Searched for: +
(1 - 6 of 6)
document
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....
conference paper 2023
document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
He, Xiaoxi (author), Cheng, Haibo (author), Xie, Jiahong (author), Wang, Ping (author), Liang, K. (author)
Passwords have been widely used in online authentication, and they form the front line that protects our data security and privacy. But the security of password may be easily harmed by insecure password generator. Massive reports state that users are always keen to generate new passwords by reusing or fine-tuning old secrets. Once an old...
conference paper 2022
document
Li, Z. (author), Lin, Yunlong (author), Cheng, Gong (author), Wang, X. (author), Liu, Qi (author), Gong, Jianwei (author), Lu, Chao (author)
Precisely modeling interactions and accurately predicting trajectories of surrounding vehicles are essential to the decision-making and path-planning of intelligent vehicles. This paper proposes a novel framework based on ensemble learning to improve the performance of trajectory predictions in interactive scenarios. The framework is termed...
conference paper 2022
document
Cheng, Long (author), Wang, Ying (author), Pei, Yulong (author), Epema, D.H.J. (author)
Efficient execution of distributed database operators such as joining and aggregating is critical for the performance of big data analytics. With the increase of the compute speedup of modern CPUs, reducing the network<br/>communication time of these operators in large systems is becoming increasingly important, and also challenging current...
conference paper 2017
document
Menenti, M. (author), Li, X. (author), Wang, J. (author), Vereecken, H. (author), Li, J. (author), Mancini, M. (author), Liu, Q. (author), Jia, L. (author), Li, J. (author), Kuenzer, C. (author), Huang, S. (author), Yesou, H. (author), Wen, J. (author), Kerr, Y. (author), Cheng, X. (author), Gourmelen, N. (author), Ke, C. (author), Ludwig, R. (author), Lin, H. (author), Eineder, M. (author), Ma, Y. (author), Su, Z.B. (author)
Ten Dragon 3 projects deal with hydrologic and cryosphere processes, with a focus on the Himalayas and Qinghai – Tibet Plateau, but not limited to that. At the 1st Dragon 3 Progress Symposium in 2013 a significant potential for a better and deeper integration appeared very clearly and we worked out an overview of the ten projects identifying...
conference paper 2015
Searched for: +
(1 - 6 of 6)