Searched for: +
(1 - 3 of 3)
document
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....
conference paper 2023
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Liu, Jikai (author), Gaynor, Andrew T. (author), Chen, Shikui (author), Kang, Zhan (author), Suresh, Krishnan (author), Takezawa, Akihiro (author), Li, Lei (author), Kato, Junji (author), Tang, Jinyuan (author), Wang, C.C. (author), Cheng, Lin (author), Liang, Xuan (author), To, Albert. C. (author)
Manufacturing-oriented topology optimization has been extensively studied the past two decades, in particular for the conventional manufacturing methods, for example, machining and injection molding or casting. Both design and manufacturing engineers have benefited from these efforts because of the close-to-optimal and friendly-to-manufacture...
journal article 2018