Zobrazeno 1 - 10
of 414
pro vyhledávání: '"Wu Chenggang"'
Publikováno v:
Journal of Innovation & Knowledge, Vol 9, Iss 4, Pp 100618- (2024)
The cumulative stress to acknowledge environmental challenges bound businesses to embrace sustainable practices into their business operations. In Vietnamese context, green ventures are considered a key contributor, hence, play major part in transfor
Externí odkaz:
https://doaj.org/article/064d8963fb4a4641824f0c390be5342b
Autor:
Chen, Lei, Liu, Shi, Wang, Chenxi, Ma, Haoran, Qiao, Yifan, Wang, Zhe, Wu, Chenggang, Lu, Youyou, Feng, Xiaobing, Cui, Huimin, Lu, Shan, Xu, Harry
With rapid advances in network hardware, far memory has gained a great deal of traction due to its ability to break the memory capacity wall. Existing far memory systems fall into one of two data paths: one that uses the kernel's paging system to tra
Externí odkaz:
http://arxiv.org/abs/2406.16005
Autor:
Tang, Bowen, Wu, Chenggang, Yew, Pen-Chung, Zhang, Yinqian, Xie, Mengyao, Lai, Yuanming, Kang, Yan, Wang, Wei, Wei, Qiang, Wang, Zhe
Transient Execution Attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution to illegally access private data, and transmit them through timing-based c
Externí odkaz:
http://arxiv.org/abs/2302.00947
Autor:
Zhang, Peihua, Wu, Chenggang, Peng, Mingfan, Zeng, Kai, Yu, Ding, Lai, Yuanming, Kang, Yan, Wang, Wei, Wang, Zhe
Software obfuscation techniques can prevent binary diffing techniques from locating vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting embedded device software. With the rapid development of binary diffing techn
Externí odkaz:
http://arxiv.org/abs/2301.11586
Autor:
Jia, Lichen, Tang, Bowen, Wu, Chenggang, Wang, Zhe, Jiang, Zihan, Lai, Yuanming, Kang, Yan, Liu, Ning, Zhang, Jingfeng
The binary code similarity detection (BCSD) method measures the similarity of two binary executable codes. Recently, the learning-based BCSD methods have achieved great success, outperforming traditional BCSD in detection accuracy and efficiency. How
Externí odkaz:
http://arxiv.org/abs/2208.14191
Autor:
Lamer, Tess, Chen, Pu, Venter, Marie J., van Belkum, Marco J., Wijewardane, Anjalee, Wu, Chenggang, Lemieux, M. Joanne, Vederas, John C.
Publikováno v:
In Journal of Biological Chemistry November 2024 300(11)
In this paper, we make the very first attempt to investigate the integration of deep hash learning with vehicle re-identification. We propose a deep hash-based vehicle re-identification framework, dubbed DVHN, which substantially reduces memory usage
Externí odkaz:
http://arxiv.org/abs/2112.04937
Autor:
Hong, Chengyu, Rao, Wei, Qiu, Tong, Chen, Xiangsheng, Dai, Ji, Wu, Chenggang, Li, Mengting, Chen, Weibin
Publikováno v:
In Measurement August 2024 235
Autor:
Tang, Bowen, Wu, Chenggang, Wang, Zhe, Jia, Lichen, Yew, Pen-Chung, Cheng, Yueqiang, Zhang, Yinqian, Wang, Chenxi, Xu, Guoqing Harry
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to leak secret data via transient exec
Externí odkaz:
http://arxiv.org/abs/2107.08367
Publikováno v:
In BenchCouncil Transactions on Benchmarks, Standards and Evaluations June 2024 4(2)