Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Qinchen Gu"'
Publikováno v:
Frontiers in Immunology, Vol 14 (2023)
ObjectiveThe development of ankylosing spondylitis (AS) is closely related to autoimmune system dysfunction. Type 1 diabetes mellitus (T1DM) is an autoimmune disease that is a risk factor for many diseases. This study aimed to investigate the causal
Externí odkaz:
https://doaj.org/article/c74ede1bf8534893afda0757446052e5
Publikováno v:
Medicine; 7/19/2024, Vol. 103 Issue 29, p1-3, 3p
Autor:
Anu G. Bourgeois, Raheem Beyah, Brendan Saltaformaggio, Shouling Ji, David Formby, Qinchen Gu
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3218-3230
Autor:
Chunming Wu, Yuwei Li, Jianhai Chen, Shouling Ji, Yuan Chen, Raheem Beyah, Qinchen Gu, Chenyang Lyu
Publikováno v:
IEEE Transactions on Cybernetics. 52:3745-3756
Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code
Autor:
Qinchen Gu, Lalith Polepeddi, Shreyas Kulkarni, Raheem Beyah, Eric Myers, Deepak Divan, Szilard Liptak
Publikováno v:
IEEE Internet of Things Journal. 6:7406-7419
As a large number of distributed devices are connected to the modern smart grid, the traditional centralized connectivity models fail to provide economic value. These models have relied on sending data to the cloud for processing and receiving comman
Autor:
Ting Wang, Raheem Beyah, Qianjun Liu, Jing Chen, Pan Zhou, Haiqin Weng, Shouling Ji, Qinchen Gu, Zhao Li
Publikováno v:
ICDE
In this paper, we study the privacy of online health data. We present a novel online health data De-Anonymization (DA) framework, named De-Health. Leveraging two real world online health datasets WebMD and HealthBoards, we validate the DA efficacy of
Publikováno v:
IEEE Security & Privacy. 16:49-59
Due to the increasing attacks against cyber-physical systems, it is important to develop novel solutions to secure these critical systems. System security can be improved by using the physics of process actuators (that is, devices). Device physics ca
Publikováno v:
AsiaCCS
Despite their immense popularity, deep learning-based acoustic systems are inherently vulnerable to adversarial attacks, wherein maliciously crafted audios trigger target systems to misbehave. In this paper, we present SirenAttack, a new class of att
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::78fc24bf95d08eeabcbc3cb9a79987a7
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-1
Web search queries reveal extensive sensitive information about users’ interests and preferences to the search engines and eavesdroppers. Obfuscation-based private web search solutions automatically generate dummy queries and send the obfuscated qu
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
SecureComm
SecureComm
HTTPS has played a significant role in the Internet world. HSTS is deployed to ensure the proper running of HTTPS. To get a good understanding of the deployment of HSTS, we conducted an in-depth measurement of the deployment of HSTS among Alexa top 1
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3df9831d5dae8a8ee090cf8ac62e3f77
https://doi.org/10.1007/978-3-319-78813-5_25
https://doi.org/10.1007/978-3-319-78813-5_25