- document
-
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....conference paper 2023
- document
-
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...journal article 2021
- document
-
Liu, Jikai (author), Gaynor, Andrew T. (author), Chen, Shikui (author), Kang, Zhan (author), Suresh, Krishnan (author), Takezawa, Akihiro (author), Li, Lei (author), Kato, Junji (author), Tang, Jinyuan (author), Wang, C.C. (author), Cheng, Lin (author), Liang, Xuan (author), To, Albert. C. (author)Manufacturing-oriented topology optimization has been extensively studied the past two decades, in particular for the conventional manufacturing methods, for example, machining and injection molding or casting. Both design and manufacturing engineers have benefited from these efforts because of the close-to-optimal and friendly-to-manufacture...journal article 2018