Searched for: +
(1 - 7 of 7)
document
Xu, Peng (author), Susilo, Willy (author), Wang, Wei (author), Chen, Tianyang (author), Wu, Qianhong (author), Liang, K. (author), Jin, Hai (author)
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it...
journal article 2022
document
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...
conference paper 2022
document
Liang, Yansong (author), Wang, Ruizhi (author), Chen, Zhongsheng (author), Du, S. (author)
This paper presents a boost converter for thermo-electric energy harvesting with photovoltaic (PV)-assisted startup. The converter employs a new two-phase startup architecture and the PV cell is used in the first phase to provide an initial high voltage for startup. This high voltage drives the boost converter to charge a startup capacitor,...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Tjiam, Kevin (author), Wang, R. (author), Chen, H. (author), Liang, K. (author)
Smart contracts on Ethereum enable billions of dollars to be transacted in a decentralized, transparent and trustless environment. However, adversaries lie await in the Dark Forest, waiting to exploit any and all smart contract vulnerabilities in order to extract profits from unsuspecting victims in this new financial system. As the...
conference paper 2021
document
Zhang, Weizhao (author), Bostanabad, Ramin (author), Liang, Biao (author), Su, Xuming (author), Zeng, Danielle (author), Bessa, M.A. (author), Wang, Yanchao (author), Chen, Wei (author), Cao, Jian (author)
Carbon fiber reinforced plastics (CFRPs) are attracting growing attention in industry because of their enhanced properties. Preforming of thermoset carbon fiber prepregs is one of the most common production techniques of CFRPs. To simulate preforming, several computational methods have been developed. Most of these methods, however, obtain...
journal article 2019
document
Liu, Jikai (author), Gaynor, Andrew T. (author), Chen, Shikui (author), Kang, Zhan (author), Suresh, Krishnan (author), Takezawa, Akihiro (author), Li, Lei (author), Kato, Junji (author), Tang, Jinyuan (author), Wang, C.C. (author), Cheng, Lin (author), Liang, Xuan (author), To, Albert. C. (author)
Manufacturing-oriented topology optimization has been extensively studied the past two decades, in particular for the conventional manufacturing methods, for example, machining and injection molding or casting. Both design and manufacturing engineers have benefited from these efforts because of the close-to-optimal and friendly-to-manufacture...
journal article 2018
Searched for: +
(1 - 7 of 7)