Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Liu Xiruo"'
Autor:
Liu, Xiruo, Singh, Shibani, Cornelius, Cory, Busho, Colin, Tan, Mike, Paul, Anindya, Martin, Jason
Publikováno v:
AdvML Frontiers 2022
Existing adversarial example research focuses on digitally inserted perturbations on top of existing natural image datasets. This construction of adversarial examples is not realistic because it may be difficult, or even impossible, for an attacker t
Externí odkaz:
http://arxiv.org/abs/2207.10719
Autor:
Tourani, Reza, Srikanteswara, Srikathyayani, Misra, Satyajayant, Chow, Richard, Yang, Lily, Liu, Xiruo, Zhang, Yi
The needs of emerging applications, such as augmented and virtual reality, federated machine learning, and autonomous driving, have motivated edge computing--the push of computation capabilities to the edge. Various edge computing architectures have
Externí odkaz:
http://arxiv.org/abs/2007.00641
Autor:
Cornelius Buerkle, Manoj R. Sastry, Kathiravetpillai Sivanesan, Fabian Oboril, Ignacio Alvarez, Leonardo Gomes Baltar, Lily L. Yang, Arvind Merwaday, Liu Xiruo
Publikováno v:
2021 IEEE Intelligent Vehicles Symposium (IV).
Recently, Collective Perception Messages (CPM) that carry additional information about the surrounding environment beyond Basic Safety Messages (BSM) or Cooperative Awareness Messages (CAM) have been proposed to increase the situational awareness for
Publikováno v:
ITSC
The recent trend of integrating vehicular communications with advanced sensors installed on vehicles, enables Connected and Autonomous Vehicles (CAVs) to share their own driving information as well as perception information, such as a list of perceiv
Autor:
Wade Trappe, Liu Xiruo
Publikováno v:
Security and Communication Networks. 9:4482-4494
Mobile ad hoc networks face many challenges when they are deployed, particularly problems associated with security and network failures arising from the dynamics of their network topologies. To address these issues, there have been many efforts to in
Publikováno v:
DASC/PiCom/DataCom/CyberSciTech
There is an increased emphasis on attacks that utilize heap buffer overflow vulnerabilities to target critical metadata and sensitive data in programs. Mitigation solutions implemented within the same virtual memory space are vulnerable to attacks th
Publikováno v:
CODASPY
Remote attestation is a well-established interactive technique to establish trust in the realm of connected devices. It allows a Prover device to attest its platform integrity to a Verifier device. Existing remote attestation protocols rely on classi
Autor:
Liu Xiruo
Publikováno v:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy.
Publikováno v:
Future Internet; Volume 9; Issue 3; Pages: 27
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being fron