Zobrazeno 1 - 10
of 332
pro vyhledávání: '"Hu, Guangyuan"'
Publikováno v:
Scientometrics 129, 933-955 (2024)
The expansion of Web of Science Core Collection (WoSCC) over the recent years has partially accounted for the "norm" of growth of research output in many bibliometric analysis studies. However, the expansion patterns of different citation indexes may
Externí odkaz:
http://arxiv.org/abs/2312.05524
Autor:
Hu, Guangyuan, Lee, Ruby B.
Caches have been exploited to leak secret information due to the different times they take to handle memory accesses. Cache timing attacks include non-speculative cache side and covert channel attacks and cache-based speculative execution attacks. We
Externí odkaz:
http://arxiv.org/abs/2309.16172
Autor:
Hu, Guangyuan, Lee, Ruby B.
Hardware caches are essential performance optimization features in modern processors to reduce the effective memory access time. Unfortunately, they are also the prime targets for attacks on computer processors because they are high-bandwidth and rel
Externí odkaz:
http://arxiv.org/abs/2302.00732
Publikováno v:
2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021, pp. 108-120
Speculative execution attacks leverage the speculative and out-of-order execution features in modern computer processors to access secret data or execute code that should not be executed. Secret information can then be leaked through a covert channel
Externí odkaz:
http://arxiv.org/abs/2301.03724
Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information. This paper proposes a defense-in-depth mechanism to detect impostors quickly with simple Deep Learning algorithms, which
Externí odkaz:
http://arxiv.org/abs/2103.06453
Autor:
Wang, Minghuan, Ran, Lusen, Liu, Bo, Wei, Wenjie, Zhu, Jiayu, Long, Fan, Song, Xiaopeng, Zhang, Jing, Zhao, Yali, Hu, Guangyuan, Yuan, Xianglin, Wang, Wei
Publikováno v:
In Med 8 December 2023 4(12):898-912
Spectre and Meltdown attacks and their variants exploit hardware performance optimization features to cause security breaches. Secret information is accessed and leaked through covert or side channels. New attack variants keep appearing and we do not
Externí odkaz:
http://arxiv.org/abs/2009.07998
In this paper, we show that sensor-based impostor detection with deep learning can achieve excellent impostor detection accuracy at lower hardware cost compared to past work on sensor-based user authentication (the inverse problem) which used more co
Externí odkaz:
http://arxiv.org/abs/2002.03914
Despite the limitations of funding acknowledgment (FA) data in Web of Science (WoS), studies using FA information have increased rapidly over the last several years. Considering this WoS'recent practice of updating funding data, this paper further in
Externí odkaz:
http://arxiv.org/abs/2001.04697
Autor:
Zhang, Yuhan, Hu, Junyi, Ji, Kai, Jiang, Shengpeng, Dong, Yang, Sun, Lin, Wang, Jun, Hu, Guangyuan, Chen, Dawei, Chen, Ke, Tao, Zhen
Publikováno v:
In Cell Reports Medicine 15 August 2023 4(8)