Searched for: +
(81 - 100 of 185)

Pages

document
Zhao, Yi (author), Liang, K. (author), Zhao, Yanqi (author), Yang, Bo (author), Ming, Yang (author), Panaousis, Emmanouil (author)
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting the original implementation. An ASA succeeds when it extracts secrets without being detected. To launch an ASA on signature schemes, existing studies often needed to collect signatures with successive indices to extract the signing key....
journal article 2022
document
Liang, Jianwen (author), van der Maas, E.L. (author), Luo, Jing (author), Li, Xiaona (author), Chen, Ning (author), Adair, Keegan R. (author), Li, Weihan (author), Li, Junjie (author), Hu, Yongfeng (author), Liu, Jue (author), Zhang, Li (author), Zhao, W. (author), Parnell, S.R. (author), Ganapathy, S. (author), Wagemaker, M. (author)
Understanding the relationship between structure, ionic conductivity, and synthesis is the key to the development of superionic conductors. Here, a series of Li<sub>3-3</sub><sub>x</sub>M<sub>1+</sub><sub>x</sub>Cl<sub>6</sub> (−0.14 &lt; x ≤ 0.5, M = Tb, Dy, Ho, Y, Er, Tm) solid electrolytes with orthorhombic and trigonal structures are...
journal article 2022
document
Ning, Jianting (author), Huang, Xinyi (author), Susilo, Willy (author), Liang, K. (author), Liu, Ximeng (author), Zhang, Yinghui (author)
Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service...
journal article 2022
document
Wen, Donghao (author), Li, Quanfeng (author), Ou, Yiyi (author), Yang, Yunlin (author), Qi, Zeming (author), Dorenbos, P. (author), Liang, Hongbin (author)
Ce<sup>3+</sup> and Eu<sup>2+</sup> doped and Ce<sup>3+</sup>-Eu<sup>2+</sup> co-doped Sr<sub>2</sub>MgSi<sub>2</sub>O<sub>7</sub> phosphors are prepared via a high-temperature solid-state reaction technique. The synchrotron radiation vacuum ultraviolet-ultraviolet (VUV-UV) excitation and ultraviolet-visible (UV-vis) emission spectra of...
journal article 2022
document
Chen, Jiazhou (author), Xu, Yanghui (author), Lu, Shufang (author), Liang, Ronghua (author), Nan, L. (author)
We present a novel 3-D instance segmentation framework for multiview stereo (MVS) buildings in urban scenes. Unlike existing works focusing on semantic segmentation of urban scenes, the emphasis of this work lies in detecting and segmenting 3-D building instances even if they are attached and embedded in a large and imprecise 3-D surface model....
journal article 2022
document
Shao, Pengfei (author), Ma, C. (author), Han, Daoyang (author), Liu, Kun (author), Li, Mingliang (author), Liang, Yi (author), Yao, Meng (author), Wang, Hailong (author), Zhang, Rui (author), Shao, Gang (author)
Temperature sensors that can operate in high-temperature and harsh environments are highly desired. However, this is a great challenge for sensing materials to operate under extreme working conditions because of oxidation and/or corrosion at high temperature. In this study, polymer-derived SiAlCN ceramics were prepared as sensing materials to...
journal article 2022
document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
Liang, M. (author), Chang, Z. (author), Wan, Z. (author), Gan, Y. (author), Schlangen, E. (author), Šavija, B. (author)
This study aims to provide an efficient and accurate machine learning (ML) approach for predicting the creep behavior of concrete. Three ensemble machine learning (EML) models are selected in this study: Random Forest (RF), Extreme Gradient Boosting Machine (XGBoost) and Light Gradient Boosting Machine (LGBM). Firstly, the creep data in...
journal article 2022
document
Liang, M. (author), Gan, Y. (author), Chang, Z. (author), Wan, Z. (author), Schlangen, E. (author), Šavija, B. (author)
This study aims to provide an efficient alternative for predicting creep modulus of cement paste based on Deep Convolutional Neural Network (DCNN). First, a microscale lattice model for short-term creep is adopted to build a database that contains 18,920 samples. Then, 3 DCNNs with different consecutive convolutional layers are built to learn...
journal article 2022
document
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)
Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...
journal article 2022
document
Chang, Z. (author), Zhang, Hongzhi (author), Liang, M. (author), Schlangen, E. (author), Šavija, B. (author)
This paper explores buildability quantification of randomly meshed 3D printed concrete objects by considering structural failure by elastic buckling. The newly proposed model considers the most relevant printing parameters, including time-dependent material behaviors, printing velocity, localized damage and influence of sequential printing...
journal article 2022
document
Xu, J. (author), Wang, R. (author), Koffas, S. (author), Liang, K. (author), Picek, S. (author)
Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to...
conference paper 2022
document
Liang, M. (author), Li, Z. (author), He, S. (author), Chang, Z. (author), Gan, Y. (author), Schlangen, E. (author), Šavija, B. (author)
Stress evolution of restrained concrete is a significant direct index in early-age cracking (EAC) analysis of concrete. This study presents experiments and numerical modelling of the early-age stress evolution of Ground granulated blast furnace slag (GGBFS) concrete, considering the development of autogenous deformation and creep. Temperature...
journal article 2022
document
Liang, Peijie (author), Pan, Zhiliang (author), Tang, Liang (author), Zhang, Kouchi (author), Yang, Daoguo (author), He, Siliang (author), Yan, Haidong (author)
Based on molecular dynamics (MD), in this study, a model was established to simulate the initial coating morphology of silver paste by using a random algorithm, and the effects of different sizes of particles on sintering porosity were also analyzed. The MD result reveals that compared with the sintering process using large-scale silver...
journal article 2022
document
Chen, H. (author), Fu, S. (author), Liang, K. (author)
Updatable encryption (UE) enables the cloud server to update the previously sourced encrypted data to a new key with only an update token received from the client. Two interesting works have been proposed to clarify the relationships among various UE security notions. Jiang (ASIACRYPT 2020) proved the equivalence of every security notion in...
conference paper 2022
document
Lambregts, Steven (author), Chen, H. (author), Ning, Jianting (author), Liang, K. (author)
Searchable Encryption schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access and volume pattern. In most existing SE schemes, these leakages are caused by practical designs but are considered an acceptable price to achieve high search...
conference paper 2022
document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Schlangen, E. (author), Liang, M. (author), Šavija, B. (author)
The study aims to investigate the mechanism of early-age cracks in different massive concrete structures (i.e. tunnels, bridge foundations and underground parking garages), with the objective of answering the following three specific questions: <br/><br/>1) How does the parameters of concrete proportion mix (e.g. w/c ratio, cementitious...
book chapter 2022
document
He, Xiaoxi (author), Cheng, Haibo (author), Xie, Jiahong (author), Wang, Ping (author), Liang, K. (author)
Passwords have been widely used in online authentication, and they form the front line that protects our data security and privacy. But the security of password may be easily harmed by insecure password generator. Massive reports state that users are always keen to generate new passwords by reusing or fine-tuning old secrets. Once an old...
conference paper 2022
Searched for: +
(81 - 100 of 185)

Pages