Zobrazeno 1 - 10
of 102
pro vyhledávání: '"DEXUE ZHANG"'
Publikováno v:
IEEE Access, Vol 11, Pp 133255-133280 (2023)
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor behaviors. In response to the security concern, proposals for Control Flow I
Externí odkaz:
https://doaj.org/article/e6092230d19f46cd96a81a9fb2a56ee4
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-9 (2022)
Abstract Superior low-light and high dynamic range (HDR) imaging performance with ultra-high pixel resolution are widely sought after in the imaging world. The quanta image sensor (QIS) concept was proposed in 2005 as the next paradigm in solid-state
Externí odkaz:
https://doaj.org/article/acec2adab71f4476a141bdb565bed4ae
Autor:
Xianbo Yang, Dexue Zhang
Publikováno v:
Categories and General Algebraic Structures with Applications, Vol 18, Iss 1 (2023)
The construction of the formal ball model for metric spaces due to Edalat and Heckmann was generalized to Q-categories by Kostanek and Waszkiewicz, where Q is a commutative and unital quantale. This paper concerns the influence of the structure of th
Externí odkaz:
https://doaj.org/article/db1a7871fa424cfe9b3fb9a0e611dfdd
Publikováno v:
Micromachines, Vol 14, Iss 8, p 1525 (2023)
The growing prevalence of embedded systems in various applications has raised concerns about their vulnerability to malicious code reuse attacks. Current software-based and hardware-assisted security techniques struggle to detect or block these attac
Externí odkaz:
https://doaj.org/article/1c7261914ef04ea181e51fa9e680d70e
Publikováno v:
Lubricants, Vol 11, Iss 4, p 152 (2023)
The vacuum suction cup is often used as an end effector and widely used in wall-climbing operations. However, there are few vacuum suction cup designs and applications for oil-immersed substrates. Inspired by the surface morphology of the octopus suc
Externí odkaz:
https://doaj.org/article/5a3e2fbf17c54e12a7b85d0381c0bb8b
Publikováno v:
Biomimetics, Vol 8, Iss 1, p 85 (2023)
In nature, aquatic organisms have evolved various attachment systems, and their attachment ability has become a specific and mysterious survival skill for them. Therefore, it is significant to study and use their unique attachment surfaces and outsta
Externí odkaz:
https://doaj.org/article/1586c15f18dc42bd94e18d2d05effde0
Publikováno v:
IEEE Access, Vol 6, Pp 61773-61781 (2018)
Polar codes have been proven to achieve the symmetric capacity of memoryless channel. Compared with a successive cancellation list decoder, list-Fast simplified-successive cancellation generates more candidate paths, which leads to more resource cost
Externí odkaz:
https://doaj.org/article/23d47f605d3f48b188f6278232546a11
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 14 (2018)
The age of Internet of things gives rise to more challenges to various secure demands when designing the protocols, such as object identification and tracking, and privacy control. In many of the current protocols, a malicious server may cheat users
Externí odkaz:
https://doaj.org/article/f987fc993bf24f12b847328fbf4a57c7
Autor:
JUNCHE YU1 cqyjc@icloud.com, DEXUE ZHANG2 dxzhang@scu.edu.cn
Publikováno v:
Theory & Applications of Categories. 2023, Vol. 39, p21-50. 30p.
Publikováno v:
Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022).