Searched for: +
(1 - 4 of 4)
document
Dong, Y. (author), Chen, Kejia (author), Ma, Zhiyuan (author)
Condition-based maintenance is becoming increasingly important in hydraulic systems. However, anomaly detection for these systems remains challenging, especially since that anomalous data is scarce and labeling such data is tedious and even dangerous. Therefore, it is advisable to make use of unsupervised or semi-supervised methods, especially...
conference paper 2023
document
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...
conference paper 2022
document
Dong, Y. (author), Chen, Kejia (author), Peng, Yinxuan (author), Ma, Zhiyuan (author)
As the central nerve of the intelligent vehicle control system, the in-vehicle network bus is crucial to the security of vehicle driving. One of the best standards for the in-vehicle network is the Controller Area Network (CAN bus) protocol. However, the CAN bus is designed to be vulnerable to various attacks due to its lack of security...
conference paper 2022
document
Jin, Peng (author), Wang, Ruixing (author), Zhang, Siyi (author), Dong, Hua (author), Chen, Chun (author)
Carbonation has been proven to be a promising way to improve the mechanism properties and durability of steel slag products. CA bacteria can promote the hydration of CO2. In this study, one kind of alkali-resistant CA bacteria was chosen to investigate its effects on the carbonation process of γ-C2S. Results showed that bacteria could increase...
conference paper 2021
Searched for: +
(1 - 4 of 4)