Searched for: +
(1 - 7 of 7)
document
Ying, Chong (author), Cheng, Bin (author), Zhao, Youwei (author), Huang, He Liang (author), Zhang, Y.N. (author), Gong, Ming (author), Wu, Yulin (author), Wang, S. (author), Liang, Futian (author)
Although near-term quantum computing devices are still limited by the quantity and quality of qubits in the so-called NISQ era, quantum computational advantage has been experimentally demonstrated. Moreover, hybrid architectures of quantum and classical computing have become the main paradigm for exhibiting NISQ applications, where low-depth...
journal article 2023
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Liang, M. (author), Chang, Z. (author), Zhang, Y. (author), Cheng, H. (author), He, S. (author), Schlangen, E. (author), Šavija, B. (author)
This study aims to experimentally investigate the autogenous deformation and the stress evolution in restrained high-volume ground granulated blast furnace slag (GGBFS) concrete. The Temperature Stress Testing Machine (TSTM) and Autogenous Deformation Testing Machine (ADTM) were used to study the macro-scale autogenous deformation and stress...
journal article 2023
document
Liu, Jikai (author), Gaynor, Andrew T. (author), Chen, Shikui (author), Kang, Zhan (author), Suresh, Krishnan (author), Takezawa, Akihiro (author), Li, Lei (author), Kato, Junji (author), Tang, Jinyuan (author), Wang, C.C. (author), Cheng, Lin (author), Liang, Xuan (author), To, Albert. C. (author)
Manufacturing-oriented topology optimization has been extensively studied the past two decades, in particular for the conventional manufacturing methods, for example, machining and injection molding or casting. Both design and manufacturing engineers have benefited from these efforts because of the close-to-optimal and friendly-to-manufacture...
journal article 2018
document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
He, Xiaoxi (author), Cheng, Haibo (author), Xie, Jiahong (author), Wang, Ping (author), Liang, K. (author)
Passwords have been widely used in online authentication, and they form the front line that protects our data security and privacy. But the security of password may be easily harmed by insecure password generator. Massive reports state that users are always keen to generate new passwords by reusing or fine-tuning old secrets. Once an old...
conference paper 2022
document
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....
conference paper 2023
Searched for: +
(1 - 7 of 7)