Zobrazeno 1 - 10
of 365
pro vyhledávání: '"Tang Bowen"'
Dataset distillation offers a lightweight synthetic dataset for fast network training with promising test accuracy. To imitate the performance of the original dataset, most approaches employ bi-level optimization and the distillation space relies on
Externí odkaz:
http://arxiv.org/abs/2407.15138
Autor:
Jin, Jiandong, Tang, Bowen, Ma, Mingxuan, Liu, Xiao, Wang, Yunfei, Lai, Qingnan, Yang, Jia, Zhou, Changling
We introduces Crimson, a system that enhances the strategic reasoning capabilities of Large Language Models (LLMs) within the realm of cybersecurity. By correlating CVEs with MITRE ATT&CK techniques, Crimson advances threat anticipation and strategic
Externí odkaz:
http://arxiv.org/abs/2403.00878
Deep learning models have the ability to extract rich knowledge from large-scale datasets. However, the sharing of data has become increasingly challenging due to concerns regarding data copyright and privacy. Consequently, this hampers the effective
Externí odkaz:
http://arxiv.org/abs/2401.15657
The trigonal ${\alpha}$-HgS has a 3-fold helical chain structure, and is in form of a noncentrosymmetric $P3_121$ phase, known as the cinnabar phase. However, under pressure, the helical chains gradually approach and connect with each other, finally
Externí odkaz:
http://arxiv.org/abs/2312.16484
Autor:
Tang, Bowen, Wu, Chenggang, Yew, Pen-Chung, Zhang, Yinqian, Xie, Mengyao, Lai, Yuanming, Kang, Yan, Wang, Wei, Wei, Qiang, Wang, Zhe
Transient Execution Attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and transmit them through timing-based c
Externí odkaz:
http://arxiv.org/abs/2302.00947
Autor:
Jia, Lichen, Tang, Bowen, Wu, Chenggang, Wang, Zhe, Jiang, Zihan, Lai, Yuanming, Kang, Yan, Liu, Ning, Zhang, Jingfeng
The binary code similarity detection (BCSD) method measures the similarity of two binary executable codes. Recently, the learning-based BCSD methods have achieved great success, outperforming traditional BCSD in detection accuracy and efficiency. How
Externí odkaz:
http://arxiv.org/abs/2208.14191
Autor:
Wu, Fang, Jin, Shuting, Jiang, Yinghui, Jin, Xurui, Tang, Bowen, Niu, Zhangming, Liu, Xiangrong, Zhang, Qiang, Zeng, Xiangxiang, Li, Stan Z.
Publikováno v:
Advanced Science 2022
The latest biological findings observe that the traditional motionless 'lock-and-key' theory is not generally applicable because the receptor and ligand are constantly moving. Nonetheless, remarkable changes in associated atomic sites and binding pos
Externí odkaz:
http://arxiv.org/abs/2204.08663
Publikováno v:
In Chemical Physics Letters 16 December 2024 857
Publikováno v:
In Digital Signal Processing December 2024 155
Compared with traditional task-irrelevant downsampling methods, task-oriented neural networks have shown improved performance in point cloud downsampling range. Recently, Transformer family of networks has shown a more powerful learning capacity in v
Externí odkaz:
http://arxiv.org/abs/2202.06263