Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Dai Tianxiang"'
Publikováno v:
Nanophotonics, Vol 11, Iss 17, Pp 4089-4099 (2022)
The solution of matrix eigenvalues has always been a research hotspot in the field of modern numerical analysis, which has important value in practical application of engineering technology and scientific research. Despite the fact that currently exi
Externí odkaz:
https://doaj.org/article/29aa8068584a4a3da4324e2cfb4930ff
Surrogate neural network-based partial differential equation (PDE) solvers have the potential to solve PDEs in an accelerated manner, but they are largely limited to systems featuring fixed domain sizes, geometric layouts, and boundary conditions. We
Externí odkaz:
http://arxiv.org/abs/2405.02351
Autor:
Dai, Tianxiang, Ma, Anqi, Mao, Jun, Ao, Yutian, Jia, Xinyu, Zheng, Yun, Zhai, Chonghao, Yang, Yan, Li, Zhihua, Tang, Bo, Luo, Jun, Zhang, Baile, Hu, Xiaoyong, Gong, Qihuang, Wang, Jianwei
Controlling topological phases of light has allowed experimental observations of abundant topological phenomena and development of robust photonic devices. The prospect of more sophisticated controls with topological photonic devices for practical im
Externí odkaz:
http://arxiv.org/abs/2403.08348
Autor:
Zhong, Chuyu, Liao, Kun, Dai, Tianxiang, Wei, Maoliang, Ma, Hui, Wu, Jianghong, Zhang, Zhibin, Ye, Yuting, Luo, Ye, Chen, Zequn, Jian, Jialing, Sun, Chulei, Tang, Bo, Zhang, Peng, Liu, Ruonan, Li, Junying, Yang, Jianyi, Li, Lan, Liu, Kaihui, Hu, Xiaoyong, Lin, Hongtao
Optical neural networks (ONNs) herald a new era in information and communication technologies and have implemented various intelligent applications. In an ONN, the activation function (AF) is a crucial component determining the network performances a
Externí odkaz:
http://arxiv.org/abs/2307.06882
Autor:
Pramanik, Tanumoy, Chen, Xiaojiong, Xiang, Yu, Li, Xudong, Mao, Jun, Bao, Jueming, Deng, Yaohao, Dai, Tianxiang, Tang, Bo, Yang, Yan, Li, Zhihua, Gong, Qihuang, He, Qiongyi, Wang, Jianwei
Publikováno v:
Sci Rep 12, 16400 (2022)
Characterization and categorization of quantum correlations are both fundamentally and practically important in quantum information science. Although quantum correlations such as non-separability, steerability, and non-locality can be characterized b
Externí odkaz:
http://arxiv.org/abs/2210.00237
Publikováno v:
SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference, August 2021, Pages 836-849
We perform the first analysis of methodologies for launching DNS cache poisoning: manipulation at the IP layer, hijack of the inter-domain routing and probing open ports via side channels. We evaluate these methodologies against DNS resolvers in the
Externí odkaz:
http://arxiv.org/abs/2205.06085
Publikováno v:
30th USENIX Security Symposium (USENIX Security 21), 2021, pages 3147-3164, ISBN 978-1-939133-24-3
Internet resources form the basic fabric of the digital society. They provide the fundamental platform for digital services and assets, e.g., for critical infrastructures, financial services, government. Whoever controls that fabric effectively contr
Externí odkaz:
http://arxiv.org/abs/2205.05473
Autor:
Chen, Xiaojiong, Deng, Yaohao, Liu, Shuheng, Pramanik, Tanumoy, Mao, Jun, Bao, Jueming, Zhai, Chonghao, Dai, Tianxiang, Yuan, Huihong, Guo, Jiajie, Fei, Shao-Ming, Huber, Marcus, Tang, Bo, Yang, Yan, Li, Zhihua, He, Qiongyi, Gong, Qihuang, Wang, Jianwei
Publikováno v:
Nat. Commun. 12, 2712 (2021)
Famous double-slit or double-path experiments, implemented in a Young's or Mach-Zehnder interferometer, have confirmed the dual nature of quantum matter, When a stream of photons, neutrons, atoms, or molecules, passes through two slits, either wave-l
Externí odkaz:
http://arxiv.org/abs/2105.05580
Autor:
Dai, Tianxiang, Shulman, Haya
Publikováno v:
Annual Computer Security Applications Conference (ACSAC '21), December 6-10, 2021, Virtual Event, USA. ACM, New York, NY, USA, 12 pages
To protect themselves from attacks, networks need to enforce ingress filtering, i.e., block inbound packets sent from spoofed IP addresses. Although this is a widely known best practice, it is still not clear how many networks do not block spoofed pa
Externí odkaz:
http://arxiv.org/abs/2003.05813
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.