Zobrazeno 1 - 10
of 698
pro vyhledávání: '"SHEN Yulong"'
Publikováno v:
Tongxin xuebao, Vol 45, Pp 13-26 (2024)
In order to solve the problems of high energy consumption and high reliance on manual annotation data of traditional intelligent attack detection methods in UAV networks, a lightweight UAV network online anomaly detection model based on a double-laye
Externí odkaz:
https://doaj.org/article/3c5457bef95a40e78665d260b067fbe1
Autor:
Qiao, Wei, Feng, Yebo, Li, Teng, Zhang, Zijian, Xu, Zhengzi, Ma, Zhuo, Shen, Yulong, Ma, JianFeng, Liu, Yang
Advanced Persistent Threats (APTs) represent sophisticated cyberattacks characterized by their ability to remain undetected within the victim system for extended periods, aiming to exfiltrate sensitive data or disrupt operations. Existing detection a
Externí odkaz:
http://arxiv.org/abs/2410.17910
Autor:
Zheng, Lele, Cao, Yang, Jiang, Renhe, Taura, Kenjiro, Shen, Yulong, Li, Sheng, Yoshikawa, Masatoshi
Recent works show that sensitive user data can be reconstructed from gradient updates, breaking the key privacy promise of federated learning. While success was demonstrated primarily on image data, these methods do not directly transfer to other dom
Externí odkaz:
http://arxiv.org/abs/2410.16121
Multi-robot swarms utilize swarm intelligence to collaborate on tasks and play an increasingly significant role in a variety of practical scenarios. However, due to the complex design, multi-robot swarm systems often have vulnerabilities caused by lo
Externí odkaz:
http://arxiv.org/abs/2409.04736
Autor:
Zheng, Lele, Cao, Yang, Jiang, Renhe, Taura, Kenjiro, Shen, Yulong, Li, Sheng, Yoshikawa, Masatoshi
Spatiotemporal federated learning has recently raised intensive studies due to its ability to train valuable models with only shared gradients in various location-based services. On the other hand, recent studies have shown that shared gradients may
Externí odkaz:
http://arxiv.org/abs/2407.08529
Covert communication's effectiveness critically depends on precise channel state information (CSI). This paper investigates the impact of imperfect CSI on achievable covert communication performance in a two-hop relay system. Firstly, we introduce a
Externí odkaz:
http://arxiv.org/abs/2404.05983
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity authentication attracts wide attenti
Externí odkaz:
http://arxiv.org/abs/2312.12381
Autor:
Shen, Yulong, Zhou, Nengji
Publikováno v:
Computer Physics Communications 293 (2023) 108895
With extensive variational simulations, dissipative quantum phase transitions in the sub-Ohmic spin-boson model are numerically studied in a dense limit of environmental modes. By employing a generalized trial wave function composed of coherent-state
Externí odkaz:
http://arxiv.org/abs/2309.00797
Autor:
Niu, Jun, Zhu, Xiaoyan, Zeng, Moxuan, Zhang, Ge, Zhao, Qingyang, Huang, Chunhui, Zhang, Yangming, An, Suyu, Wang, Yangzhong, Yue, Xinghui, He, Zhipeng, Guo, Weihao, Shen, Kuo, Liu, Peng, Shen, Yulong, Jiang, Xiaohong, Ma, Jianfeng, Zhang, Yuqing
Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. However, it has been increasingly recognized that the "comparing different MI attacks" methodology used in the
Externí odkaz:
http://arxiv.org/abs/2307.06123
Autor:
Yang, Lingxiao, Dong, Xuewen, Gao, Sheng, Qu, Qiang, Zhang, Xiaodong, Tian, Wensheng, Shen, Yulong
As a promising implementation model of payment channel network (PCN), payment channel hub (PCH) could achieve high throughput by providing stable off-chain transactions through powerful hubs. However, existing PCH schemes assume hubs preplaced in adv
Externí odkaz:
http://arxiv.org/abs/2305.19182