DeCoMa: Detecting and Purifying Code Dataset Watermarks through Dual Channel Code Abstraction
Watermarking is a technique to help identify the source of data points, which can be used to help prevent the misuse of protected datasets. Existing methods on code watermarking, leveraging the idea from the backdoor research, embed stealthy triggers as watermarks. Despite their high resilience against dilution attacks and backdoor detections, the robustness has not been fully evaluated. To fill this gap, we propose DeCoMa , a dual-channel approach to De tect and purify Co de dataset water Ma rks. To overcome the high barrier created by the stealthy and hidden nature of code watermarks, DeCoMa leverages dual-channel constraints on code to generalize and map code samples into standardized templates. Subsequently, DeCoMa extracts hidden watermarks by identifying outlier associations between paired elements within the standardized templates. Finally, DeCoMa purifies the watermarked dataset by removing all samples containing the detected watermark, enabling the silent appropriation of protected code. We conduct extensive experiments to evaluate the effectiveness and efficiency of DeCoMa, covering 14 types of code watermarks and 3 representative intelligent code tasks (a total of 14 scenarios). Experimental results demonstrate that DeCoMa achieves a stable recall of 100% in 14 code watermark detection scenarios, significantly outperforming the baselines. Additionally, DeCoMa effectively attacks code watermarks with embedding rates as low as 0.1%, while maintaining comparable model performance after training on the purified dataset. Furthermore, as DeCoMa requires no model training for detection, it achieves substantially higher efficiency than all baselines, with a speedup ranging from 31.5 to 130.9×. The results call for more advanced watermarking techniques for code models, while DeCoMa can serve as a baseline for future evaluation.
40
- 10.1016/j.jss.2022.111304
- Mar 26, 2022
- Journal of Systems and Software
6
- 10.1007/978-3-319-64861-3_81
- Aug 31, 2017
338
- 10.1145/292540.292569
- Jan 1, 1999
76
- 10.1007/11427995_42
- Jan 1, 2005
34
- 10.4324/9781315009421
- Nov 5, 2013
339
- 10.48550/arxiv.2307.09288
- Jul 18, 2023
3123
- 10.1080/00401706.1969.10490657
- Feb 1, 1969
- Technometrics
574
- 10.3758/s13423-014-0585-6
- Mar 25, 2014
- Psychonomic Bulletin & Review
3
- 10.1145/3674399.3674447
- Jul 5, 2024
1560
- 10.1080/01621459.1993.10476408
- Dec 1, 1993
- Journal of the American Statistical Association
- Research Article
- 10.3760/cma.j.issn.1009-9158.2013.01.016
- Jan 11, 2013
- Chinese Journal of Laboratory Medicine
Objective Based on dual channel melting curve analysis-based assay,we developed a method to rapidly detect the drug-resistant mutations in Mycobacterium tuberculosis through real-time PCR. Methods According to the common first-line drug-resistant mutations of Mycobacterium tuberculosis,we designed six dual-labeled fluorescence probes to rapidly detect the drug-resistant mutations through real-time PCR melting curve after amplifications of drug-resistant related gene region of DNA.The targets include rpoB 81 bp core region,katG315,inh A promoter,ahpC promoter and embB306.To validate the sensitivity and specificity of our method,we performed real-time PCR assays to detect drug-resistant mutations in 76 clinical MDR-TB samples,which were collected by Shanghai CDC in 2008. Results In the validation,this method successfully detected drug-resistant mutations in all 76 clinical MDR-TB samples.The ΔTmof mutations were from 1.8 to 14.4℃.Comparing with the sequencing data,all mutations covered by the six probes were detected with 100% sensitivity and 100% specificity (rpoB,80/80;inh A,7/7; katG315,59/59; ahpC,8/8; embB306,27/27).This method can successfully detect drug-resistant mutations from 100 copies/μl DNA samples. Conclusions A widely applicable real-time PCR assay to detect first line drug-resistant mutations of Mycobacterium tuberculosis has benn developed.This method has proven to have the advantages of high sensitivity,specificity and low risk of contamination.It can be used in rapid diagnosis of clinical drug-resistant tuberculosis and the evaluation of laboratory drug sensitivity test.(Chin J Lab Med,2013,36:63-67) Key words: Real-time polymerase chain reaction; Mycobacterium tuberculosis; Mutation
- Conference Article
2
- 10.1109/hicss.2008.394
- Jan 1, 2008
In this paper we use a simulation model to extend previous analytical research on a firm selling consumer goods online using posted price and auction at the same time. With the simulation we investigate three selling regimes: dual channel with sealed-bid auction; dual channel with open-bid auction, and a single channel with only posted price. We examine how the auction format affects the optimal design of the dual-channel, its performance relative to the single channel, and the sales in each channel. We find that in 81% of the cases we examine, the design that maximizes the average revenue from a dual channel with open-bid auction is the same as the design that maximizes the average revenue from a dual channel with sealed-bid auction. Also, the dual/open regime usually outperforms the dual/sealed regime, and both dual channel regimes outperform the single channel.
- Conference Article
- 10.1117/12.676479
- Feb 13, 2006
A portable liquid sensing system based on a dual-channel and concave-shape optical coupling sensor array is developed for in-situ quantitative measurement of a liquid sample. The liquid sensing cell is specially designed by Multigassensors GmbH. In the cell, three light emitting and sensitive units with different light wavelength are integrated in a SiO<sub>2</sub> base. Each unit is composed of one light-emitting diode and two light-sensitive diodes. The cell is a concave-shape with a dual optical channel. The portable liquid sensing system is constructed by the sensing cell and peripheral devices which achieve functions of data acquisition, signal processing and mode identification. With different light absorption property for particular light wave, the tested liquid sample with different components and contents will produce special light response mode. Using the advanced sensor array signal processing algorithm and mode identification method, quantitative liquid measurement can be achieved in-situ by the portable system. The pH measurement for abromcresol green liquid sample is made using the present system and is compared with the result from a spectrometer. The accordant values from these two different devices demonstrate the feasibility of the novel liquid detection method and validity of the developed sensing system.
- Research Article
20
- 10.1109/tit.2017.2754921
- Jan 1, 2018
- IEEE Transactions on Information Theory
For any given channel $W$ with classical inputs and possibly quantum outputs, a dual classical-input channel $W^\perp$ can be defined by embedding the original into a channel $\mathcal N$ with quantum inputs and outputs. Here we give new uncertainty relations for a general class of entropies that lead to very close relationships between the original channel and its dual. Moreover, we show that channel duality can be combined with duality of linear codes, whereupon the uncertainty relations imply that the performance of a given code over a given channel is entirely characterized by the performance of the dual code on the dual channel. This has several applications. In the context of polar codes, it implies that the rates of polarization to ideal and useless channels must be identical. Duality also relates the tasks of channel coding and privacy amplification, implying that the finite blocklength performance of extractors and codes is precisely linked, and that optimal rate extractors can be transformed into capacity-achieving codes, and vice versa. Finally, duality also extends to the EXIT function of any channel and code. Here it implies that for any channel family, if the EXIT function for a fixed code has a sharp transition, then it must be such that the rate of the code equals the capacity at the transition. This may give a different route to proving a code family achieves capacity by establishing sharp EXIT function transitions.
- Conference Article
3
- 10.1109/isit.2017.8006598
- Jun 1, 2017
For any given channel W with classical inputs and possibly quantum outputs, a dual classical-input channel W⊥ can be defined by embedding the original into a channel N with quantum inputs and outputs. Here we give new uncertainty relations for a general class of entropies that lead to very close relationships between the original channel and its dual. Moreover, we show that channel duality can be combined with duality of linear codes, whereupon the uncertainty relations imply that the performance of a given code over a given channel is entirely characterized by the performance of the dual code on the dual channel. This has several applications. In the context of polar codes, it implies that the rates of polarization to ideal and useless channels must be identical. Duality also relates the tasks of channel coding and privacy amplification, implying that the finite blocklength performance of extractors and codes is precisely linked, and that optimal rate extractors can be transformed into capacity-achieving codes, and vice versa. Finally, duality also extends to the EXIT function of any channel and code. Here it implies that for any channel family, if the EXIT function for a fixed code has a sharp transition, then it must be such that the rate of the code equals the capacity at the transition. This may give a different route to proving a code family achieves capacity by establishing EXIT function transitions.
- Research Article
- 10.1089/end.2013.1602
- Nov 1, 2013
- Journal of Endourology
Abstracts from the 28th Annual Meeting of the Engineering and Urology SocietyMay 4, 2013San Diego, CA
- Dissertation
- 10.17635/lancaster/thesis/150
- Jan 1, 2017
Cloud computing is a relatively recent model where scalable and elastic resources are provided as optimized, cost-effective and on-demand utility-like services to customers. As one of the major trends in the IT industry in recent years, cloud computing has gained momentum and started to revolutionise the way enterprises create and deliver IT solutions. Motivated primarily due to cost reduction, these cloud environments are also being used by Information and Communication Technologies (ICT) operating Critical Infrastructures (CI). However, due to the complex nature of underlying infrastructures, these environments are subject to a large number of challenges, including mis-configurations, cyber attacks and malware instances, which manifest themselves as anomalies. These challenges clearly reduce the overall reliability and availability of the cloud, i.e., it is less resilient to challenges. Resilience is intended to be a fundamental property of cloud service provisioning platforms. However, a number of significant challenges in the past demonstrated that cloud environments are not as resilient as one would hope. There is also limited understanding about how to provide resilience in the cloud that can address such challenges. This implies that it is of utmost importance to clearly understand and define what constitutes the correct, normal behaviour so that deviation from it can be detected as anomalies and consequently higher resilience can be achieved. Also, for characterising and identifying challenges, anomaly detection techniques can be used and this is due to the fact that the statistical models embodied in these techniques allow the robust characterisation of normal behaviour, taking into account various monitoring metrics to detect known and unknown patterns. These anomaly detection techniques can also be applied within a resilience framework in order to promptly provide indications and warnings about adverse events or conditions that may occur. However, due to the scale and complexity of cloud, detection based on continuous real time infrastructure monitoring becomes challenging. Because monitoring leads to an overwhelming volume of data, this adversely affects the ability of the underlying detection mechanisms to analyse the data. The increasing volume of metrics, compounded with complexity of infrastructure, may also cause low detection accuracy. In this thesis, a comprehensive evaluation of anomaly detection techniques in cloud infrastructures is presented under typical elastic behaviour. More specifically, an investigation of the impact of live virtual machine migration on state of the art anomaly detection techniques is carried out, by evaluating live migration under various attack types and intensities. An initial comparison concludes that, whilst many detection techniques have been proposed, none of them is suited to work within a cloud operational context. The results suggest that in some configurations anomalies are missed and some configuration anomalies are wrongly classified. Moreover, some of these approaches have been shown to be sensitive to parameters of the datasets such as the level of traffic aggregation, and they suffer from other robustness problems. In general, anomaly detection techniques are founded on specific assumptions about the data, for example the statistical distributions of events. If these assumptions do not hold, an outcome can be high false positive rates. Based on this initial study, the objective of this work is to establish a light-weight real time anomaly detection technique which is more suited to a cloud operational context by keeping low false positive rates without the need for prior knowledge and thus enabling the administrator to respond to threats effectively. Furthermore, a technique is needed which is robust to the properties of cloud infrastructures, such as elasticity and limited knowledge of the services, and such that it can support other resilience supporting mechanisms. From this formulation, a cloud resilience management framework is proposed which incorporates the anomaly detection and other supporting mechanisms that collectively address challenges that manifest themselves as anomalies. The framework is a holistic endto-end framework for resilience that considers both networking and system issues, and spans the various stages of an existing resilience strategy, called (D2R 2+DR). In regards to the operational applicability of detection mechanisms, a novel Anomaly Detection-as-a-Service (ADaaS) architecture has been modelled as the means to implement the detection technique. A series of experiments was conducted to assess the effectiveness of the proposed technique for ADaaS. These aimed to improve the viability of implementing the system in an operational context. Finally, the proposed model is deployed in a European Critical Infrastructure provider’s network running various critical services, and validated the results in real time scenarios with the use of various test cases, and finally demonstrating the advantages of such a model in an operational context. The obtained results show that anomalies are detectable with high accuracy with no prior-knowledge, and it can be concluded that ADaaS is applicable to cloud scenarios for a flexible multi-tenant detection systems, clearly establishing its effectiveness for cloud infrastructure resilience.
- Research Article
- 10.5075/epfl-thesis-2177
- Jan 1, 2000
In this work novel concepts for the realization of miniature integrated optical sensor systems are presented. An important aspect for all realized approaches was their suitability for the use of disposable sensor chips. This is essential, especially for applications in the medical, food and environmental field. A robust sensor system with the inherent feature to compensate for disturbances originating from different kinds of mechanical instabilities is presented. It is based on a symmetric grating coupler structure, does not require any moving parts and provides the high sensitivity typical for integrated optical sensors based on grating couplers. The feasibility of this approach is demonstrated by determining the refractive index of liquids as well as by measuring the specific binding of bio-molecules (anti-chicken IgG) to immobilized chicken IgG on the sensor chip surface. A further approach for the realization of a refractometric integrated optical sensor system is presented featuring a high-resolution window which can be positioned within a wide measuring range. It also includes an in-situ verification procedure for disposable sensor chips. This realized sensor platform is suited for a large variety of current and future (bio-) chemical applications. As application examples, experimental results on refractometric measurements as well as on the suppression of non-specific binding are given. The realization of a hand-held, miniature integrated optical sensor system for versatile multi-channel applications is also described. Wavelength modulation techniques using vertical cavity surface emitting lasers (VCSELs) are used to interrogate multiple waveguide sensing regions on a single integrated optical chip for accurately measuring effective refractive index changes at a high data rate. With the experimental miniature compact dual-channel sensor module, a resolution of ΔNPP = 10-7 (short-term, peak-peak) for the effective refractive index was demonstrated. In terms of surface mass coverage, this resolution corresponds to ΔΓPP = 130 fg / mm2.
- Research Article
48
- 10.1016/j.asoc.2023.110689
- Aug 5, 2023
- Applied Soft Computing
LAnoBERT: System log anomaly detection based on BERT masked language model
- Conference Article
- 10.1109/iespc.2019.8902397
- Mar 1, 2019
In Wireless Communications, Cognitive radio (CR) emerges as a boon to the mankind as it reduces the spectrum scarcity problem. Spectrum Sensing, the method to detect the presence or absence of licensed user is the fundamental problem of this system. This method employs different detection techniques in order to sense the radio environment simultaneously without interfering with the primary users. Energy Detection is the most popular among all the detection technique because of its low computational cost, easy implementation and less complexity. This technique is the most suitable for any environment since it does not require any knowledge of the primary user. In this paper, an analytical expression is derived for the corresponding average probability of detection over dual correlated Nakagami-m fading channel. The results suggest that the detection probability highly depends upon the severity of fading. This analytical expression is then verified using Monte Carlo simulation.
- Research Article
- 10.6138/jit.2012.13.2.05
- Mar 1, 2012
- Journal of Internet Technology
It is necessary to have security for Wireless Sensor Networks (WSNs), which must be able to establish secure node to node communication. Sensor nodes should not have any a priori knowledge of which nodes will be close enough to be in their transmission range. And it is very likely that the topology of the network changes very frequently. Also a unicast based rekeying does not satisfy the security requirements of periodic rekeying for WSNs. Therefore, we propose a key management scheme for security and effective energy in WSNs. Using an allocation of a location based group key for secure group communication, the proposed scheme provides the revocation of compromised nodes and energy efficient rekeying. We address the main function using a broadcast based rekeying for low energy key management and high resilience. Also, we analyze the efficiency of our proposed scheme mathematically. We show that our proposed scheme performs better than other protocols, especially when the large scaled distributed sensor networks.
- Research Article
2
- 10.5555/1455946.1455959
- Apr 1, 2008
- WSEAS TRANSACTIONS on COMMUNICATIONS archive
Dual codes play an important role in the field of error detecting codes on a binary symmetric channel. Via the MacWilliams Identities they can be used to calculate the original code's weight distribution and its probability of undetected error. Moreover, knowledge of the minimum distance of the dual code provides insight in the properties of the weights of a code. In this paper firstly the order of growth of the dual distance of a CRC as a function of the block length n is investigated, and a new lower bound is proven. Then this bound is used to derive a weaker version of the 2-r-bound on the probability of undetected error, and the relationship of this bound to the 2-r-bound is discussed. Estimates of the range of binomiality and the covering radius are given, depending only on the code rate R and the degree r of the generating polynomial of the CRC. In the case of a CRC, two results of Tietavainen are improved. Furthermore, wit is shown that there is binomial behavior of the weight distribution, if only n is large enough. Then, by means of an estimate of the tail of the binomial, another bound on the probability of undetected error is verified. Finally a new version of Sidel'nikov's theorem on the normality of the cumulative distribution function of the weights of a code is presented, where the dual distance is replaced by an expression depending on n and the degree r. In this way the conclusions of the present paper may attribute a new meaning to some well known results about codes with known dual distance and give some new insight in this kind of problems.
- Research Article
1
- 10.11873/j.issn.1004-0323.2007.3.403
- Jan 1, 2007
- Remote Sensing Technology and Application
In this study,based on analyzing the characteristic of the hot spot spectral radiance using related MODIS bands data,a new model named Normalized Difference Thermal Index(NDTI) was developed for the fire detection and monitoring.The algorithm of this model was discussed and given in details.Further well,the NDTI model was validated through a day fire case and a night fire case occurred in Heyuan China.Like NDVI,This dual-channel ratio index has the advantages that could attenuate conventional equipment noise and atmospheric effects.Research shows that the combination of fire radiation Channel 4 μm and 11 μm background components highlight the fire spots information access,by choose an appropriate NDTI threshold,the fire pixels could be accurately detected,the recognition rate can reach 93%.The NDTI may be widely used on sensor of the EOS-MODIS,NOAAAVHRR,GOES-VAS,future NPP-VIIRS,future Chinese FY3 and more.
- Research Article
- 10.3760/cma.j.issn.1673-9752.2017.03.014
- Mar 20, 2017
- Chinese Journal of Digestive Surgery
Objective To investigate the clinical value of the transluminal radiofrequency catheter ablation (RFCA) for malignant esophageal obstruction. Methods The retrospective cross-sectional descriptive study was conducted. The clinicopathological data of 52 patients with malignant esophageal obstruction who underwent transluminal RFCA at the Affiliated Hospital of Shandong Academy of Medical Science between March 2013 and March 2016 were collected. Patients received the bipolar radiofrequency ablation (RFA) under dual-channel endoscopy and X-ray. Observation indicators: (1) intra- and post-operative situations: operation situations, operation time, time of RFA, postoperative complications and duration of postoperative hospital stay, (2) follow-up. Follow-up using outpatient examination and telephone interview was performed to detect the subsequent treatment, survival of patients and recurrence of esophageal obstruction up to June 2016. Measurement data with normal distribution were represented as average (range). Results (1) Intra- and post-operative situations: 52 patients underwent successful RFCA, without the occurrence of aspiration, asphyxia, hemorrhage and perforation. Esophageal obstruction was disappeared after treatment, X-ray findings showed a smooth esophagus. Average operation time and time of RFCA were respectively 58 minutes (range, 20-71 minutes) and 23 minutes (range, 8-42 minutes). Patients took liquid food at postoperative day 2 and normal food at postoperative day 3, without the sensations of esophageal obstruction. Of 52 patients, 1 with postoperative hypotension returned to normal level through rehydration and increasing blood volume. Five patients with postoperative substernal pain were improved after 2-day symptomatic treatment. And other 46 patients didn′t have postoperative complications. Average duration of postoperative hospital stay was 3 days (range, 1-5 days). (2) Follow-up: 52 patients were followed up for 3-24 months, with a median time of 13 months. Of 52 patients, 17 underwent single intravascular interventional therapy, 15 underwent intravascular interventional therapy combined with single systemic chemotherapy, 14 underwent single systemic chemotherapy and other 6 didn′t undergo antineoplastic therapy. During the follow-up, 9 patients didn′t have esophageal obstruction and 26 were complicated with esophageal obstruction again. Esophageal obstruction of 26 patients was respectively occurred at 3-8 months postoperatively, 20 patients were improved after bipolar transluminal RFCA under dual-channel endoscopy and X-ray and 6 received parenteral nutrition support therapy due to extreme exhaustion. Seventeen patients died of cachexia caused by terminal malignant tumors. Conclusion Transluminal RFCA is safe and effective for malignant esophageal obstruction, with a good short-term outcome. Key words: Esophageal neoplasms; Obstruction, malignant; Radiofrequency catheter ablation, transluminal
- Research Article
- 10.3760/cma.j.issn.1007-631x.2018.04.016
- Apr 25, 2018
Objective To observe the effects of proximal gastric electrical stimulation (GES) on body weight and gastrointestinal motility in SD rats, and investigate the regulation of gastric nerve stimulation and serum gastrointestinal hormones by neuro-humoral regulation. Methods 12 SD rats were divided into experimental group (n=6) and control group (n=6), with gastric electrical stimulator implanted, and in experimental group dual-channel GES was activated. General status was observed for 4 weeks after GES activation, including body weight, feeding and water intake, urine and stool volumes, the resting gastric volume and gastric emptying were monitored via the establishment of intestinal fistula, and serum gastrointestinal hormones change was detected. Results During 4-week GES process, one rat had gastric retention and died at 1 week after GES activated. Compared with the control group, body weight, food intake, urine and stool volumes levels of the rats in experimental group decreased significantly (t=4.005, 2.530, 3.350, all P<0.05). Resting gastric volume was significantly lower than that in the control group [(2.93±0.50)ml vs.(5.10±0.53)ml, Z=2.460, P=0.014], and the intestinal juice drainage was lower than the control group [(0.18±0.15)ml vs.(0.44±0.05)ml, Z=2.513, P=0.012], while serum GLP-1 levels were similar between the two groups [(0.44±0.05)ml vs.(0.18±0.15)ml, Z=1.026, P=0.305], but Ghrelin was significantly higher than that in the control group [(1.65±0.58) vs. (0.65±0.36), Z=2.380, P=0.017]. Conclusion The proximal GES may lead to the change of the body weight, food intake, gastrointestinal function and motility, possibly by stimulating nerve reflex inducing gastrointestinal hormones secretion and affect gastrointestinal function. Key words: Electrical stimulation; Gastrointestinal hormones; Gastric emptying
- Research Article
- 10.1145/3728885
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728945
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728944
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728909
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728974
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728929
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728959
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728949
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728962
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Research Article
- 10.1145/3728952
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.