Zobrazeno 1 - 10
of 103
pro vyhledávání: '"Chuanyi Liu"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-22 (2024)
Abstract Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs. Existing work has shown that coverage metrics are a crucial factor in guiding fuzzing exploration of targets. A fine-grained coverage metric can help f
Externí odkaz:
https://doaj.org/article/2a3aa1684e6a4842b746790c1441a5d0
Publikováno v:
Journal of Marine Science and Engineering, Vol 11, Iss 7, p 1368 (2023)
Floating offshore wind platform (FOWP) has become the economically favored option for supporting wind turbines in deep waters. It is urgent to propose new concept designs for FOWPs that can be effectively deployed. Additionally, the extensive use of
Externí odkaz:
https://doaj.org/article/710cff57f5b742648e3a6c0a5f9e14a4
Publikováno v:
Asian Pacific Journal of Tropical Medicine, Vol 14, Iss 9, Pp 417-428 (2021)
Objective: To determine the most influential data features and to develop machine learning approaches that best predict hospital readmissions among patients with diabetes. Methods: In this retrospective cohort study, we surveyed patient statistics an
Externí odkaz:
https://doaj.org/article/9b452c07ad8d4d189d637c3b373c071b
Publikováno v:
IEEE Access, Vol 8, Pp 68449-68459 (2020)
Browser-based cloud storage services are still broadly used in enterprises for online sharing and collaboration. However, sensitive information in images or documents may be easily leaked outside trusted enterprise on-premises due to such cloud servi
Externí odkaz:
https://doaj.org/article/f39d7e35a7764bb08f2b4586368b004a
Autor:
Shaoming Duan, Chuanyi Liu, Peiyi Han, Xiaopeng Jin, Xinyi Zhang, Tianyu He, Hezhong Pan, Xiayu Xiang
Publikováno v:
Entropy, Vol 25, Iss 1, p 88 (2022)
In this paper, we study the problem of privacy-preserving data synthesis (PPDS) for tabular data in a distributed multi-party environment. In a decentralized setting, for PPDS, federated generative models with differential privacy are used by the exi
Externí odkaz:
https://doaj.org/article/d0812315ee184f77b90c8900b74630f5
Publikováno v:
Applied Sciences, Vol 12, Iss 17, p 8763 (2022)
Cloud platforms allow administrators or management applications with privileged accounts to remotely perform privileged operations for specific tasks, such as deleting virtual hosts. When privileged accounts are leaked and conduct dangerous privilege
Externí odkaz:
https://doaj.org/article/6d9a36c78454463aa6c877787e19e011
Publikováno v:
IEEE Access, Vol 6, Pp 2908-2921 (2018)
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high e
Externí odkaz:
https://doaj.org/article/9041500f545a458e9d2adbbc559fd864
Autor:
Guofeng Wang, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo, Peiyi Han, Hezhong Pan, Binxing Fang
Publikováno v:
IEEE Access, Vol 6, Pp 21828-21839 (2018)
Searchable encryption (SE) schemes, such as those deployed for cyber-physical social systems, may be vulnerable to inference attacks. In such attacks, attackers seek to learn sensitive information about the queries and data stored on the (cyber-physi
Externí odkaz:
https://doaj.org/article/422f18ddf4d74fd38723d098f7eb24ab
Autor:
Chuanyi Liu, Xiaoyong Li
Publikováno v:
Sensors, Vol 20, Iss 6, p 1592 (2020)
The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging iss
Externí odkaz:
https://doaj.org/article/a04fb9535cd442c69fa31e2a71b7f5fa
Publikováno v:
IEEE Transactions on Artificial Intelligence. :1-13