 81 bp core region,katG315,inh A promoter,ahpC promoter and embB306.To validate the sensitivity and specificity of our method,we performed real-time PCR assays to detect drug-resistant mutations in 76 clinical MDR-TB samples,which were collected by Shanghai CDC in 2008. Results In the validation,this method successfully detected drug-resistant mutations in all 76 clinical MDR-TB samples.The ΔTmof mutations were from 1.8 to 14.4℃.Comparing with the sequencing data,all mutations covered by the six probes were detected with 100% sensitivity and 100% specificity (rpoB,80/80;inh A,7/7; katG315,59/59; ahpC,8/8; embB306,27/27).This method can successfully detect drug-resistant mutations from 100 copies/μl DNA samples. Conclusions A widely applicable real-time PCR assay to detect first line drug-resistant mutations of Mycobacterium tuberculosis has benn developed.This method has proven to have the advantages of high sensitivity,specificity and low risk of contamination.It can be used in rapid diagnosis of clinical drug-resistant tuberculosis and the evaluation of laboratory drug sensitivity test.(Chin J Lab Med,2013,36:63-67) Key words: Real-time polymerase chain reaction; Mycobacterium tuberculosis; Mutation

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/hicss.2008.394
Simulation of Online Selling with Posted-Price and Auctions: Comparison of Dual Channel's Performance under Different Auction Mechanisms
  • Jan 1, 2008
  • Hila Etzion + 1 more

In this paper we use a simulation model to extend previous analytical research on a firm selling consumer goods online using posted price and auction at the same time. With the simulation we investigate three selling regimes: dual channel with sealed-bid auction; dual channel with open-bid auction, and a single channel with only posted price. We examine how the auction format affects the optimal design of the dual-channel, its performance relative to the single channel, and the sales in each channel. We find that in 81% of the cases we examine, the design that maximizes the average revenue from a dual channel with open-bid auction is the same as the design that maximizes the average revenue from a dual channel with sealed-bid auction. Also, the dual/open regime usually outperforms the dual/sealed regime, and both dual channel regimes outperform the single channel.

  • Conference Article
  • 10.1117/12.676479
Dual-channel concave-shape optical coupling liquid sensing system
  • Feb 13, 2006
  • Jian-Hua Yang + 3 more

A portable liquid sensing system based on a dual-channel and concave-shape optical coupling sensor array is developed for in-situ quantitative measurement of a liquid sample. The liquid sensing cell is specially designed by Multigassensors GmbH. In the cell, three light emitting and sensitive units with different light wavelength are integrated in a SiO<sub>2</sub> base. Each unit is composed of one light-emitting diode and two light-sensitive diodes. The cell is a concave-shape with a dual optical channel. The portable liquid sensing system is constructed by the sensing cell and peripheral devices which achieve functions of data acquisition, signal processing and mode identification. With different light absorption property for particular light wave, the tested liquid sample with different components and contents will produce special light response mode. Using the advanced sensor array signal processing algorithm and mode identification method, quantitative liquid measurement can be achieved in-situ by the portable system. The pH measurement for abromcresol green liquid sample is made using the present system and is compared with the result from a spectrometer. The accordant values from these two different devices demonstrate the feasibility of the novel liquid detection method and validity of the developed sensing system.

  • Research Article
  • Cite Count Icon 20
  • 10.1109/tit.2017.2754921
Duality of Channels and Codes
  • Jan 1, 2018
  • IEEE Transactions on Information Theory
  • Joseph M Renes

For any given channel $W$ with classical inputs and possibly quantum outputs, a dual classical-input channel $W^\perp$ can be defined by embedding the original into a channel $\mathcal N$ with quantum inputs and outputs. Here we give new uncertainty relations for a general class of entropies that lead to very close relationships between the original channel and its dual. Moreover, we show that channel duality can be combined with duality of linear codes, whereupon the uncertainty relations imply that the performance of a given code over a given channel is entirely characterized by the performance of the dual code on the dual channel. This has several applications. In the context of polar codes, it implies that the rates of polarization to ideal and useless channels must be identical. Duality also relates the tasks of channel coding and privacy amplification, implying that the finite blocklength performance of extractors and codes is precisely linked, and that optimal rate extractors can be transformed into capacity-achieving codes, and vice versa. Finally, duality also extends to the EXIT function of any channel and code. Here it implies that for any channel family, if the EXIT function for a fixed code has a sharp transition, then it must be such that the rate of the code equals the capacity at the transition. This may give a different route to proving a code family achieves capacity by establishing sharp EXIT function transitions.

  • Conference Article
  • Cite Count Icon 3
  • 10.1109/isit.2017.8006598
Duality of channels and codes
  • Jun 1, 2017
  • Joseph M Renes

For any given channel W with classical inputs and possibly quantum outputs, a dual classical-input channel W⊥ can be defined by embedding the original into a channel N with quantum inputs and outputs. Here we give new uncertainty relations for a general class of entropies that lead to very close relationships between the original channel and its dual. Moreover, we show that channel duality can be combined with duality of linear codes, whereupon the uncertainty relations imply that the performance of a given code over a given channel is entirely characterized by the performance of the dual code on the dual channel. This has several applications. In the context of polar codes, it implies that the rates of polarization to ideal and useless channels must be identical. Duality also relates the tasks of channel coding and privacy amplification, implying that the finite blocklength performance of extractors and codes is precisely linked, and that optimal rate extractors can be transformed into capacity-achieving codes, and vice versa. Finally, duality also extends to the EXIT function of any channel and code. Here it implies that for any channel family, if the EXIT function for a fixed code has a sharp transition, then it must be such that the rate of the code equals the capacity at the transition. This may give a different route to proving a code family achieves capacity by establishing EXIT function transitions.

  • Research Article
  • 10.1089/end.2013.1602
Abstracts from the 28th Annual Meeting of the Engineering and Urology SocietyMay 4, 2013San Diego, CA
  • Nov 1, 2013
  • Journal of Endourology

Abstracts from the 28th Annual Meeting of the Engineering and Urology SocietyMay 4, 2013San Diego, CA

  • Dissertation
  • 10.17635/lancaster/thesis/150
Anomaly detection for resilience in cloud computing infrastructures
  • Jan 1, 2017
  • Syed Noorulhassan Shirazi

Cloud computing is a relatively recent model where scalable and elastic resources are provided as optimized, cost-effective and on-demand utility-like services to customers. As one of the major trends in the IT industry in recent years, cloud computing has gained momentum and started to revolutionise the way enterprises create and deliver IT solutions. Motivated primarily due to cost reduction, these cloud environments are also being used by Information and Communication Technologies (ICT) operating Critical Infrastructures (CI). However, due to the complex nature of underlying infrastructures, these environments are subject to a large number of challenges, including mis-configurations, cyber attacks and malware instances, which manifest themselves as anomalies. These challenges clearly reduce the overall reliability and availability of the cloud, i.e., it is less resilient to challenges. Resilience is intended to be a fundamental property of cloud service provisioning platforms. However, a number of significant challenges in the past demonstrated that cloud environments are not as resilient as one would hope. There is also limited understanding about how to provide resilience in the cloud that can address such challenges. This implies that it is of utmost importance to clearly understand and define what constitutes the correct, normal behaviour so that deviation from it can be detected as anomalies and consequently higher resilience can be achieved. Also, for characterising and identifying challenges, anomaly detection techniques can be used and this is due to the fact that the statistical models embodied in these techniques allow the robust characterisation of normal behaviour, taking into account various monitoring metrics to detect known and unknown patterns. These anomaly detection techniques can also be applied within a resilience framework in order to promptly provide indications and warnings about adverse events or conditions that may occur. However, due to the scale and complexity of cloud, detection based on continuous real time infrastructure monitoring becomes challenging. Because monitoring leads to an overwhelming volume of data, this adversely affects the ability of the underlying detection mechanisms to analyse the data. The increasing volume of metrics, compounded with complexity of infrastructure, may also cause low detection accuracy. In this thesis, a comprehensive evaluation of anomaly detection techniques in cloud infrastructures is presented under typical elastic behaviour. More specifically, an investigation of the impact of live virtual machine migration on state of the art anomaly detection techniques is carried out, by evaluating live migration under various attack types and intensities. An initial comparison concludes that, whilst many detection techniques have been proposed, none of them is suited to work within a cloud operational context. The results suggest that in some configurations anomalies are missed and some configuration anomalies are wrongly classified. Moreover, some of these approaches have been shown to be sensitive to parameters of the datasets such as the level of traffic aggregation, and they suffer from other robustness problems. In general, anomaly detection techniques are founded on specific assumptions about the data, for example the statistical distributions of events. If these assumptions do not hold, an outcome can be high false positive rates. Based on this initial study, the objective of this work is to establish a light-weight real time anomaly detection technique which is more suited to a cloud operational context by keeping low false positive rates without the need for prior knowledge and thus enabling the administrator to respond to threats effectively. Furthermore, a technique is needed which is robust to the properties of cloud infrastructures, such as elasticity and limited knowledge of the services, and such that it can support other resilience supporting mechanisms. From this formulation, a cloud resilience management framework is proposed which incorporates the anomaly detection and other supporting mechanisms that collectively address challenges that manifest themselves as anomalies. The framework is a holistic endto-end framework for resilience that considers both networking and system issues, and spans the various stages of an existing resilience strategy, called (D2R 2+DR). In regards to the operational applicability of detection mechanisms, a novel Anomaly Detection-as-a-Service (ADaaS) architecture has been modelled as the means to implement the detection technique. A series of experiments was conducted to assess the effectiveness of the proposed technique for ADaaS. These aimed to improve the viability of implementing the system in an operational context. Finally, the proposed model is deployed in a European Critical Infrastructure provider’s network running various critical services, and validated the results in real time scenarios with the use of various test cases, and finally demonstrating the advantages of such a model in an operational context. The obtained results show that anomalies are detectable with high accuracy with no prior-knowledge, and it can be concluded that ADaaS is applicable to cloud scenarios for a flexible multi-tenant detection systems, clearly establishing its effectiveness for cloud infrastructure resilience.

  • Research Article
  • 10.5075/epfl-thesis-2177
Integrated optical sensor micro-systems based on disposable transducers
  • Jan 1, 2000
  • M Wiki

In this work novel concepts for the realization of miniature integrated optical sensor systems are presented. An important aspect for all realized approaches was their suitability for the use of disposable sensor chips. This is essential, especially for applications in the medical, food and environmental field. A robust sensor system with the inherent feature to compensate for disturbances originating from different kinds of mechanical instabilities is presented. It is based on a symmetric grating coupler structure, does not require any moving parts and provides the high sensitivity typical for integrated optical sensors based on grating couplers. The feasibility of this approach is demonstrated by determining the refractive index of liquids as well as by measuring the specific binding of bio-molecules (anti-chicken IgG) to immobilized chicken IgG on the sensor chip surface. A further approach for the realization of a refractometric integrated optical sensor system is presented featuring a high-resolution window which can be positioned within a wide measuring range. It also includes an in-situ verification procedure for disposable sensor chips. This realized sensor platform is suited for a large variety of current and future (bio-) chemical applications. As application examples, experimental results on refractometric measurements as well as on the suppression of non-specific binding are given. The realization of a hand-held, miniature integrated optical sensor system for versatile multi-channel applications is also described. Wavelength modulation techniques using vertical cavity surface emitting lasers (VCSELs) are used to interrogate multiple waveguide sensing regions on a single integrated optical chip for accurately measuring effective refractive index changes at a high data rate. With the experimental miniature compact dual-channel sensor module, a resolution of ΔNPP = 10-7 (short-term, peak-peak) for the effective refractive index was demonstrated. In terms of surface mass coverage, this resolution corresponds to ΔΓPP = 130 fg / mm2.

  • Research Article
  • Cite Count Icon 48
  • 10.1016/j.asoc.2023.110689
LAnoBERT: System log anomaly detection based on BERT masked language model
  • Aug 5, 2023
  • Applied Soft Computing
  • Yukyung Lee + 2 more

LAnoBERT: System log anomaly detection based on BERT masked language model

  • Conference Article
  • 10.1109/iespc.2019.8902397
Energy Detection over Dual Correlated Nakagami-m Fading Channels using Selection Diversity Technique
  • Mar 1, 2019
  • Parag Moni Patangia + 2 more

In Wireless Communications, Cognitive radio (CR) emerges as a boon to the mankind as it reduces the spectrum scarcity problem. Spectrum Sensing, the method to detect the presence or absence of licensed user is the fundamental problem of this system. This method employs different detection techniques in order to sense the radio environment simultaneously without interfering with the primary users. Energy Detection is the most popular among all the detection technique because of its low computational cost, easy implementation and less complexity. This technique is the most suitable for any environment since it does not require any knowledge of the primary user. In this paper, an analytical expression is derived for the corresponding average probability of detection over dual correlated Nakagami-m fading channel. The results suggest that the detection probability highly depends upon the severity of fading. This analytical expression is then verified using Monte Carlo simulation.

  • Research Article
  • 10.6138/jit.2012.13.2.05
A Key Management Scheme for Security and Energy Efficiency in Sensor Networks
  • Mar 1, 2012
  • Journal of Internet Technology
  • Hye-Young Kim + 1 more

It is necessary to have security for Wireless Sensor Networks (WSNs), which must be able to establish secure node to node communication. Sensor nodes should not have any a priori knowledge of which nodes will be close enough to be in their transmission range. And it is very likely that the topology of the network changes very frequently. Also a unicast based rekeying does not satisfy the security requirements of periodic rekeying for WSNs. Therefore, we propose a key management scheme for security and effective energy in WSNs. Using an allocation of a location based group key for secure group communication, the proposed scheme provides the revocation of compromised nodes and energy efficient rekeying. We address the main function using a broadcast based rekeying for low energy key management and high resilience. Also, we analyze the efficiency of our proposed scheme mathematically. We show that our proposed scheme performs better than other protocols, especially when the large scaled distributed sensor networks.

  • Research Article
  • Cite Count Icon 2
  • 10.5555/1455946.1455959
The dual distance of a CRC and bounds on the probability of undetected error, the weight distribution, and the covering radius
  • Apr 1, 2008
  • WSEAS TRANSACTIONS on COMMUNICATIONS archive
  • H D Wacker + 1 more

Dual codes play an important role in the field of error detecting codes on a binary symmetric channel. Via the MacWilliams Identities they can be used to calculate the original code's weight distribution and its probability of undetected error. Moreover, knowledge of the minimum distance of the dual code provides insight in the properties of the weights of a code. In this paper firstly the order of growth of the dual distance of a CRC as a function of the block length n is investigated, and a new lower bound is proven. Then this bound is used to derive a weaker version of the 2-r-bound on the probability of undetected error, and the relationship of this bound to the 2-r-bound is discussed. Estimates of the range of binomiality and the covering radius are given, depending only on the code rate R and the degree r of the generating polynomial of the CRC. In the case of a CRC, two results of Tietavainen are improved. Furthermore, wit is shown that there is binomial behavior of the weight distribution, if only n is large enough. Then, by means of an estimate of the tail of the binomial, another bound on the probability of undetected error is verified. Finally a new version of Sidel'nikov's theorem on the normality of the cumulative distribution function of the weights of a code is presented, where the dual distance is replaced by an expression depending on n and the degree r. In this way the conclusions of the present paper may attribute a new meaning to some well known results about codes with known dual distance and give some new insight in this kind of problems.

  • Research Article
  • Cite Count Icon 1
  • 10.11873/j.issn.1004-0323.2007.3.403
The Normalized Difference Thermal Index(NDTI) for the MODIS Fire Detection
  • Jan 1, 2007
  • Remote Sensing Technology and Application
  • Shan Hai-Bin Zhao Wen-Hua

In this study,based on analyzing the characteristic of the hot spot spectral radiance using related MODIS bands data,a new model named Normalized Difference Thermal Index(NDTI) was developed for the fire detection and monitoring.The algorithm of this model was discussed and given in details.Further well,the NDTI model was validated through a day fire case and a night fire case occurred in Heyuan China.Like NDVI,This dual-channel ratio index has the advantages that could attenuate conventional equipment noise and atmospheric effects.Research shows that the combination of fire radiation Channel 4 μm and 11 μm background components highlight the fire spots information access,by choose an appropriate NDTI threshold,the fire pixels could be accurately detected,the recognition rate can reach 93%.The NDTI may be widely used on sensor of the EOS-MODIS,NOAAAVHRR,GOES-VAS,future NPP-VIIRS,future Chinese FY3 and more.

  • Research Article
  • 10.3760/cma.j.issn.1673-9752.2017.03.014
Clinical value of the transluminal radiofrequency catheter ablation for malignant esophageal obstruction
  • Mar 20, 2017
  • Chinese Journal of Digestive Surgery
  • Hongxin Niu + 3 more

Objective To investigate the clinical value of the transluminal radiofrequency catheter ablation (RFCA) for malignant esophageal obstruction. Methods The retrospective cross-sectional descriptive study was conducted. The clinicopathological data of 52 patients with malignant esophageal obstruction who underwent transluminal RFCA at the Affiliated Hospital of Shandong Academy of Medical Science between March 2013 and March 2016 were collected. Patients received the bipolar radiofrequency ablation (RFA) under dual-channel endoscopy and X-ray. Observation indicators: (1) intra- and post-operative situations: operation situations, operation time, time of RFA, postoperative complications and duration of postoperative hospital stay, (2) follow-up. Follow-up using outpatient examination and telephone interview was performed to detect the subsequent treatment, survival of patients and recurrence of esophageal obstruction up to June 2016. Measurement data with normal distribution were represented as average (range). Results (1) Intra- and post-operative situations: 52 patients underwent successful RFCA, without the occurrence of aspiration, asphyxia, hemorrhage and perforation. Esophageal obstruction was disappeared after treatment, X-ray findings showed a smooth esophagus. Average operation time and time of RFCA were respectively 58 minutes (range, 20-71 minutes) and 23 minutes (range, 8-42 minutes). Patients took liquid food at postoperative day 2 and normal food at postoperative day 3, without the sensations of esophageal obstruction. Of 52 patients, 1 with postoperative hypotension returned to normal level through rehydration and increasing blood volume. Five patients with postoperative substernal pain were improved after 2-day symptomatic treatment. And other 46 patients didn′t have postoperative complications. Average duration of postoperative hospital stay was 3 days (range, 1-5 days). (2) Follow-up: 52 patients were followed up for 3-24 months, with a median time of 13 months. Of 52 patients, 17 underwent single intravascular interventional therapy, 15 underwent intravascular interventional therapy combined with single systemic chemotherapy, 14 underwent single systemic chemotherapy and other 6 didn′t undergo antineoplastic therapy. During the follow-up, 9 patients didn′t have esophageal obstruction and 26 were complicated with esophageal obstruction again. Esophageal obstruction of 26 patients was respectively occurred at 3-8 months postoperatively, 20 patients were improved after bipolar transluminal RFCA under dual-channel endoscopy and X-ray and 6 received parenteral nutrition support therapy due to extreme exhaustion. Seventeen patients died of cachexia caused by terminal malignant tumors. Conclusion Transluminal RFCA is safe and effective for malignant esophageal obstruction, with a good short-term outcome. Key words: Esophageal neoplasms; Obstruction, malignant; Radiofrequency catheter ablation, transluminal

  • Research Article
  • 10.3760/cma.j.issn.1007-631x.2018.04.016
Effects of proximal gastric electrical stimulation on feeding behavior and gastrointestinal function in rats
  • Apr 25, 2018
  • Chao Zhang + 8 more

Objective To observe the effects of proximal gastric electrical stimulation (GES) on body weight and gastrointestinal motility in SD rats, and investigate the regulation of gastric nerve stimulation and serum gastrointestinal hormones by neuro-humoral regulation. Methods 12 SD rats were divided into experimental group (n=6) and control group (n=6), with gastric electrical stimulator implanted, and in experimental group dual-channel GES was activated. General status was observed for 4 weeks after GES activation, including body weight, feeding and water intake, urine and stool volumes, the resting gastric volume and gastric emptying were monitored via the establishment of intestinal fistula, and serum gastrointestinal hormones change was detected. Results During 4-week GES process, one rat had gastric retention and died at 1 week after GES activated. Compared with the control group, body weight, food intake, urine and stool volumes levels of the rats in experimental group decreased significantly (t=4.005, 2.530, 3.350, all P<0.05). Resting gastric volume was significantly lower than that in the control group [(2.93±0.50)ml vs.(5.10±0.53)ml, Z=2.460, P=0.014], and the intestinal juice drainage was lower than the control group [(0.18±0.15)ml vs.(0.44±0.05)ml, Z=2.513, P=0.012], while serum GLP-1 levels were similar between the two groups [(0.44±0.05)ml vs.(0.18±0.15)ml, Z=1.026, P=0.305], but Ghrelin was significantly higher than that in the control group [(1.65±0.58) vs. (0.65±0.36), Z=2.380, P=0.017]. Conclusion The proximal GES may lead to the change of the body weight, food intake, gastrointestinal function and motility, possibly by stimulating nerve reflex inducing gastrointestinal hormones secretion and affect gastrointestinal function. Key words: Electrical stimulation; Gastrointestinal hormones; Gastric emptying

More from: Proceedings of the ACM on Software Engineering
  • Research Article
  • 10.1145/3728885
LLM4SZZ: Enhancing SZZ Algorithm with Context-Enhanced Assessment on Large Language Models
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Lingxiao Tang + 4 more

  • Research Article
  • 10.1145/3728945
Identifying Multi-parameter Constraint Errors in Python Data Science Library API Documentation
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Xiufeng Xu + 5 more

  • Research Article
  • 10.1145/3728944
PatchScope: LLM-Enhanced Fine-Grained Stable Patch Classification for Linux Kernel
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Rongkai Liu + 8 more

  • Research Article
  • 10.1145/3728909
GUIPilot: A Consistency-Based Mobile GUI Testing Approach for Detecting Application-Specific Bugs
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Ruofan Liu + 6 more

  • Research Article
  • 10.1145/3728974
Type-Alias Analysis: Enabling LLVM IR with Accurate Types
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Jinmeng Zhou + 5 more

  • Research Article
  • 10.1145/3728929
Adding Spatial Memory Safety to EDK II through Checked C (Experience Paper)
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Sourag Cherupattamoolayil + 3 more

  • Research Article
  • 10.1145/3728959
Dynamically Fusing Python HPC Kernels
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Nader Al Awar + 4 more

  • Research Article
  • 10.1145/3728949
Enhanced Prompting Framework for Code Summarization with Large Language Models
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Minying Fang + 5 more

  • Research Article
  • 10.1145/3728962
Uncovering API-Scope Misalignment in the App-in-App Ecosystem
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Jiarui Che + 9 more

  • Research Article
  • 10.1145/3728952
DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction
  • Jun 22, 2025
  • Proceedings of the ACM on Software Engineering
  • Yuan Xiao + 9 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon