Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Pan Gaoning"'
Launching effective malicious attacks in VFL presents unique challenges: 1) Firstly, given the distributed nature of clients' data features and models, each client rigorously guards its privacy and prohibits direct querying, complicating any attempts
Externí odkaz:
http://arxiv.org/abs/2404.19582
Autor:
Wang, Qinying, Chang, Boyu, Ji, Shouling, Tian, Yuan, Zhang, Xuhong, Zhao, Binbin, Pan, Gaoning, Lyu, Chenyang, Payer, Mathias, Wang, Wenhai, Beyah, Raheem
Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted Operating System (Trusted OS) is the primary component. It enables the TEE t
Externí odkaz:
http://arxiv.org/abs/2309.14742
Autor:
Lyu, Chenyang, Xu, Jiacheng, Ji, Shouling, Zhang, Xuhong, Wang, Qinying, Zhao, Binbin, Pan, Gaoning, Cao, Wei, Beyah, Raheem
In recent years, REST API fuzzing has emerged to explore errors on a cloud service. Its performance highly depends on the sequence construction and request generation. However, existing REST API fuzzers have trouble generating long sequences with wel
Externí odkaz:
http://arxiv.org/abs/2303.02545
Autor:
Ling, Xiang, Wu, Lingfei, Wang, Saizhuo, Pan, Gaoning, Ma, Tengfei, Xu, Fangli, Liu, Alex X., Wu, Chunming, Ji, Shouling
Publikováno v:
ACM Trans. Knowl. Discov. Data 15, 5 (2021), 1-21
Code retrieval is to find the code snippet from a large corpus of source code repositories that highly matches the query of natural language description. Recent work mainly uses natural language processing techniques to process both query texts (i.e.
Externí odkaz:
http://arxiv.org/abs/2010.12908
Autor:
Wang, Qiuhua, Li, Chuangchuang, Wang, Dong, Yuan, Lifeng, Pan, Gaoning, Cheng, Yanyu, Hu, Mingde, Ren, Yizhi
Publikováno v:
International Journal of Network Management; Nov/Dec2024, Vol. 34 Issue 6, p1-15, 15p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ISNCC
Resource Scheduling Strategy on heterogeneous executives, which is the “real” service provider, is studied in this paper based on Mimic Defense Theory. Since the redundancy and heterogeneity of executives, their response times differ. In order to
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.