Searched for: +
(1 - 20 of 38)

Pages

document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
Ghavamipour, Ali Reza (author), Turkmen, Fatih (author), Wang, Rui (author), Liang, K. (author)
Synthetic data generation plays a crucial role in many areas where data is scarce and privacy/confidentiality is a significant concern. Generative Adversarial Networks (GANs), arguably one of the most widely used data synthesis techniques, allow for the training of a model (i.e., generator) that can generate real-looking data by playing a min...
conference paper 2023
document
Yu, Fuyang (author), Wang, Zhen (author), Li, Dongyuan (author), Zhu, P. (author), Liang, Xiaohui (author), Wang, Xiaochuan (author), Okumura, Manabu (author)
Cross-modal retrieval, as an important emerging foundational information retrieval task, benefits from recent advances in multimodal technologies. However, current cross-modal retrieval methods mainly focus on the interaction between textual information and 2D images, lacking research on 3D data, especially point clouds at scene level,...
conference paper 2024
document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...
conference paper 2022
document
He, Xiaoxi (author), Cheng, Haibo (author), Xie, Jiahong (author), Wang, Ping (author), Liang, K. (author)
Passwords have been widely used in online authentication, and they form the front line that protects our data security and privacy. But the security of password may be easily harmed by insecure password generator. Massive reports state that users are always keen to generate new passwords by reusing or fine-tuning old secrets. Once an old...
conference paper 2022
document
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....
conference paper 2023
document
Liang, Yansong (author), Wang, Ruizhi (author), Chen, Zhongsheng (author), Du, S. (author)
This paper presents a boost converter for thermo-electric energy harvesting with photovoltaic (PV)-assisted startup. The converter employs a new two-phase startup architecture and the PV cell is used in the first phase to provide an initial high voltage for startup. This high voltage drives the boost converter to charge a startup capacitor,...
conference paper 2022
document
Wang, Ruizhi (author), Liang, Yansong (author), Du, S. (author)
An ultra-low-startup-voltage thermoelectric energy harvesting system assisted by a piezoelectric generator (PEG) is presented in this paper. When the energy harvesting system is implemented in a place where there is mechanical vibration, the associated PEG can generate a stable clock signal and drive the boost converter to start from the cold...
conference paper 2022
document
Liang, Y. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
In emerging fast-charging stations, DC fast chargers (DCFCs) are employed which rely on power electronics and control to achieve the required performance. Harmonic emission induced by the complex system behavior is of great concern in the DCFC system. This paper proposes a harmonic emission model for the typical electric vehicle charger...
conference paper 2022
document
Xu, J. (author), Wang, R. (author), Koffas, S. (author), Liang, K. (author), Picek, S. (author)
Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to...
conference paper 2022
document
Tjiam, Kevin (author), Wang, R. (author), Chen, H. (author), Liang, K. (author)
Smart contracts on Ethereum enable billions of dollars to be transacted in a decentralized, transparent and trustless environment. However, adversaries lie await in the Dark Forest, waiting to exploit any and all smart contract vulnerabilities in order to extract profits from unsuspecting victims in this new financial system. As the...
conference paper 2021
document
Li, Hai-Tao (author), Wang, Qi-bin (author), Zong, Zhi (author), Sun, Lei (author), Liang, Hui (author)
journal article 2014
document
Xu, Peng (author), Susilo, Willy (author), Wang, Wei (author), Chen, Tianyang (author), Wu, Qianhong (author), Liang, K. (author), Jin, Hai (author)
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it...
journal article 2022
document
Liang, Danni (author), de Jong, Martin (author), Schraven, D.F.J. (author), Wang, Lili (author)
Many local governments engaging in sustainable urban development also have a growing interest in becoming inclusive too, brand themselves as such and develop policies to become inclusive cities. However, knowing what exactly this entails and how it can be achieved is not always quite straightforward and requires thorough theoretical and...
journal article 2021
document
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...
journal article 2023
document
Ma, Yunjian (author), Liang, Hongjing (author), Zhao, Zexin (author), Wu, Bin (author), Lan, Dongming (author), Hollmann, F. (author), Wang, Yonghua (author)
Unspecific peroxygenases (UPOs, EC 1.11.2.1) are promising oxyfunctionalization catalysts because of their unique stereoselectivity. However, so far only a few UPOs have been reported. In this study, gene mining was used to identify a gene from Galerina marginata that coded for a novel UPO (GmaUPO). GmaUPO was expressed in Pichia pastoris X...
journal article 2022
document
Zhang, Jianguo (author), Jiang, Zaixing (author), Liang, Chao (author), Baars, T.F. (author), Wang, Y. (author), Abels, H.A. (author)
The middle Eocene Dongying sag in the Bohai Bay Basin of China has an estimated shale oil resource of approximately 1.1 billion t (8.06 billion bbl); flows of shale oil have been produced in the succession from tens of wells, where the daily production of a single well generally varies between 10 and 100 t (73.3–733 bbl). Therein, the mudrock...
journal article 2022
document
Ying, Chong (author), Cheng, Bin (author), Zhao, Youwei (author), Huang, He Liang (author), Zhang, Y.N. (author), Gong, Ming (author), Wu, Yulin (author), Wang, S. (author), Liang, Futian (author)
Although near-term quantum computing devices are still limited by the quantity and quality of qubits in the so-called NISQ era, quantum computational advantage has been experimentally demonstrated. Moreover, hybrid architectures of quantum and classical computing have become the main paradigm for exhibiting NISQ applications, where low-depth...
journal article 2023
Searched for: +
(1 - 20 of 38)

Pages