Zobrazeno 1 - 10
of 2 214
pro vyhledávání: '"Li, Mengyuan"'
Confidential Virtual Machines (CVMs) are a type of VMbased Trusted Execution Environments (TEEs) designed to enhance the security of cloud-based VMs, safeguarding them even from malicious hypervisors. Although CVMs have been widely adopted by major c
Externí odkaz:
http://arxiv.org/abs/2409.15542
Autor:
Li, Mengyuan
Fine particulate matter (PM2.5) exposure is associated with increased risk of adverse cardiovascular health outcomes. Prior research shows that PM2.5 is disproportionately concentrated in communities of low socioeconomic status and with higher propor
Content addressable memory (CAM) stands out as an efficient hardware solution for memory-intensive search operations by supporting parallel computation in memory. However, developing a CAM-based accelerator architecture that achieves acceptable accur
Externí odkaz:
http://arxiv.org/abs/2403.03442
Trusted I/O (TIO) is an appealing solution to improve I/O performance for confidential VMs (CVMs), with the potential to eliminate broad sources of I/O overhead. However, this paper emphasizes that not all types of I/O can derive substantial benefits
Externí odkaz:
http://arxiv.org/abs/2403.03360
Autor:
Wang, Ziqiang, Feng, Xuewei, Li, Qi, Sun, Kun, Yang, Yuxiang, Li, Mengyuan, Du, Ganqiu, Xu, Ke, Wu, Jianping
In this paper, we unveil a fundamental side channel in Wi-Fi networks, specifically the observable frame size, which can be exploited by attackers to conduct TCP hijacking attacks. Despite the various security mechanisms (e.g., WEP and WPA2/WPA3) imp
Externí odkaz:
http://arxiv.org/abs/2402.12716
Autor:
Farzaneh, Hamid, de Lima, João Paulo Cardoso, Li, Mengyuan, Khan, Asif Ali, Hu, Xiaobo Sharon, Castrillon, Jeronimo
Machine learning and data analytics applications increasingly suffer from the high latency and energy consumption of conventional von Neumann architectures. Recently, several in-memory and near-memory systems have been proposed to remove this von Neu
Externí odkaz:
http://arxiv.org/abs/2309.06418
Publikováno v:
Zhongguo quanke yixue, Vol 27, Iss 27, Pp 3411-3417 (2024)
Background Polycystic ovary syndrome with insulin resistance (PCOS-IR) is recognized as one of the most challenging subtypes of PCOS to treat due to its intricate pathogenesis and significant individual variability. Although Metformin, as a first-lin
Externí odkaz:
https://doaj.org/article/1a2fc1a5ff9740689ee220dfe146d3e5
Lattice-based cryptographic algorithms built on ring learning with error theory are gaining importance due to their potential for providing post-quantum security. However, these algorithms involve complex polynomial operations, such as polynomial mod
Externí odkaz:
http://arxiv.org/abs/2307.14557
Autor:
Li, Mengyuan
Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user's data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from
Autor:
Le, Van Anh, Reddy, Varshini, Chen, Zixi, Li, Mengyuan, Tang, Xinran, Ortiz, Anthony, Nsutezo, Simone Fobi, Robinson, Caleb
In this paper we propose a mask-conditional synthetic image generation model for creating synthetic satellite imagery datasets. Given a dataset of real high-resolution images and accompanying land cover masks, we show that it is possible to train an
Externí odkaz:
http://arxiv.org/abs/2302.04305